Skip to content

f1lby/p2pblocklists

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Gigantic IPv4 Address Lists For PeerBlock

'Probably the biggest and most comprehensive open source IPv4 address audit ever'

These files present a large range of public Internet IPv4 provider/country to address lookup. It's a bit like a 'reverse WHOIS', where you have the country or organisation / provider name and can reference these files to find the associated IPv4 addresses.

These files are in the .p2p file format which is compatible with Peerblock and Peerguardian. The file format consists of the following markdown (in most cases);

_STARTADDRESS - END ADDRESS - DETAILS (all free text) STARTADDRESS-ENDADDRESS_

In some cases, the free text may be in CIDR format. Most entries include the details along with the date that it was recorded.

The files are all plain text format and readable using Notepad, Notepad++, Vim, etc. They have been lovingly hand created and maintained since 2006 by the author.

Use cases include;

  • Deny IPv4 from specific countries (GEOIP), network providers or Government / Military
  • Allow IPv4 from specific countries (GEOIP), network providers or Government / Military
  • You have a firewall which is DENY ALL, and wish to 'punch a few holes in it' for specific providers or organisations (ORGIP) - you may find your network provider listed here.
  • You wish to block network access from a specific provider / organisation (ORGIP).
  • OSINT - Discovery of an IPv4 address from an organisation name.
  • You want to launch a port scan and ensure certain organisations or countries are excluded to reduce the risk of complaints from less tolerant targets.
  • Hardening your infrastructure by applying filtering to reduce the possibility of a cyber-attack.
  • To limit outbound Internet traffic to only specific providers or countries (helps to lock down hosts which are compromised and are attempting to 'phone home' to their Command and Control (C&C / C2) server).
  • WAF bypass. Configure your WAF/IPS/IDS to respond in a different manner depending on the source inbound IP address.
  • Anti-spam filtering. Configure your packet-based firewall to block specific IP address ranges for SMTP or configure your SMTP receiver to allow or deny specific IP ranges. You could also make use of a host-based firewall.
  • Whitelist IP address ranges for SMTP greylisting or DNSBL bypass.
  • Search for large ranges of potentially unused IP addresses - Some large providers are now making offers for the transfer of some of these previously unused IPv4 address blocks.
  • Azure Conditional Access Policies which make use of IPv4 addresses. Azure offers GEOIP but not ORGIP.
  • Target audience - You already know who your target audience is (for your servers), so these lists could help you restrict access accordingly.
  • Fraud prevention - As part of a 'defense-in-depth' strategy, if you provide services to clients, using these lists could help to work out the risk profile of an IP address.
  • Filtering of source IP addresses to your authoritative name servers. If DNS records can't be resolved, it makes it harder for an attacker to find your hosts. This can help to reduce spam.

The lists can be adapted to suit your needs and the information within applied to commercial enterprise-grade and open source firewalls.

NOTE1: I do not maintain lists of abusive or malicious bad IPv4 addresses - there is already a respected source for this data - please see https://www.abuseipdb.com/

NOTE2: Some country lists may not be fully populated due to recording the IPv4 addresses instead, within the files which are for a specific provider or organisation. Use both the country and the org lists for your maximum enjoyment.

NOTE3: The IPv4 address space allows for a maximum of 4,294,967,296 IP addresses. Once the reserved IPv4 addresses have been deducted from this value, this will give the actual amount of useable public Internet routable IPv4 addresses that can be used. According to the authors bad math ;-), the calculated number of actual usable routable public Internet IPv4 addresses are 3,684,258,432.

NOTE4: The file UNASSIGNED.p2p refers to IP addresses that are not assigned to any organisation. You would not normally expect any traffic from these ranges.

NOTE5: These lists are pretty good and very comprehensive, but not 100% world coverage. There's always something to be added.... This project is WIP and shall continue until the entire IPv4 address space is documented.

** As of 11th September 2024 the list officially reached over 2.2 billion IPv4 addresses. We had a little party.... **

Disclaimer; No warranty is given for any inaccuracies, loss of service or otherwise. The term IP and IPv4 are used interchangeably in this repo.

Also - see https://en.wikipedia.org/wiki/PeerGuardian