List of IP addresses found here.
Found this program for our 2012 servers (or any RDP using TLS)
CyberArms Intrusion Detection and Defence System
After 3 failed login attempts, it would temporarily block the IP for 20 minutes. (Soft Lock)
After 10 login attempts, it would block the IP for 24 hours. (Hard lock)
-There is the option to hard lock the IP address forever.
1) No option to customized notification emails. -wanted to include
2) Cannot white-list a service provider only IP addresses.
3) No Response to inquiry about their products and licensing.
Since the program creates an event log for when it blocks the IP address, a PowerShell script was created to add firewall rules (permanent rules) and send email notifications out with detailed information.
The original PowerShell script just sent out emails with the server name when an event log with 4001 or 9001 is created in the "CyberArms" event log.
It worked great on our 2012 servers, however 2008 stored the Event log data with extra returns and spaces in the IP addresses. In testing it caused the local network to be blocked via firewall. Good thing it was a virtual machine and could still be access through Virtual Center.
Updated the PowerShell script to distinguish between 2008 and 2012 servers.
After the first weekend having to check each IP address and manually delete the rules got old and time consuming.
The next revision of the script added NSlookup to a ProviderLookup function in the script.
The ProviderLookup function was created to allow certain IP addresses or provider names (provided by NSLookup) to be unblocked automatically.
Example if NSlookup returned a provider name with "Domain.ca" in it, then we trusted it and the firewall was deleted.
Emails now include the IP address, the provider information and if the rule was deleted.
Install CyberArms software
Enable any security agents in CyberArms
Download PowerShell Script "CyberArms Eventlog Script.txt"
- Rename to .PS1 and change "DOMAIN.CA" and email settings.
Create Task Sequence to run the script when event 4001 or 9001 is logged.
Update - April 21, 2015
The ProviderLookup function will now include Country and ISP information extracted from http://ipaddress.com if it cannot find a DNS name for the IP address.
1) Create the same firewall rule on more that one server via PowerShell Array variable.
2) Create a pause between rule creation and rule deletion, just in case there was malicious intentions.
- probably use a ping command to 127.0.0.1 for 10 minutes then have it delete the rule.
3) Working on cleaning up the ProviderLookup function so that certain ISP names will be allowed.