Replies: 9 comments 15 replies
-
@bretmac according to the guy at hackerfactor.com (Neil Krawetz I think?), stretchoid is probably a chinese operation, and I tend to agree with him. I also have an AbuseIPDB integration offering here (#223) , and endorse others to set up their own, working solutions. Btw from my daily repo updates, I saw some updates to stretchoid hosts, just not to the main stretchoid.txt file. This repo is subject to move anyways (#224), but I'd like to have a place where we can have all the necessary IP lists in a freely available manner, unlike crowdsec and/or abuseipdb does it. As suggested, a server where the generated artifacts (txt formatted ip lists) are available, would be nice. |
Beta Was this translation helpful? Give feedback.
-
Yes, I have to purge old records. Thanks for noticing this |
Beta Was this translation helpful? Give feedback.
-
Thank you, I have to add some automations to better update the IPs that are scanned |
Beta Was this translation helpful? Give feedback.
-
These Stretchoid pests are now using Microsoft addresses azpdss35.stretchoid.com [20.118.71.186] They are two examples seen in the last 24 hours. Reverse lookup also suggests they have IPv6 addresses too, |
Beta Was this translation helpful? Give feedback.
-
Another MS offender today: 104.40.84.168 |
Beta Was this translation helpful? Give feedback.
-
There are over 1,100 MS addresses I've discovered (so far) 4.246.247.29 azpdeg1.stretchoid.com |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
https://security.wdes.eu/scan/tasks https://security.wdes.eu/scanners/stretchoid To be continued, work in progress |
Beta Was this translation helpful? Give feedback.
-
Hey, so I see files disappeared from the repo: Do you plan to re-add these somewhere else? I had to adjust my firewall config because it didn't load seeing the files disappeared. |
Beta Was this translation helpful? Give feedback.
-
I really love the work going on here, I found this resource today after my concerns.
There is something very smelly about stretchoid and a few other "security research" organisations. This is a faceless organisation that is scanning the internet on a massive scale. Totally anonymous with no research published, or commercial offering. I am treating them as a malicious actor and blocking them wherever possible. Possibly state funded, who knows?
Looking at your stretchoid.txt file do you concur that these machines move around? By my reckoning about 1700 reverse DNS entries exist in Digital Ocean today with *.stretchoid.com PTR records. Scans that hit my SMTP server appear to send "MGLNDD_{ip}_{port}" after they connect. Connections definitely hit both TCP port 25 and 587. (Possibly others, but I am not monitoring this since they are blocked upstream of my servers). Only IPv4 activity has been observed.
Seriously though, 1,700 machines and the organisation does not have a face?
Your stretchoid.txt file seems way out of date. About 1300 of those entries no longer resolve to stretchoid PTR records. 80 or so resolve to new PTR records that a clearly other customers and the rest don't return anything for a PTR.
Every entry that I have found today also exists in your stretchoid.txt file, apart from these few:
Also - your censys.txt is out of date - they have recently added more ranges.
I'll likely work on a custom solution for my systems but this is very nice work you are doing here.
Beta Was this translation helpful? Give feedback.
All reactions