<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is the maximum IOC feed range? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/229537#M44201</link>
    <description>&lt;P&gt;Is the 2 million limit referring to the number of characters or the number of lines?&lt;/P&gt;</description>
    <pubDate>Sun, 13 Oct 2024 18:27:12 GMT</pubDate>
    <dc:creator>SubZer0</dc:creator>
    <dc:date>2024-10-13T18:27:12Z</dc:date>
    <item>
      <title>What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/173888#M31607</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;We're getting some error that have gone by unnoticed for possibly a long time in the IOC_Feeder.elg:&lt;/P&gt;&lt;P&gt;observable[1044] ::span_indicator_range: [ERROR] range is to wide, addr count is: 4096, skip 206.209.192.0-206.209.207.255&lt;/P&gt;&lt;P&gt;This is just one of 60 lines in that log file that fails for that same error ranging in size from 4000 to 1000000 hosts. All the other lines work just fine and are being parsed without a problem.&lt;/P&gt;&lt;P&gt;So my question is what is the maximum range that can be given? And why is it maxed either way?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;sk132193 gives no information about the max amount of hosts.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;B&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 14:33:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/173888#M31607</guid>
      <dc:creator>Pachango</dc:creator>
      <dc:date>2023-03-07T14:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/173927#M31621</link>
      <description>&lt;P&gt;There are some limits to the number of observables we support in releases prior to R81.20.&lt;BR /&gt;Unfortunately, it’s difficult to provide an exact number due to the number of other things that leverage the same infrastructure.&lt;BR /&gt;I suspect this “limit” on ranges is related to this limitation.&lt;/P&gt;
&lt;P&gt;In R81.20, we’ve changed the mechanism so it uses different infrastructure that is faster to boot.&lt;BR /&gt;We can also state a definitive limit: 2 million observables.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 20:23:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/173927#M31621</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-07T20:23:06Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174005#M31643</link>
      <description>&lt;P&gt;Thank you for the information! However there doesn't seem to be an issue with the amount of observables but with the amount of hosts in an observable. Or am i wrong in my understanding?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 09:39:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174005#M31643</guid>
      <dc:creator>Pachango</dc:creator>
      <dc:date>2023-03-08T09:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174018#M31644</link>
      <description>&lt;P&gt;I believe you are correct.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 11:41:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174018#M31644</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-08T11:41:29Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174021#M31646</link>
      <description>&lt;P&gt;Hey PhoneBoy,&lt;/P&gt;&lt;P&gt;I can't read from your answer if the range issue is fixed in r81.20.&lt;/P&gt;&lt;P&gt;And besides, will the range fix be available in r81.10&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Henrik&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 12:43:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174021#M31646</guid>
      <dc:creator>Henrik_Noerr1</dc:creator>
      <dc:date>2023-03-08T12:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174031#M31647</link>
      <description>&lt;P&gt;I guess I'll have to open a TAC case with RND support than probably to get this sorted out? Seems weird that the amount of hosts would be capped as other CP products have experience with handling large ranges with no problem...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 13:34:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174031#M31647</guid>
      <dc:creator>Pachango</dc:creator>
      <dc:date>2023-03-08T13:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174032#M31648</link>
      <description>&lt;P&gt;I think thats probably your best bet, see if they can provide something official for you.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 13:37:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174032#M31648</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-08T13:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174067#M31649</link>
      <description>&lt;P&gt;To get the precise reason these limits are being encountered, your best best is to work with TAC.&lt;BR /&gt;My guess (and it's only that) is that the range of IPs is being turned into something bigger that would exceed the limits of the underlying infrastructure.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 16:26:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174067#M31649</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-08T16:26:32Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174070#M31650</link>
      <description>&lt;P&gt;Since I didn't know for certain, I created an IOC file that looks like:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;; Test file&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;206.209.192.0-206.209.207.255 ; test&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;172.16.0.0-172.31.255.255 ; test2&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;I then imported it into R81.20 with:&amp;nbsp;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ioc_feeds add --feed_name test_ip_feed --transport local_file --resource "/home/admin/test.csv" --format [value:1,type:ip] --delimiter ";" --comment ";"&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The import succeeded, telling me: 1052672 IPv4 addresses loaded.&lt;BR /&gt;That leads me to believe this issue either doesn't exist in R81.20, or the limit is much higher.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The likely reason for this limit in R81.10 and earlier is due to the underlying infrastructure used.&lt;BR /&gt;We've addressed this in R81.20 with new infrastructure that is far more scalable and performant to the task at hand.&lt;BR /&gt;Generally, new infrastructure isn't backported to earlier releases.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 17:40:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174070#M31650</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-08T17:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174073#M31652</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just tested on my R81.20 mgmt server and all I get is below:&lt;/P&gt;
&lt;P&gt;Feed Name: test_ip_feed&lt;BR /&gt;Feed is Active&lt;BR /&gt;File is locally on the Gateway&lt;BR /&gt;Path: /home/admin/ioc.csv&lt;BR /&gt;Action: Prevent&lt;BR /&gt;Feed is cli managed&lt;/P&gt;
&lt;P&gt;Fetching active feeds&lt;/P&gt;
&lt;P&gt;Update summary&lt;BR /&gt;##############&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 18:03:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174073#M31652</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-08T18:03:18Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174078#M31653</link>
      <description>&lt;P&gt;Why cant you user fwaccel dos deny -l feature? Its far better and faster than to block using ioc_feeds&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 18:34:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174078#M31653</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2023-03-08T18:34:14Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174080#M31655</link>
      <description>&lt;P&gt;That command is meant to be executed on the Security Gateway (not the management).&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 18:37:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174080#M31655</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-08T18:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174082#M31656</link>
      <description>&lt;P&gt;I also did do it on the gateway, but got exact same result.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 18:38:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174082#M31656</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-08T18:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174084#M31657</link>
      <description>&lt;P&gt;Interesting point.&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1551"&gt;@Blason_R&lt;/a&gt;&amp;nbsp;...so just wondering. Say you navigate to that dir $FWDIR/conf/deny_list and create a file called blocked_ips.txt and literally input single line in it (just a s tupid example)&lt;/P&gt;
&lt;P&gt;say line containing below:&lt;/P&gt;
&lt;P&gt;205.50.0.0-205.78.0.255&lt;/P&gt;
&lt;P&gt;Are you saying by executing command fwaccel dos deny -l or -L, it would load the range )ranges indicated) and you simply need to push policy to the fw and thats it? Or no policy push needed?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 18:41:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174084#M31657</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-08T18:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174086#M31658</link>
      <description>&lt;P&gt;Its pretty much possible if that is used to cprid_util command from mgmt. This is the way I am doing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even ioc_feeds needs to be executed from gateway.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 18:43:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174086#M31658</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2023-03-08T18:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174087#M31659</link>
      <description>&lt;P&gt;The problem with using this command directly is you can't just "import a file" to change the rules.&lt;BR /&gt;Besides, at least in R81.20, it's using the same mechanism as fwaccel dos.&lt;/P&gt;
&lt;P&gt;See below:&lt;/P&gt;
&lt;PRE&gt;[Expert@R8120S:0]# &lt;STRONG&gt;fwaccel dos stats get&lt;/STRONG&gt;

Firewall Instances in Aggregate:
    Memory Usage:                      0
    Total Active Connections:  (FW connection limiting inactive)
    New Connections/Second:    (FW connection limiting inactive)
    Number of Elements in Tables:
        Penalty Box Violating IPs:                     0
        Rate Limit Source Only Tracks:                 0
        Rate Limit Source and Service Tracks:          0
        Rate Limit Dest Only Tracks:                   0
        Rate Limit Dest and Service Tracks:            0

SecureXL:
    Memory Usage:                      0
    Packets/Second:                    (rate limiting inactive)
    Bytes/Second:                      (rate limiting inactive)
    Reasons Packets Dropped:
        IP Fragment:          0
        IP Option:            0
        Penalty Box:          0
        Deny List:            0
        Rate Limit:           0
    Number of Elements in Tables:
        Penalty Box:                                   0
        Non-Empty Deny Lists:                          1
        Deny List IPs:                           1052672
        Rate Limit Matches:                            0
        Rate Limit Source Only Tracks:                 0
        Rate Limit Source and Service Tracks:          0
        Rate Limit Dest Only Tracks:                   0
        Rate Limit Dest and Service Tracks:            0
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 18:48:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174087#M31659</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-08T18:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174088#M31660</link>
      <description>&lt;P&gt;There is no need to install the policy at all since the IPs get blocked at sxl level; just import the text file and you are done. With little bit of automation and bash scripting you can block millions of IP addresses at one go without even pushing or creating objects.&lt;BR /&gt;&lt;BR /&gt;I guess ioc_feeds block the IP addresses much lower in a chain while fwaccel dos deny knocks the packet off in first 3 chain&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 18:57:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174088#M31660</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2023-03-08T18:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174089#M31661</link>
      <description>&lt;P&gt;You can import the file with -l option&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 18:57:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174089#M31661</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2023-03-08T18:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174090#M31662</link>
      <description>&lt;P&gt;Thanks! Will give it a go.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 18:59:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174090#M31662</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-08T18:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: What is the maximum IOC feed range?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174093#M31663</link>
      <description>&lt;P&gt;I actually did ioc_feeds add commands from the below sk and output was the same, so Im guessing its probably due to the fact I dont have av/ab blades enabled and its VM, but not sure. I dont have access to actual physical CP appliance to test this theory. Does not show me number of entries, which would be nice to see &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk132193" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk132193&lt;/A&gt;&lt;/P&gt;
&lt;H2 id="Known feeds examples"&gt;Known feeds examples (using the Custom CSV feature)&lt;/H2&gt;
&lt;TABLE class="footnote" border="1" width="878px" cellspacing="2" cellpadding="4"&gt;
&lt;TBODY&gt;
&lt;TR class="SubTitle" bgcolor="#d6dff0"&gt;
&lt;TD width="96.9062px"&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="362.953px"&gt;&lt;STRONG&gt;URL&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="417.141px"&gt;&lt;STRONG&gt;Command Line&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="96.9062px"&gt;Alienvault IP Reputation&lt;/TD&gt;
&lt;TD width="362.953px"&gt;&lt;A href="http://reputation.alienvault.com/reputation.data" target="_blank" rel="noopener"&gt;http://reputation.alienvault.com/reputation.data&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="417.141px"&gt;&lt;EM&gt;ioc_feeds add --feed_name reputation --transport http --resource "&lt;A href="http://reputation.alienvault.com/reputation.data" target="_blank" rel="noopener"&gt;http://reputation.alienvault.com/reputation.data&lt;/A&gt;" --format [type:ip,value:#1,comment:#4] --delimiter "#"&lt;/EM&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="96.9062px"&gt;Domains&lt;/TD&gt;
&lt;TD width="362.953px"&gt;&lt;A href="https://www.botvrij.eu/data/ioclist.hostname.raw" target="_blank" rel="noopener"&gt;https://www.botvrij.eu/data/ioclist.hostname.raw&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="417.141px"&gt;&lt;EM&gt;ioc_feeds add --feed_name domains --transport https --resource "&lt;A href="https://www.botvrij.eu/data/ioclist.hostname.raw" target="_blank" rel="noopener"&gt;https://www.botvrij.eu/data/ioclist.hostname.raw&lt;/A&gt;" --format [type:domain,value:#1]&lt;/EM&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="96.9062px"&gt;IPs&lt;/TD&gt;
&lt;TD width="362.953px"&gt;&lt;A href="https://sslbl.abuse.ch/blacklist/sslipblacklist.csv" target="_blank" rel="noopener"&gt;https://sslbl.abuse.ch/blacklist/sslipblacklist.csv&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="417.141px"&gt;&lt;EM&gt;ioc_feeds add --feed_name ips --transport https --resource "&lt;A href="https://sslbl.abuse.ch/blacklist/sslipblacklist.csv" target="_blank" rel="noopener"&gt;https://sslbl.abuse.ch/blacklist/sslipblacklist.csv&lt;/A&gt;" --format [type:ip,value:#2] --comment [#] --delimiter ","&lt;/EM&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="96.9062px"&gt;Talos IP Blacklist&lt;/TD&gt;
&lt;TD width="362.953px"&gt;&lt;A href="http://www.talosintelligence.com/documents/ip-blacklist" target="_blank" rel="noopener"&gt;http://www.talosintelligence.com/documents/ip-blacklist&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="417.141px"&gt;&lt;EM&gt;ioc_feeds add --feed_name ip_blacklist --transport https --resource "&lt;A href="https://www.talosintelligence.com/documents/ip-blacklist" target="_blank" rel="noopener"&gt;https://www.talosintelligence.com/documents/ip-blacklist&lt;/A&gt;" --format [type:ip,value:#1]&lt;/EM&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="96.9062px"&gt;Spam List&lt;/TD&gt;
&lt;TD width="362.953px"&gt;&lt;A href="http://www.ipspamlist.com/public_feeds.csv" target="_blank" rel="noopener"&gt;http://www.ipspamlist.com/public_feeds.csv&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="417.141px"&gt;&lt;EM&gt;ioc_feeds add --feed_name spam_list --transport https --resource "&lt;A href="https://www.ipspamlist.com/public_feeds.csv" target="_blank" rel="noopener"&gt;https://www.ipspamlist.com/public_feeds.csv&lt;/A&gt;" --format [type:ip,value:#3,comment:#4] --comment ["#", "first_seen"] --delimiter ","&lt;/EM&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="96.9062px"&gt;Cybercrime hash list&lt;/TD&gt;
&lt;TD width="362.953px"&gt;&lt;A href="http://cybercrime-tracker.net/ccamlist.php" target="_blank" rel="noopener"&gt;http://cybercrime-tracker.net/ccamlist.php&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="417.141px"&gt;
&lt;P&gt;&lt;EM&gt;ioc_feeds add --feed_name hash_list --transport http --resource "&lt;A href="http://cybercrime-tracker.net/ccamlist.php" target="_blank" rel="noopener"&gt;http://cybercrime-tracker.net/ccamlist.php&lt;/A&gt;" --format [type:sha1,value:#1]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;[Expert@quantum-firewall:0]# ioc_feeds add --feed_name reputation --transport http --resource "&lt;A href="http://reputation.alienvault.com/reputation.data" target="_blank" rel="noopener"&gt;http://reputation.alienvault.com/reputation.data&lt;/A&gt;" --format [type:ip,value:#1,comment:#4] --delimiter "#"&lt;BR /&gt;start add&lt;BR /&gt;HTTP url feed transport is insecure and not recommended. Please consider using only url feeds with HTTPS transport.&lt;BR /&gt;Default value for active is: true&lt;BR /&gt;Default value for feed_action is: prevent&lt;BR /&gt;Feed reputation will add on&lt;/P&gt;
&lt;P&gt;Feed Name: reputation&lt;BR /&gt;Feed is Active&lt;BR /&gt;File will be fetched via HTTP&lt;BR /&gt;Resource: &lt;A href="http://reputation.alienvault.com/reputation.data" target="_blank" rel="noopener"&gt;http://reputation.alienvault.com/reputation.data&lt;/A&gt;&lt;BR /&gt;Action: Prevent&lt;BR /&gt;Feed is cli managed&lt;/P&gt;
&lt;P&gt;Fetching active feeds&lt;/P&gt;
&lt;P&gt;Update summary&lt;BR /&gt;##############&lt;/P&gt;
&lt;P&gt;[Expert@quantum-firewall:0]# ioc_feeds add --feed_name domains --transport https --resource "&lt;A href="https://www.botvrij.eu/data/ioclist.hostname.raw" target="_blank" rel="noopener"&gt;https://www.botvrij.eu/data/ioclist.hostname.raw&lt;/A&gt;" --format [type:domain,value:#1]&lt;BR /&gt;start add&lt;BR /&gt;Default value for active is: true&lt;BR /&gt;Default value for feed_action is: prevent&lt;BR /&gt;Feed domains will add on&lt;/P&gt;
&lt;P&gt;Feed Name: domains&lt;BR /&gt;Feed is Active&lt;BR /&gt;File will be fetched via HTTPS&lt;BR /&gt;Resource: &lt;A href="https://www.botvrij.eu/data/ioclist.hostname.raw" target="_blank" rel="noopener"&gt;https://www.botvrij.eu/data/ioclist.hostname.raw&lt;/A&gt;&lt;BR /&gt;Action: Prevent&lt;BR /&gt;Feed is cli managed&lt;/P&gt;
&lt;P&gt;'proxy'&lt;BR /&gt;SHA256 Fingerprint=F7:02:33:19:BB:93:D4:83:88:21:42:03:9B:11:62:7F:4C:88:DB:17:0B:84:66:B2:E5:90:CB:D2:B5:8C:80:AE&lt;/P&gt;
&lt;P&gt;Do you trust the server &lt;A href="http://www.botvrij.eu" target="_blank" rel="noopener"&gt;www.botvrij.eu&lt;/A&gt; public certificate? [y/n]: y&lt;BR /&gt;Fetching active feeds&lt;/P&gt;
&lt;P&gt;Update summary&lt;BR /&gt;##############&lt;/P&gt;
&lt;P&gt;[Expert@quantum-firewall:0]# ioc_feeds add --feed_name ips --transport https --resource "&lt;A href="https://sslbl.abuse.ch/blacklist/sslipblacklist.csv" target="_blank" rel="noopener"&gt;https://sslbl.abuse.ch/blacklist/sslipblacklist.csv&lt;/A&gt;" --format [type:ip,value:#2] --comment [#] --delimiter ","&lt;BR /&gt;start add&lt;BR /&gt;Default value for active is: true&lt;BR /&gt;Default value for feed_action is: prevent&lt;BR /&gt;Feed ips will add on&lt;/P&gt;
&lt;P&gt;Feed Name: ips&lt;BR /&gt;Feed is Active&lt;BR /&gt;File will be fetched via HTTPS&lt;BR /&gt;Resource: &lt;A href="https://sslbl.abuse.ch/blacklist/sslipblacklist.csv" target="_blank" rel="noopener"&gt;https://sslbl.abuse.ch/blacklist/sslipblacklist.csv&lt;/A&gt;&lt;BR /&gt;Action: Prevent&lt;BR /&gt;Feed is cli managed&lt;/P&gt;
&lt;P&gt;'proxy'&lt;BR /&gt;SHA256 Fingerprint=16:8F:8D:D7:CD:C1:1D:AF:CB:85:54:79:20:09:42:29:29:2C:AA:BA:13:9E:34:AC:4E:20:EE:CE:4B:0E:9E:50&lt;/P&gt;
&lt;P&gt;Do you trust the server sslbl.abuse.ch public certificate? [y/n]: y&lt;BR /&gt;Fetching active feeds&lt;/P&gt;
&lt;P&gt;Update summary&lt;BR /&gt;##############&lt;/P&gt;
&lt;P&gt;[Expert@quantum-firewall:0]# ioc_feeds add --feed_name ip_blacklist --transport https --resource "&lt;A href="https://www.talosintelligence.com/documents/ip-blacklist" target="_blank" rel="noopener"&gt;https://www.talosintelligence.com/documents/ip-blacklist&lt;/A&gt;" --format [type:ip,value:#1]&lt;BR /&gt;start add&lt;BR /&gt;Default value for active is: true&lt;BR /&gt;Default value for feed_action is: prevent&lt;BR /&gt;Feed ip_blacklist will add on&lt;/P&gt;
&lt;P&gt;Feed Name: ip_blacklist&lt;BR /&gt;Feed is Active&lt;BR /&gt;File will be fetched via HTTPS&lt;BR /&gt;Resource: &lt;A href="https://www.talosintelligence.com/documents/ip-blacklist" target="_blank" rel="noopener"&gt;https://www.talosintelligence.com/documents/ip-blacklist&lt;/A&gt;&lt;BR /&gt;Action: Prevent&lt;BR /&gt;Feed is cli managed&lt;/P&gt;
&lt;P&gt;'proxy'&lt;BR /&gt;SHA256 Fingerprint=64:BF:71:2E:6F:DA:8D:6A:37:24:8F:44:57:91:38:2E:E8:14:A3:E3:4E:32:18:9C:B5:B3:DE:83:80:D4:C9:2B&lt;/P&gt;
&lt;P&gt;Do you trust the server &lt;A href="http://www.talosintelligence.com" target="_blank" rel="noopener"&gt;www.talosintelligence.com&lt;/A&gt; public certificate? [y/n]: y&lt;BR /&gt;Fetching active feeds&lt;/P&gt;
&lt;P&gt;Update summary&lt;BR /&gt;##############&lt;/P&gt;
&lt;P&gt;[Expert@quantum-firewall:0]# ioc_feeds add --feed_name spam_list --transport https --resource "&lt;A href="https://www.ipspamlist.com/public_feeds.csv" target="_blank" rel="noopener"&gt;https://www.ipspamlist.com/public_feeds.csv&lt;/A&gt;" --format [type:ip,value:#3,comment:#4] --comment ["#", "first_seen"] --delimiter ","&lt;BR /&gt;start add&lt;BR /&gt;Default value for active is: true&lt;BR /&gt;Default value for feed_action is: prevent&lt;BR /&gt;Feed spam_list will add on&lt;/P&gt;
&lt;P&gt;Feed Name: spam_list&lt;BR /&gt;Feed is Active&lt;BR /&gt;File will be fetched via HTTPS&lt;BR /&gt;Resource: &lt;A href="https://www.ipspamlist.com/public_feeds.csv" target="_blank" rel="noopener"&gt;https://www.ipspamlist.com/public_feeds.csv&lt;/A&gt;&lt;BR /&gt;Action: Prevent&lt;BR /&gt;Feed is cli managed&lt;/P&gt;
&lt;P&gt;'proxy'&lt;BR /&gt;SHA256 Fingerprint=80:43:D6:EC:5E:8F:A6:E6:00:E2:A4:E0:55:96:9D:16:43:89:35:A9:11:B7:5D:4C:17:65:9B:DD:36:79:9B:2B&lt;/P&gt;
&lt;P&gt;Do you trust the server &lt;A href="http://www.ipspamlist.com" target="_blank" rel="noopener"&gt;www.ipspamlist.com&lt;/A&gt; public certificate? [y/n]: y&lt;BR /&gt;Fetching active feeds&lt;/P&gt;
&lt;P&gt;Update summary&lt;BR /&gt;##############&lt;/P&gt;
&lt;P&gt;[Expert@quantum-firewall:0]# ioc_feeds add --feed_name hash_list --transport http --resource "&lt;A href="http://cybercrime-tracker.net/ccamlist.php" target="_blank" rel="noopener"&gt;http://cybercrime-tracker.net/ccamlist.php&lt;/A&gt;" --format [type:sha1,value:#1]&lt;BR /&gt;start add&lt;BR /&gt;HTTP url feed transport is insecure and not recommended. Please consider using only url feeds with HTTPS transport.&lt;BR /&gt;Default value for active is: true&lt;BR /&gt;Default value for feed_action is: prevent&lt;BR /&gt;Feed hash_list will add on&lt;/P&gt;
&lt;P&gt;Feed Name: hash_list&lt;BR /&gt;Feed is Active&lt;BR /&gt;File will be fetched via HTTP&lt;BR /&gt;Resource: &lt;A href="http://cybercrime-tracker.net/ccamlist.php" target="_blank" rel="noopener"&gt;http://cybercrime-tracker.net/ccamlist.php&lt;/A&gt;&lt;BR /&gt;Action: Prevent&lt;BR /&gt;Feed is cli managed&lt;/P&gt;
&lt;P&gt;Fetching active feeds&lt;/P&gt;
&lt;P&gt;Update summary&lt;BR /&gt;##############&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2023 20:42:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-the-maximum-IOC-feed-range/m-p/174093#M31663</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-08T20:42:00Z</dc:date>
    </item>
  </channel>
</rss>

