- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Protect your environment against all those internet IoT port scanners / web crawlers that scan your network devices to collect all kind of data. Simply create a drop rule and put it on the beginning of your security policy. Create a network group for each of these scanners and fill it with the data listed below.
Supported scanners:
Sample rule:
Group contents:
.census1.shodan.io.census2.shodan.io.census3.shodan.io.census4.shodan.io.census5.shodan.io.census6.shodan.io.census7.shodan.io.census8.shodan.io.census9.shodan.io.census10.shodan.io.census11.shodan.io.census12.shodan.io.atlantic.census.shodan.io.pacific.census.shodan.io.rim.census.shodan.io.m247.ro.shodan.io.pirate.census.shodan.io.ninja.census.shodan.io.border.census.shodan.io.burger.census.shodan.io.house.census.shodan.io.mason.census.shodan.io.turtle.census.shodan.io.goldfish.census.shodan.io.flower.census.shodan.io.dojo.census.shodan.io.cloud.census.shodan.io.sky.census.shodan.io.inspire.census.shodan.io.battery.census.shodan.io74.120.14.0/24162.142.125.0/24167.248.133.0/24192.35.168.0/2364.62.202.96/2766.220.23.112/2974.82.47.0/26184.105.139.64/26184.105.143.128/26184.105.247.192/26216.218.206.64/26141.212.0.0/16144.86.173.0/24Additional info:
Adding such a drop rule on top of your access control rulebase helps raising the baseline security level of your overall firewall security policy. Other free methods to raise it even more are:
Nice one Danny!
Great work Danny.
Would have been nice if Check Point could add those hosts as dynamic objects so it would be automatically updated when any of the scanners changes ip subnets
@Kim_Moberg the best way to request this is to add a feedback note to sk173416.
Citing from the SK:
Can I suggest to support a specific service as an Updatable object?
Suggestions for additional Updatable objects can be submitted in the "Give us Feedback" section of the SecureKnowledge article, with the relevant information that will be rendered by R&D (who is responsible for adding new updatable objects). The most common suggestions will get highest priority:
- Service name
- Link to public content maintained by the vendor
- Is it currently used in my policy?
Censys has different and more IPs listed to Opt-Out as per,
https://support.censys.io/hc/en-us/articles/360043177092-Opt-Out-of-Scanning
Thank you for this post, and I used it to create a rule on my firewall to block the traffic, but can I ask why the individual urls for shodan? Could we just block .shodan.io and get all of them?
Because FQDN Domain Objects cannot be used with wildcards.
You could put shodan.io into a Custom Threat Intel feed (ioc_feeds command) or in a Network Feed object (R81.20 and above).
@Terri_Hawkins use of wildcard-FQDN objects as source or destination will result in massive performance degrading, because of the needed DNS reverse lookups. See Traffic latency through Security Gateway when Access Control Policy contains non-FQDN Domain objects
Thank you both very much. I believe I have some work to do on some of my rules now. 🙂
Good afternoon
Will these rules work if we have implied rules where ports 80,443,264,18264 are allowed?
As far as I know implied rules come before firewall rules.
Thanks
How are these implied rules defined?
Protect your environment against all those internet IoT port scanners / web crawlers that scan your network devices to collect all kind of data. Simply create a drop rule and put it on the beginning of your security policy. Create a network group for each of these scanners and fill it with the data listed below.
Supported scanners:
Sample rule:
Group contents:
.census1.shodan.io.census2.shodan.io.census3.shodan.io.census4.shodan.io.census5.shodan.io.census6.shodan.io.census7.shodan.io.census8.shodan.io.census9.shodan.io.census10.shodan.io.census11.shodan.io.census12.shodan.io.atlantic.census.shodan.io.pacific.census.shodan.io.rim.census.shodan.io.m247.ro.shodan.io.pirate.census.shodan.io.ninja.census.shodan.io.border.census.shodan.io.burger.census.shodan.ioLeaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 25 | |
| 12 | |
| 9 | |
| 7 | |
| 6 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 3 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY