- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hey boys and girls,
Happy Friday! Figured would share this, as its super useful, specially for anyone who is not running AV or AB blades on the firewall to block known bad IPs out there. All you do is create new network feed (can only be tested if running R81.20) and then those can be used to block the traffic from those feeds. There are 8 of them and all you do is replace number 1-8 in the link below:
Github link -> https://github.com/stamparm/ipsum
feed example -> https://raw.githubusercontent.com/stamparm/ipsum/master/levels/1.txt
You can create 8 separate network feeds, simply keep replacing numbers sequentially, 1 to 8.
Thanks @delToro1 for sharing this in my other IOC post.
I set it up in my Azure lab and so far, got 140K hits in less than 1 day, that is super impressive even though its Azure, but I got no hosts behind the fw in that lab at all.
Example:
Thanks a bunch as well to Miroslav Stampar for creating this.
https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt
IMPORTANT NOTE:
PLEASE DONT USE EMERG AND SAMPARM FEED 1 TO BEGIN WITH, since I had few customers having issues with those feeds. Samparm 2-8 are fine, no issues.
Best,
Andy
Nice one!
Thank you 🙂
Btw, just added all 8 feeds to see how many IP addresses were there, showed 234,909 all together, not bad 🙂
Andy
So cool!! 😉
Absolutely!
Just to add, I also found below, which probably has millions of bad IP addresses, as it contains LOTS of /16 subnets. I did a search and saw there was 131 entries for /16, so right there thats 8.5 million, plus remaining /21,/22,/23,/17 etc...would not be surprised its close to 15 M all together.
https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt
Best,
Andy
@the_rock What is the result if the feed in question on your block rule contains no entries at all (i.e. the feed source becomes empty and the previous cached files on the GW is cleared)? Does it result in no matches and therefore nothing will hit it? More fearful of some situation where it starts blocking more than it should be 🙂
I noticed one in my lab with no entries, but had not seen any such issues as of yet, what you described.
Andy
One thing I will say though, as a word of caution, though those feeds block BUNCH of bad IPs, but it could happen that something is blocked inadvertently where people may need access to the cloud portal. In my experience, its not often, but there is a chance for it.
Andy
https://support.checkpoint.com/results/sk/sk132193
"
...
IP Allow List (Exception List)
The IP whitelist provides a convenient way to allow certain IP addresses to bypass the enforcement actions, that have been defined by threat intelligence feeds.
This document provides instructions for managing IP addresses within the IP white list, also known as the IP exception list.
vi $FWDIR/conf/ip_whitelist.eng
Add the desired IP addresses, one per line.
Ensure you save the file after adding the IP addresses.
Exemption from Enforcement: IP addresses listed in the $FWDIR/conf/ip_whitelist.eng file will not be subject to enforcement actions even if they appear in any of the threat intelligence feeds.
…
“
Question:
Besides that, IMHO information about "IP Allow list" could be included on the Admin Guide, like here (or close) for instance: https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_ThreatPrevention_AdminGuide/...
Best regards,
The file is 100% on the mgmt server. Does it get auto updated? Im not so sure about that as per sk. Syntax is simply one IP per line, as mask will always be /32 anyway.
Andy
I believe this guide specifically addresses IoC feeds. Since network feeds are set within regular access drop rules, you only need to create an additional allow rule above it with the relevant objects to serve as an 'exception'.
Thats true, but I wanted to point out with emerg feed, around 15M ip addeesses, its hard to know what should be exempted, unless 100% certain. Im confident stamparm feeds 2-8 are good, no issues. Not saying other 2 are bad, but they do cause cpu/connectivity problems.
Andy
Hey Andy,
Did you create the Network Feed objects as globals or strictly local (Generic DC Obj do that)?
Hey everyone,
I know this post is almost year old, but I feel its important to highlight something. I had customer tell me recently they used emerg feed below and it caused issues on their network, so just a word of caution, maybe do NOT use it in the beginning, since it has about 15.5 M IP addresses, so can definitely cause problems. Safe to use other 8.
To be precise, number of IPs is 15,455,886
Andy
https://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt
15 million IPs is a bit beyond what we tested for Network Feeds (2 million).
Possible that has something to do with it.
I think so too.
Andy
Hello
Is the “Network Feed” a feature of Management or Firewall?
I am implementing a Linux server that will serve as a “source” to feed a daily list of IPs with a bad reputation, but I wonder if this feature is characteristic of SMS/MDS or GW, because I want to know if the main connectivity that my server should have should be against the administration manager or against the FW?
Thank you
Hey bro,
Technically, its mgmt feature, but it applies to the firewalls. Just make sure that server sits behind the firewall itself.
Andy
The source IP will be the gateway VIP which has the network feed installed on it. I just tested it this week.
It has a Management component, for example the Network Feed object in SmartConsole, but it is primarily a Security Gateway (Firewall) feature, since the Security Gateway is the one that holds all the IP addresses.
Hello, @Tal_Paz-Fridman
So, the important thing is that the server has connectivity with the Security Gateway?
Or would you recommend that connectivity be both with the SMS/MDS and with the SG?
Thank you.
As stated in the link I gave, mostly the Security Gateway but if you want to "view" the most updated information about the Network Object in SmartConsole the SMS/MDS should also have access.
Latest update. Below link also contains some great stuff for IOC.
Nice weekend everyone 🙂
Andy
https://github.com/Bert-JanP/Open-Source-Threat-Intel-Feeds?tab=readme-ov-file
I got this running in my lab and shot up my CPU to 90% - had to get rid of it.
Just remove emerg one and samparm 1, others are fine.
Andy
This is super useful info too, since @PhoneBoy mentioned 2 million entries is the limit currently, and emerg net feed has more less, about 15 M entries, so definitely way more than officially supported. Not sure why stamparm 1 feed is causing issues for people, since its less than 200K entried, but we had one customer use stamparm 2-8 feeds and in 4-5 days, they had almost 10M hits, so definitely working well. For the context, I had a customer do this while ago, they are smaller hospital, and they told me in a week, there was almost 100M hits, compated to few thousands with manual IPs they were adding before doing net feeds.
Best,
Andy
Hey guys,
Quick update...thanks to @Matlu , adding one more feed.This one has BUNCH of sub-feeds inside it.
Andy
Hey, Bro.
In the “extreme” case that the IP I'm looking for, I can't find it in any of the FQDN Domain .txt options https://lists.blocklist.de/
I guess the alternative, in that case, would be to manually “add” that IP in a new blocking rule?
Cheers.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
16 | |
11 | |
8 | |
7 | |
6 | |
6 | |
5 | |
4 | |
4 | |
3 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY