Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
cyberluke365
Contributor
Jump to solution

IoC feeds on R81.20

Hello,
I'm opening this topic to better understand the Threat Prevention Indicators and their implementation on R81.20 (6600 appliance).

Basically, I'd like to implement IoC feeds from following two:

Spamhaus (https://www.spamhaus.org/drop/drop.txt)

The list contains IP address ranges:

; Spamhaus DROP List 2025/11/06 - (c) 2025 The Spamhaus Project SLU
; https://www.spamhaus.org/drop/drop.txt
; Last-Modified: Thu, 06 Nov 2025 20:14:41 GMT
; Expires: Thu, 06 Nov 2025 21:17:12 GMT
1.10.16.0/20 ; SBL256894
1.19.0.0/16 ; SBL434604
1.32.128.0/18 ; SBL286275
2.56.192.0/22 ; SBL459831
2.57.122.0/24 ; SBL636050
2.57.232.0/23 ; SBL538946
2.57.234.0/23 ; SBL538947
...

[A] - Based on its format, I would configure the IoC with the following settings:

  • Format: Custom CSV
  • Data Type: IP Range
  • Data Column: 1
  • Delimiter: Space
  • Ignore lines with prefix: ;

[B] - Check Point detects 1,487 indicators (or more precisely, rows). While reviewing the indicators provided by Spamhaus, I noticed that about 111 rows contain /16 IP ranges. That means that just these 111 rows represent a total of 7,274,496 IP addresses - quite a huge number!

DShield (https://www.dshield.org/block.txt).

This list is shorter than the one provided by Spamhaus, but it contains IP ranges expressed in a different format:

#    Columns (tab delimited):
#
#    (1) start of netblock  
#    (2) end of netblock
#    (3) subnet (/24 for class C)
#    (4) number of targets scanned
#    (5) name of Network 
#    (6) Country
#    (7) contact email address
#
#    If a range is assigned to multiple users, the first one is listed. 
#     
206.168.34.0	206.168.34.255	24	305	-	-	-
78.128.114.0	78.128.114.255	24	298	TAMATIYA-AS	BG	noc@4vendeta.com
146.88.241.0	146.88.241.255	24	298	ARBOR	US	hostmaster@arbor.net
65.49.1.0	65.49.1.255	24	295	HURRICANE	US	abuse@he.net
...

[C] - Based on its format, I would configure the IoC with the following settings:

  • Format: Custom CSV
  • Data Type: IP Range
  • Data Column: 2
  • Delimiter: Space
  • Ignore lines with prefix: Hash (#)

Check Point detects 20 indicators (or more precisely, rows)

Questions:

1. From the $FWDIR/log/ioc_feeder.elg log, I noticed that Check Point seems to "translate" IP address ranges into single IP addresses and then adds them into the database:

2022 4107868032]@MYFIREWALL[6 Nov 11:45:28] IOCIPAndRangeFastHandler[235] ::saveIPToFile: [INFO]  insert add ip  209.95.89.121
[2022 4107868032]@MYFIREWALL[6 Nov 11:45:28] IOCIPAndRangeFastHandler[235] ::saveIPToFile: [INFO]  insert add ip  209.95.89.120
[2022 4107868032]@MYFIREWALL[6 Nov 11:45:28] IOCIPAndRangeFastHandler[235] ::saveIPToFile: [INFO]  insert add ip  209.95.89.119
[2022 4107868032]@MYFIREWALL[6 Nov 11:45:28] IOCIPAndRangeFastHandler[235] ::saveIPToFile: [INFO]  insert add ip  209.95.89.118
[2022 4107868032]@MYFIREWALL[6 Nov 11:45:28] IOCIPAndRangeFastHandler[235] ::saveIPToFile: [INFO]  insert add ip  209.95.89.117
[2022 4107868032]@MYFIREWALL[6 Nov 11:45:28] IOCIPAndRangeFastHandler[235] ::saveIPToFile: [INFO]  insert add ip  209.95.89.116
[2022 4107868032]@MYFIREWALL[6 Nov 11:45:28] IOCIPAndRangeFastHandler[235] ::saveIPToFile: [INFO]  insert add ip  209.95.89.115
[2022 4107868032]@MYFIREWALL[6 Nov 11:45:28] IOCIPAndRangeFastHandler[235] ::saveIPToFile: [INFO]  insert add ip  209.95.89.114
[2022 4107868032]@MYFIREWALL[6 Nov 11:45:28] IOCIPAndRangeFastHandler[235] ::saveIPToFile: [INFO]  insert add ip  209.95.89.113
...

Is that correct ?

2. Could you please confirm if my IoC parameters are correct for Spamhaus IoCs - ref. [A] ?

3. Is Check Point able to handle such a large number of IP addresses - ref. [B] ?
I'm asking because, while implementing these IoC feeds, I noticed high CPU usage by the ioc_feeds process, which results in low performance and network issues affecting all end-users clients.

4. Could you please confirm if my IoC parameters are correct for DShield IoCs - ref. [C] ?

Any thought would be much appreciated.

Thank you.

0 Kudos
1 Solution

Accepted Solutions
the_rock
MVP Platinum
MVP Platinum

All your assumptions are correct. Here is my personal suggestion...I would NOT include any list that contains so many subnets that amount to millions of single IPs. I had that issue by implementing network feeds. To be on the safe side, you can try them later on, because there could be many IP addresses that can be inadvertently blocked that need to be allowed.

Rerference below about my post related to network feeds.

https://community.checkpoint.com/t5/Security-Gateways/Network-feed/m-p/212407#M40317

Best,
Andy

View solution in original post

3 Replies
the_rock
MVP Platinum
MVP Platinum

All your assumptions are correct. Here is my personal suggestion...I would NOT include any list that contains so many subnets that amount to millions of single IPs. I had that issue by implementing network feeds. To be on the safe side, you can try them later on, because there could be many IP addresses that can be inadvertently blocked that need to be allowed.

Rerference below about my post related to network feeds.

https://community.checkpoint.com/t5/Security-Gateways/Network-feed/m-p/212407#M40317

Best,
Andy
cyberluke365
Contributor

Hello @the_rock,

thank you for useful information.
I implemented SAMPARM IoC(s) from 2 to 8.

Thank you.

the_rock
MVP Platinum
MVP Platinum

Glad we can help mate.

Best,
Andy
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events