-
-
Notifications
You must be signed in to change notification settings - Fork 9
Tons of Stretchoid IP ranges missing? #251
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi! Yes they are a real cancer, and more it goes more I think that I need to build bash reporters.
Would you adhere to such a reporting system? |
FYI, I currently use AbuseIPDB and this is how I obtained my IP list so far. I just discovered your project and I had a look at your Stretchoid IP list and this is what made me post this thread, just to point out that there are a lot more Stretchoid IP address ranges than what you have gathered so far. Maybe we should merge our lists together. I also have a huge list of other Internet "cancers" such as 3xK Tech GmbH scanners, Digital Ocean scanners, Alibaba Cloud scanners and many, many more. |
I would be very glad to have your help! for vendors not changing too often you can add lists here https://github.com/wdes/security/tree/main/data/collections I have to push my recent work on modernizing the code for different detections |
This is what I have so far that is 100% labelled as Stretchoid, but I have a lot more from Microsoft IP addresses that I suspect are Stretchoid, but are not officially labelled Stretchoid just yet (but maybe they will over the next few weeks, not sure). 4.151.38.0/24 # 2024-12-29 - Microsoft (stretchoid.com) |
How do you suspect an IP? |
Seems like stretchoid was kicked out of Digital Ocean and lives in AS8075. You could get a list of stretchoid IP ranges from Alienvault. # Get API KEY from https://otx.alienvault.com/settings
curl -H "X-OTX-API-KEY: $API_KEY" "https://otx.alienvault.com/api/v1/indicators/domain/stretchoid.com/passive_dns" > stretchoid.json
cat stretchoid.json | jq -r '."passive_dns"[]."address" | select(test("^\\d{1,3}(\\.\\d{1,3}){3}$")) | (split(".") | .[0:3] + ["0"] | join("."))' | sort -Vu |
A couple more new ones for you guys. Stay safe out there. 20.15.163.0/24 # 2025-05-23 - Microsoft (stretchoid.com) For those interested, I also literally just stumbled upon the following list, which seems to actively be kept up to date and it looks like they already have all the IP addresses that I have ever been scanned from, so this is legit: https://github.com/MDMCK10/internet-scanners/blob/main/strechoid.nft |
Hi, just posting this to try to help the security community. You are missing lots of Stretchoid IP ranges in https://security.wdes.eu/scanners/stretchoid.txt
I stopped comparing with my list very early on at the 4.0.0.0/16 range, but here are a few examples of what you're missing and I'm sure there are thousands more...
4.236.187.0/24 # 2025-03-15 - Microsoft (stretchoid.com)
4.236.188.0/24 # 2025-03-15 - Microsoft (stretchoid.com)
4.236.189.0/24 # 2025-03-15 - Microsoft (stretchoid.com)
4.236.190.0/24 # 2025-03-05 - Microsoft (stretchoid.com)
4.236.191.0/24 # 2025-04-04 - Microsoft (stretchoid.com)
4.246.227.0/24 # 2025-03-15 - Microsoft (stretchoid.com)
4.246.228.0/24 # 2025-03-15 - Microsoft (stretchoid.com)
I'm not posting this to blame you. Stretchoid is a real Internet cancer and I hope that the more they get blocked, the more their mysterious and anonymous "research project" ends.
The text was updated successfully, but these errors were encountered: