Target Name |
Description |
drones |
IP addresses of Botnets used in DDoS attacks using various network protocols. Includes the Mirai and Reaper Botnets. |
memcached |
IP addresses of Memcached servces used in DDoS attacks |
ntp |
IP addresses running an unprotected NTP server, potentially used in reflection/amplication attacks |
resolvers |
IPs running an unprotected DNS resolvers, potentially used in DNS reflection/amplication attacks |
snmp |
IPs running an unprotected SNMP server, potentially used in SNMP reflection/amplication attacks |
ssdp |
IPs running an SSDP/UPnP server, potentially used in SSDP reflection/amplication attacks |
portmap |
IPs running a portmapper service subject to amplication attacks |
Predefined policies
The following predefined policies are available in your account:
ADC Systems
Name |
Description |
A10-ADC |
Targets the typical use cases for ADC devices |
ADC-ANONYMOUS |
Covers attempted communications with Anonymization services such as TOR |
ADC-BOTNETS |
Protects against communications with Command and Control devices and known members of botnets |
ADC-GENERAL |
Blocks attempted communications with a wide array of threats including Malware droppers and Botnets |
ADC-INBOUND |
Blocks inbound connections with suspected threat sources (not including DDoS) |
ADC-MALWARE |
Provides intelligence data about malware droppers |
ADC-VOIP |
Blocks connections targetting Voice Over Internet Protocol (VOIP) servers |
TPS Systems
Name |
Description |
A10-TPS |
Targets the typical uses cases for TPS devices |