Spamhaus DROP lists are essential tools in the fight against IP hijacking. These lists consist of IP addresses exploited by organizations for malicious purposes, such as distributing malware, controlling botnets, or executing other forms of cybercrime. The service enables IPv4 address owners to report their hijacked IPs, effectively preventing these bad actors from announcing their presence in BGP.
The Don’t Route or Peer Protection List is provided these free of charge, and designed to enhance internet security. As part of the Spamhaus Blocklist (SBL), DROP lists safeguard all internet protocols, including web traffic. Tailored for Tier-1 and backbone providers, these lists filter out malicious traffic through advanced firewalls and routing equipment.
Thorough investigations and forensic analyses confirm control by cybercrime groups or “bulletproof” hosting providers before IP address subnets are added to the DROP lists. With the depletion of IPv4 addresses, assignments have become increasingly dynamic, often overseen by trusted facilitators like Brander Group. Cybercriminals frequently alter ASNs and corporate identities to evade detection, necessitating daily updates to DROP lists to monitor these evasive IP hijacking tactics.
How DROP Lists Work
Free DROP datasets are readily available in JSON format, allowing seamless integration across various devices and software capable of processing IP networks. This includes DNS resolvers, firewalls, network gateways, and web proxies.
Types of DROP Lists:
- DROP: drop 4v json
- DROPv6: drop v6 json
- ASN-DROP: asn-drop json
It’s crucial to acknowledge that while text files are still in use, they will eventually be phased out. Spamhaus will proactively inform the community well in advance to facilitate planning.
Advantages of DROP Lists
The primary benefit of DROP lists is their ability to expel IP hijackers from their designated address spaces. These lists provide up-to-date defenses against a range of malicious activities, including spam, ransomware encryption, DNS hijacking, exploitation attempts, authentication attacks, data harvesting, and DDoS attacks.
Additionally, DROP lists offer automatic safeguards that promptly sever infected devices’ communication with adversaries utilizing “bulletproof hosting” on listed networks. This infrastructure-level protection is vital, as users often remain unaware of existing threats. The dataset boasts high reliability, ensuring that legitimate IPv4 addresses are not mistakenly included, thereby minimizing false positives. IP addresses routed by legitimate network operators will never appear on the list, thanks to the trust and confidence embedded in our dataset.
Spamhaus DROP Access is Complimentary
Spamhaus asserts that the critical nature of DROP list data necessitates free access, regardless of an organization’s size or business model, to protect the internet as a whole. We do request that when this data is utilized within a product, appropriate credit is given to the Spamhaus Project, ensuring that the date and © text remain intact with the file and data.
Organizations seeking a commercially-focused solution that includes data on compromised communities and dedicated botnet C&C listings can use Spamhaus Technology. For inquiries, please contact our team at info@brandergroup.net.
Removing from DROP Lists
Ranges listed in DROP are linked to their respective Spamhaus Blocklist (SBL) records referenced in the DROP files. Once the SBL record is removed, the associated ranges will be automatically excluded from DROP. For further details on removals, visit the SBL page.
IP addresses within DROP are directly connected to the corresponding Spamhaus Blocklist (SBL) records. After the SBL record removal, these IP addresses will automatically be delisted from DROP. For more information on removal procedures, check the SBL page.