-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
8 changed files
with
577 additions
and
31 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
name: Release Steampipe Anywhere Components | ||
|
||
on: | ||
push: | ||
tags: | ||
- 'v*' | ||
|
||
|
||
jobs: | ||
anywhere_publish_workflow: | ||
uses: turbot/steampipe-workflows/.github/workflows/steampipe-anywhere.yml@main | ||
secrets: inherit |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,16 +1,35 @@ | ||
# Table: abuseipdb_category | ||
--- | ||
title: "Steampipe Table: abuseipdb_category - Query AbuseIPDB Categories using SQL" | ||
description: "Allows users to query AbuseIPDB Categories, specifically to retrieve details about the categories of IP addresses reported for abusive behavior." | ||
--- | ||
|
||
Abuse categories used in reports. | ||
# Table: abuseipdb_category - Query AbuseIPDB Categories using SQL | ||
|
||
AbuseIPDB is a service that allows users to report and check IP addresses for known malicious activity. It categorizes IP addresses based on the types of abuse reported, such as fraud orders, DDoS attacks, spam emails, etc. This categorization helps in identifying the nature of the threat posed by a particular IP address. | ||
|
||
## Table Usage Guide | ||
|
||
The `abuseipdb_category` table provides insights into the categories of IP addresses reported for abusive behavior in the AbuseIPDB. As a security analyst, explore category-specific details through this table, including the types of abuse associated with each category. Utilize it to enhance your understanding of the threat landscape and to aid in decision-making for threat mitigation strategies. | ||
|
||
## Examples | ||
|
||
### List the categories | ||
Explore all the categories available in the AbuseIPDB to understand the types of abusive behavior that are tracked, allowing for more efficient and targeted security measures. | ||
|
||
```sql | ||
```sql+postgres | ||
select | ||
* | ||
from | ||
abuseipdb_category | ||
order by | ||
id | ||
id; | ||
``` | ||
|
||
```sql+sqlite | ||
select | ||
* | ||
from | ||
abuseipdb_category | ||
order by | ||
id; | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,31 +1,56 @@ | ||
# Table: abuseipdb_deny | ||
--- | ||
title: "Steampipe Table: abuseipdb_deny - Query AbuseIPDB Denylists using SQL" | ||
description: "Allows users to query AbuseIPDB Denylists, specifically the IP addresses that have been reported for abusive activities, providing insights into potential security threats." | ||
--- | ||
|
||
List IPs with an abuse confidence score above a minimum. This list is often | ||
used as a deny list of IPs. | ||
# Table: abuseipdb_deny - Query AbuseIPDB Denylists using SQL | ||
|
||
Notes: | ||
AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet. Its primary function is to provide a platform for internet service providers, network administrators, and other interested parties to share and access data about abusive IP addresses. It aids in the identification of sources of malicious activities and helps in implementing preventive measures. | ||
|
||
## Table Usage Guide | ||
|
||
The `abuseipdb_deny` table provides insights into IP addresses that have been reported for abusive activities on the AbuseIPDB platform. As a network administrator or security analyst, explore details about these IP addresses through this table, including their abuse confidence score, country of origin, and associated reports. Utilize it to uncover information about potential security threats, such as those from known malicious sources, for effective threat intelligence and preventive measures. | ||
|
||
**Important Notes** | ||
- If not specified, the default `confidence_minimum` is 90. | ||
- The free tier limit is 5 requests per day. | ||
|
||
## Examples | ||
|
||
### Basic deny list (default confidence minimum of 90) | ||
Explore which IP addresses are considered malicious based on a default confidence score of 90 or above. This helps in enhancing your network's security by blocking potentially harmful traffic. | ||
|
||
```sql | ||
```sql+postgres | ||
select | ||
* | ||
from | ||
abuseipdb_deny | ||
abuseipdb_deny; | ||
``` | ||
|
||
```sql+sqlite | ||
select | ||
* | ||
from | ||
abuseipdb_deny; | ||
``` | ||
|
||
### List IPs with a confidence minimum of 95 | ||
Discover the segments that have a high confidence level of 95, allowing you to focus on the most reliable data for your security analysis. This is particularly useful when you need to prioritize actions based on the degree of certainty in the data. | ||
|
||
```sql | ||
```sql+postgres | ||
select | ||
* | ||
from | ||
abuseipdb_deny | ||
where | ||
confidence_minimum = 95 | ||
confidence_minimum = 95; | ||
``` | ||
|
||
```sql+sqlite | ||
select | ||
* | ||
from | ||
abuseipdb_deny | ||
where | ||
confidence_minimum = 95; | ||
``` |