Forum Discussion

jlsantini's avatar
Icon for Altocumulus rankAltocumulus
May 09, 2024

Reliable resources for identifying IP addresses

Hello! I'm a project manager responsible for the WAF implementation in my organization.  Aside from overseeing the implementation, I'm in the trenches, so to speak, with the everyday care and feedin...
  • F5_Design_Engineer's avatar
    May 10, 2024

    Hi @jlsantini,


    What i understand from your write up, i am probably trying to translate into the technical requirements you are looking for a feature that can be use to IP intelligence, here what i can suggest you find more details about these 2 features in F5 ASM/WAF and how to implement them mentioned below

    All these topics when implement properly will address your identifying IP address related queries and help you offload your manual task for matching IP address using excel sheet, which is not a viable solution when you can harness the features like below in F5 ASM. 

    1. IP Intelligence. - Detect malicious activity and IP addresses with help from a global threat-sensor network and IP intelligence database. Enable granular threat reporting and. To implement IPI there are some prerequisites as follows: IPI license; A user with admin privileges; BIG-IP must have internet connectivity


    2. Geolocation - F5 BIG-IP supports two types of IP geolocation databases: Edge and Pulse. The Edge database is based on IP traffic data, while the Pulse database uses information from mobile devices and Wi-Fi connection points. The Pulse database is more accurate, but also larger in file size, so F5 doesn't support city level for it.

    F5 updates the IP geolocation database every Tuesday based on new databases created by Digital Element each week. F5 recommends keeping geolocation up to date because IPs can change countries. 

    To download and install updated IP geolocation database files on a BIG-IP system, users can:
    Go to the GeoLocationUpdates container on the MyF5 Downloads site
    Download the updated files

    Install the files on the BIG-IP system 

    Users can check if the IP geolocation database files on the BIG-IP system are up-to-date by following the procedure in K12866: Troubleshooting IP geolocation database inaccuracies. 

    F5's geolocation feature can also capture a device's latitude by using the device's address. 


    IP Intelligence Categories

    Reference: IP Intelligence Categories

    Category Name Description
    Spam Sources IP addresses tunneling spam messages through proxy, anomalous SMTP activities and forum spam activities.
    Windows Exploits Active IP addresses that have exercised various exploits against Windows resources by offering or distributing malware, shell code, rootkits, worms, or viruses using browsers, programs, downloaded files, scripts, or operating system vulnerabilities.
    Web Attacks IP addresses involved in cross site scripting, iFrame injection, SQL injection, cross domain injection, or domain password brute force.
    Botnets IP addresses of computers that are infected with malicious software (Botnet Command and Control channels, and infected zombie machines) and are controlled as a group by a Bot master, and are now part of a botnet. Hackers can exploit botnets to send spam messages, launch various attacks, or cause target systems to behave in other unpredictable ways.
    Scanners IP addresses that are involved in reconnaissance, such as probes, host scan, domain scan, and password brute force, typically to identify vulnerabilities for later exploits.
    Denial of Service IP addresses involved in application DoS Attacks, or anomalous traffic detection.
    Infected Sources Active IP addresses that issue HTTP requests with a low reputation index score, or that are known malicious web sites offering or distributing malware, shell code, rootkits, worms, or viruses.
    Phishing Proxies IP addresses that host phishing sites, and other kinds of fraud activities, such as ad click fraud or gaming fraud.
    Anonymous Proxy IP addresses that are associated with web proxies that shield the originator's IP address (such as proxy and anonymization services).
    Cloud-based Services IP addresses and networks that are used by cloud providers.
    Mobile Threats IP addresses of malicious and unwanted mobile applications.
    Tor Proxies IP addresses acting as exit nodes for the Tor Network. Exit nodes are the last point along the proxy chain and make a direct connection to the originator’s intended destination.


    Here are some reference web links i am sharing go through them and once you find if it matches to your requirement, please feel free and please come back with more queries for helping in any particular scenario.

    I will be glad to assist you further.


    Initially you can go through these reference

    Module 1: IPI & Geolocation

    Module 1: IPI & Geolocation (

    Add a Geolocation Policy

    Lab 2 - Add a Geolocation Policy (

    Configuring geolocation enforcement using BIG-IP ASM security policy (


    Looking up IP geolocation data using the geoip_lookup command


    IP Intelligence Policies

    Lab 1 - IP Intelligence Policies (

    The Power of IP Intelligence (IPI)

    Managing IP reputations and the IP Address Intelligence database


    Please rate or mark it as solution in case this address your queries regarding manual IP address checking to feature rich IP intelligence and geolocation-based ASM policy inclusiveness.

    That will be helpful for others reading this blog.