Skip to content

Commit 0b14d29

Browse files
committed
Formatting
1 parent eb92cc3 commit 0b14d29

File tree

1 file changed

+13
-8
lines changed

1 file changed

+13
-8
lines changed

crowdsec-docs/unversioned/cti_api/taxonomy/classifications.mdx

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -28,27 +28,32 @@ A summary of the main classification category is provided below, and you can use
2828

2929
## Hosts Malware
3030
Hosts identified as hosting live payloads associated with known malware families.
31-
Botnet
31+
## Botnet
3232
Hosts associated with known botnets, based on the exploited CVE(s) and the payload they spread (e.g. Mirai).
3333
## Profile
3434
A type of classification that relates to the exposed services on the machine. Examples:
35-
`profile:insecure_services`: IP exposing dangerous services (e.g. Telnet, RDP, etc.)
36-
`profile:fake_rdns`: IP reverse DNS doesn't resolve to the IP address
35+
36+
- `profile:insecure_services`: IP exposing dangerous services (e.g. Telnet, RDP, etc.)
37+
- `profile:fake_rdns`: IP reverse DNS doesn't resolve to the IP address
3738

3839
## AI Crawler
3940

40-
AI Company using crawlers to index the data used to train Large Language Models. Such companies are heavy consumers of the internet bandwidth and result in a large amount of traffic. The main companies categorized are Anthropic, OpenAI, Bitdance … They can be directly consumed inside a specialized blocklist available here
41-
AI Search
41+
AI Company using crawlers to index the data used to train Large Language Models. Such companies (OpenAPI, ByteDance, Anthropic ... ) are heavy consumers of the internet bandwidth and result in a large amount of traffic.
42+
They can be directly consumed inside a specialized blocklist available [here](https://app.crowdsec.net/blocklists/67b3524151bbde7a12b60be0)
43+
## AI Search
4244
AI Search engines that are used by users to search the internet. They are coming from an AI agent, and are not used directly to train the AI models compared to the AI crawlers category. But the results is the same in terms of traffic load, as they can be part of an automation workflow
4345

44-
#### Notes: They can be directly consumed inside a specialized blocklist available here
46+
#### Notes: They can be directly consumed inside a specialized blocklist available [here](https://app.crowdsec.net/blocklists/67b3524151bbde7a12b60be0)
4547
## Device
48+
The IP is associated with a device having known security weaknesses.
49+
4650
## Proxy
4751
Hosts identified as proxies based on the services they expose and/or their behaviour.
4852

49-
They can be directly consumed inside a specialized blocklist available here
53+
They can be directly consumed inside a specialized blocklist available [here](https://app.crowdsec.net/blocklists/65a56839ec04bcd4f51670be)
5054
## Cohorts [Experimental]
51-
Cohorts are groups of machines seen attacking in a coordinated fashion. IPs belonging to the same cohort or cluster have been seen to exhibit a new behaviour in a synchronised manner, such as starting to exploit a known vulnerability at the same time. You can explore the IPs of a cluster using the CTI search query and the classifications.classifications.label field, such as classifications.classifications.label:"Attacker Group: vigilant silver pelican"
55+
Cohorts are groups of machines seen attacking in a coordinated fashion. IPs belonging to the same cohort or cluster have been seen to exhibit a new behaviour in a synchronised manner, such as starting to exploit a known vulnerability at the same time.
56+
You can explore the IPs of a cluster using the CTI search query and the `classifications.classifications.label` : [query example](https://app.crowdsec.net/cti?q=classifications.classifications.label%3A%22Attacker+Group%3A+Bold+Peachpuff+Euphonia%22&page=1).
5257
The names of the clusters are auto-generated and do not imply any form of attribution.
5358
They are used by CTI teams to perform further investigation.
5459

0 commit comments

Comments
 (0)