Skip to content

Commit 32cb8b4

Browse files
committed
fixup
1 parent 0b14d29 commit 32cb8b4

File tree

1 file changed

+4
-6
lines changed

1 file changed

+4
-6
lines changed

crowdsec-docs/unversioned/cti_api/taxonomy/classifications.mdx

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ export const exclude = ["scanner:"]
2323

2424
<GithubIconRender url={classificationsURL}></GithubIconRender>
2525

26-
Classification of Threat Intelligence follows the format “cateogry:name”, where category is a broad type of of classification encapsulating different elements.
26+
Classification of Threat Intelligence follows the format “cateogry:name”, where category is a broad type of classification encapsulating different elements.
2727
A summary of the main classification category is provided below, and you can use the search bar in the table to filter the classification you are looking for.
2828

2929
## Hosts Malware
@@ -39,18 +39,16 @@ A type of classification that relates to the exposed services on the machine. Ex
3939
## AI Crawler
4040

4141
AI Company using crawlers to index the data used to train Large Language Models. Such companies (OpenAPI, ByteDance, Anthropic ... ) are heavy consumers of the internet bandwidth and result in a large amount of traffic.
42-
They can be directly consumed inside a specialized blocklist available [here](https://app.crowdsec.net/blocklists/67b3524151bbde7a12b60be0)
42+
They can be directly consumed inside a specialized blocklist available [here](https://app.crowdsec.net/blocklists/67b3524151bbde7a12b60be0).
4343
## AI Search
4444
AI Search engines that are used by users to search the internet. They are coming from an AI agent, and are not used directly to train the AI models compared to the AI crawlers category. But the results is the same in terms of traffic load, as they can be part of an automation workflow
45+
IPs can be directly consumed inside a specialized blocklist available [here](https://app.crowdsec.net/blocklists/67b3524151bbde7a12b60be0).
4546

46-
#### Notes: They can be directly consumed inside a specialized blocklist available [here](https://app.crowdsec.net/blocklists/67b3524151bbde7a12b60be0)
4747
## Device
4848
The IP is associated with a device having known security weaknesses.
4949

5050
## Proxy
51-
Hosts identified as proxies based on the services they expose and/or their behaviour.
52-
53-
They can be directly consumed inside a specialized blocklist available [here](https://app.crowdsec.net/blocklists/65a56839ec04bcd4f51670be)
51+
Hosts identified as proxies based on the services they expose and/or their behaviour. IPs be directly consumed inside a specialized blocklist available [here](https://app.crowdsec.net/blocklists/65a56839ec04bcd4f51670be)
5452
## Cohorts [Experimental]
5553
Cohorts are groups of machines seen attacking in a coordinated fashion. IPs belonging to the same cohort or cluster have been seen to exhibit a new behaviour in a synchronised manner, such as starting to exploit a known vulnerability at the same time.
5654
You can explore the IPs of a cluster using the CTI search query and the `classifications.classifications.label` : [query example](https://app.crowdsec.net/cti?q=classifications.classifications.label%3A%22Attacker+Group%3A+Bold+Peachpuff+Euphonia%22&page=1).

0 commit comments

Comments
 (0)