<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Malicious requests from 65.154.226.XXX to our service in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/562390#M113912</link>
    <description>&lt;P&gt;Is there any defined IP subnet by palo alto for web crawling , if so sharing the same would really help alot.&lt;/P&gt;</description>
    <pubDate>Thu, 19 Oct 2023 10:44:37 GMT</pubDate>
    <dc:creator>Samson_Colaco</dc:creator>
    <dc:date>2023-10-19T10:44:37Z</dc:date>
    <item>
      <title>Malicious requests from 65.154.226.XXX to our service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/307790#M79919</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are hosting a cloud solution and we have identified a increased amount of malicious requests all originating from&amp;nbsp;&lt;SPAN&gt;65.154.226.XXX IP ranges. Most of them coming from&amp;nbsp;65.154.226.126, 65.154.226.220 and 65.154.226.100. It turns out these IPs originate from&amp;nbsp;paloaltonetworks.com, that is why I am posting it here.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;According to AbuseIPDB these IPs are being reported by users for abuse (see&amp;nbsp;&lt;A href="https://www.abuseipdb.com/check/65.154.226.100" target="_blank"&gt;https://www.abuseipdb.com/check/65.154.226.100&lt;/A&gt;), but AbuseIPDB itself is stating the IPs are whitelisted as being&amp;nbsp;typically owned by trusted entities, such as Google or Microsoft who may use them for search engine spiders. However, these same entities sometimes also provide cloud servers and mail services which are easily abused. Pay special attention when trusting or distrusting these IPs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Should we block all requests to our cloud service from the 65.154.226.XXX range?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SA&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 09:19:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/307790#M79919</guid>
      <dc:creator>SaSupNL</dc:creator>
      <dc:date>2020-01-24T09:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious requests from 65.154.226.XXX to our service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/307953#M79935</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Would this the PANURL scanning for updates?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 21:36:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/307953#M79935</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-01-24T21:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious requests from 65.154.226.XXX to our service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/308589#M80045</link>
      <description>&lt;P&gt;Those are the PAN-DB webcrawlers. I opened a case about this about a month ago.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 20:50:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/308589#M80045</guid>
      <dc:creator>DPoppleton</dc:creator>
      <dc:date>2020-01-29T20:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious requests from 65.154.226.XXX to our service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/562383#M113907</link>
      <description>&lt;P&gt;Any update on this?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 09:50:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/562383#M113907</guid>
      <dc:creator>Samson_Colaco</dc:creator>
      <dc:date>2023-10-19T09:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious requests from 65.154.226.XXX to our service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/562389#M113911</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/323798"&gt;@Samson_Colaco&lt;/a&gt;&amp;nbsp;,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As mentioned earlier these are webcrawlers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PAN-DB, uses automated systems to identify and categorize content on the internet. It has been observed that certain suspicious activity in some customer networks has caused the URL Filtering systems to look up IP addresses that are not recognized. To better understand these websites, automated programs, called crawlers are sent to visit the systems with those IP addresses.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;This scanning is harmless and does not pose any risk to the organization, this scanning is part of PANs normal operations and is done to ensure the security and effectiveness of our URL Filtering service.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 10:40:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/562389#M113911</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2023-10-19T10:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious requests from 65.154.226.XXX to our service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/562390#M113912</link>
      <description>&lt;P&gt;Is there any defined IP subnet by palo alto for web crawling , if so sharing the same would really help alot.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 10:44:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/562390#M113912</guid>
      <dc:creator>Samson_Colaco</dc:creator>
      <dc:date>2023-10-19T10:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious requests from 65.154.226.XXX to our service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/562407#M113917</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/323798"&gt;@Samson_Colaco&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm not aware of the specific IPs for webcrawling but the entire /24 seems to be assigned to PAN:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE id="registryData" class="df-raw"&gt;
NetRange:       65.154.226.0 - 65.154.226.255
CIDR:           65.154.226.0/24
NetName:        Q0123-65-154-226-0
NetHandle:      NET-65-154-226-0-1
Parent:         CENTURYLINK-LEGACY-QWEST-INET-18 (NET-65-128-0-0-1)
NetType:        Reassigned
OriginAS:       AS209
Organization:   PALO ALTO NETWORKS (PALOA)
RegDate:        2020-01-23
Updated:        2020-01-23
Ref:            https://rdap.arin.net/registry/ip/65.154.226.0
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kim.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 12:45:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-requests-from-65-154-226-xxx-to-our-service/m-p/562407#M113917</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2023-10-19T12:45:50Z</dc:date>
    </item>
  </channel>
</rss>

