Serp07/updater_list_for_mikrotik

GitHub: Serp07/updater_list_for_mikrotik

为MikroTik路由器提供自动更新的IP黑名单,聚合多个威胁情报源帮助用户在防火墙层面拦截已知恶意连接。

Stars: 6 | Forks: 1

updater_list_for_mikrotik 最近提交 (main) updater_list_for_mikrotik 许可证 [![required RouterOS version](https://img.shields.io/badge/RouterOS-7.xx-yellow?style=flat)](https://mikrotik.com/download/changelupdater_list_for_mikrotik 最近提交 updater_list_for_mikrotik 许可证 [![所需 RouterOS 版本](https://img.shields.io/badge/RouterOS-7.xx-yellow?style=flat)](https://mikrotik.com/download/changelogs/) [![所需 RouterOS 版本](https://img.shields.io/badge/RouterOS-6.xx-yellow?style=flat)](https://mikrotik.com/download/changelogs/) # MikroTik 自动更新地址列表 ### 问题 当你提供对服务的公共访问时,要区分恶意连接和正常连接可能会相当困难。 ### 解决方案 MikroTik 借助地址列表(address lists)来解决此问题……只需将恶意地址放入列表并阻止列表中的所有内容。听起来很有趣对吧……或者也许并非如此?当然,你可以(也应该)手动创建规则来检测滥用行为并动态创建列表……但是你还可以做更多,你可以订阅由其他人维护的列表,如 Spamhaus、dshield 等, ### 解析列表示例 由 Serp07 生成于 2024-02-24 01:59:30 /ip firewall address-list add list=blacklist address=1.4.0.0/17 comment=SpamHaus add list=blacklist address=1.10.16.0/20 comment=SpamHaus add list=blacklist address=1.116.0.0/14 comment=SpamHaus ... ### 实现方式 实现起来非常简单……将以下代码粘贴到任何 MikroTik 的终端中,你的路由器就会获取最新版本的脚本文件并定期运行它。 ### [适用于 RouterOs v6.xx ](updater_list_script_for_v6.xx.rsc) ``` /system scheduler add comment="Apply combined List" interval=1d name=Update_combined on-event=Updater_List policy=\ ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon start-date=feb/24/2024 start-time=20:08:41 /system script add dont-require-permissions=no name=Updater_List owner=admin policy=\ ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/tool fetch url=\"https://raw.githubusercontent.co\ m/Serp07/updater_list_for_mikrotik/main/combined.rsc\" mode=https dst-path=combined.rsc;\ \n\r\ \n\r\ \n:log info \"Downloaded autoaddresslist from github/Serp07 \";\r\ \n\r\ \n/ip firewall address-list remove [find where comment=\"Auto_address_List\"];\r\ \n/ip firewall address-list remove [find where comment=\"Bruteforce_Blocker\"];\r\ \n\ \n\r\ \n:log info \"Removed old autoaddresslist records and imported new list\";\r\ \n\ \n\r\ \n/import file-name=combined.rsc;\r\ \n\r\ \n#/file/remove combined.rsc" /ip firewall filter add action=drop chain=input comment="Drop new connections from blacklisted IP's to this router" connection-state=new \ in-interface=ether1 in-interface-list=WAN src-address-list=blacklist ``` ### [适用于 RouterOs v7.xx ](updater_list_script_for_v7.xx.rsc) ``` /system scheduler add comment="Apply combined List" interval=1d name=Update_combined on-event=\ Updater_List policy=\ ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon \ start-date=2024-02-24 start-time=15:50:16 /system script add dont-require-permissions=no name=Updater_List owner=admin policy=\ ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/tool/fetch url=\"https://raw.githubuserc\ ontent.com/Serp07/updater_list_for_mikrotik/main/combined.rsc\" mode=https dst-path=combined.rsc;\ \n\r\ \n:log info \"Downloaded autoaddresslist from github/Serp07 \";\r\ \n/ip/firewall/address-list/remove [find where comment=\"Auto_address_List\"&\"Bruteforce_Blocker\"]\ \n/import file-name=combined.rsc;\r\ \n\ \n:log info \"Removed old autoaddresslist records and imported new list\";\r\ \n\ \n#/file/remove combined.rsc" /ip firewall filter add action=drop chain=input comment="Drop new connections from blacklisted IP's to this router" connection-state=new \ in-interface=ether1 in-interface-list=WAN src-address-list=blacklist ``` 以下操作不会阻止任何内容,它只会将 IP 添加到你的地址列表中。你仍然需要创建一条防火墙规则,匹配 `src-address-list=blacklist` 并在你的 input 和/或 forward 链中丢弃流量。 为了使用以下任何列表,你需要在 input 或 forward 链中添加类似以下的规则: add chain=input action=drop comment="Drop new connections from blacklisted IP's to this router" \ connection-state=new src-address-list=blacklist in-interface=ether1-Internet # 结果 ![](https://static.pigsec.cn/wp-content/uploads/repos/2026/04/25f581c510210945.png)
标签:DShield, IP 地址批量处理, IP黑名单, MikroTik, RouterOS, Spamhaus, Streamlit, 地址列表, 威胁情报, 开发者工具, 恶意IP拦截, 数字取证, 系统调度, 网络安全, 自动化脚本, 访问控制, 路由器配置, 运维自动化, 防火墙, 隐私保护