diagnose fortiguard ipblacklist
Use these commands to manage the FortiGuard IP blacklist:
diagnose fortiguard ipblacklist db View the versions for the database and vendor/reason list. diagnose fortiguard ipblacklist vr View the vendor/reason list. diagnose fortiguard ipblacklist ip <IPv4_address> View the information for the specified IP address. diagnose fortiguard ipblacklist ctx View the local context.
Example output
This is sample output of the diagnose fortiguard ipblacklist db command:
# diagnose fortiguard ipblacklist db
FortiGuard IP Blacklist Database and Vendor/Reason List Versions:
{
"db_ver": 65828,
"vrlist_ver": 65538
}
This is sample output of the diagnose fortiguard ipblacklist vr command:
# diagnose fortiguard ipblacklist vr
FortiGuard IP Blacklist Vendor/Reason:
{
"vrlist_ver": 65538,
"vendor_cnt": 5,
"reason_cnt": 4,
"vendor": [
{
"id": 1,
"name": "Fortinet"
},
{
"id": 2,
"name": "Spamhaus"
},
{
"id": 3,
"name": "Blocklist_de"
},
{
"id": 4,
"name": "Manitu"
},
{
"id": 5,
"name": "Antispam_imp_ch"
}
],
"reason": [
{
"id": 1,
"name": "Botnet_traffic"
},
{
"id": 2,
"name": "Malicious_traffic"
},
{
"id": 3,
"name": "Credential_harvesting"
},
{
"id": 4,
"name": "Spam_traffic"
}
]
}
This is sample output of the diagnose fortiguard ipblacklist ip command:
# diagnose fortiguard ipblacklist ip 185.26.182.85
FortiGuard IP Blacklist Info on 185.26.182.85:
{
"ip": "185.26.182.85",
"blacklisted": 0
}
This is sample output of the diagnose fortiguard ipblacklist ctx command:
# diagnose fortiguard ipblacklist ctx
FortiGuard IP Blacklist Local Context:
g_fg_ipbl_ctx=0x3c1f8d0
sock=8 tmo_millisec=10000 req_bdy: ip=0xb91ab655(185.26.182.85) proto_ver=16777216
rsp_bdy=0x3ad7930 vrrb=0x3c31840 buf_len=28
rsp_bdy:
ip=0xb91ab655(185.26.182.85) db_ver=65828 vrlist_ver=65538 count=0
vrrb:
vrlist_ver=65538 vendor_cnt=5 reason_cnt=4
vendor: id=1 name=[Fortinet]
vendor: id=2 name=[Spamhaus]
vendor: id=3 name=[Blocklist_de]
vendor: id=4 name=[Manitu]
vendor: id=5 name=[Antispam_imp_ch]
reason: id=1 name=[Botnet_traffic]
reason: id=2 name=[Malicious_traffic]
reason: id=3 name=[Credential_harvesting]
reason: id=4 name=[Spam_traffic]