crontab this on your webserver then create a custom pfblocker-ng ip list pointed to this file.
Code: Select all
0 */6 * * * whois -h whois.radb.net -- '-i origin AS32934' | grep 'route:' | awk '{print substr($0, 17)}' > /ip_generator/ip_facebook.txt
5 */6 * * * whois -h whois.radb.net -- '-i origin AS15169' | grep 'route:' | awk '{print substr($0, 17)}' > /ip_generator/ip_google.txt
10 */6 * * * whois -h whois.radb.net -- '-i origin AS57976' | grep 'route:' | awk '{print substr($0, 17)}' > /ip_generator/ip_blizzard.txt
15 */6 * * * whois -h whois.radb.net -- '-i origin AS22697' | grep 'route:' | awk '{print substr($0, 17)}' > /ip_generator/ip_roblox1.txt
20 */6 * * * whois -h whois.radb.net -- '-i origin AS22697' | grep 'route:' | awk '{print substr($0, 17)}' > /ip_generator/ip_roblox2.txt
25 */6 * * * whois -h whois.radb.net -- '-i origin AS16509' | grep 'route:' | awk '{print substr($0, 17)}' > /ip_generator/ip_amazon.txt
30 */6 * * * whois -h whois.radb.net -- '-i origin AS32590' | grep 'route:' | awk '{print substr($0, 17)}' > /ip_generator/ip_valve.txt
35 */6 * * * whois -h whois.radb.net -- '-i origin AS57021' | grep 'route:' | awk '{print substr($0, 17)}' > /ip_generator/ip_NTP.txt