Motivation I thought I would share this simple method of monitoring a number of conditions, that could reasonably be considered nefarious activity of a bad actor, trying to gain access to a resource in your network, such as an HTTP(S) server. Trying to find a reputable list of IPs associated with p...