Schemata

If you are in need of a schema which is not mentioned here, or if you want to change an existing schema, please make a proposal to the mailinglist or have a look at the github repository.

Login-Attack

This schema is specially defined for all kinds of abusive login attacks.
Schema: http://www.x-arf.org/schema/abuse_login-attack_0.1.2.json
(Example: http://www.x-arf.org/examples/ssh-report.txt | .eml-File)

Malware-Attack

A report for an abusive attack carried out by a malware.
Schema: http://www.x-arf.org/schema/abuse_malware-attack_0.1.4.json
(Example: http://www.x-arf.org/examples/malware-attack-report.txt)

Fraud (Phishing, etc.)

A report schema which can be used to report different kinds of fraud.
Schema: http://www.x-arf.org/schema/fraud_0.1.4.json
(Example: http://www.x-arf.org/examples/fraud-report.txt | .eml-File)

Info DNSBL

A report schema for informational report about an ip address which is
(de-)listed on a dnsbl.
Schema: http://www.x-arf.org/schema/info_dnsbl_0.1.0.json