Geo-Recon : An OSINT CLI Tool Desgined To Fast Track IP Reputation

Geo-Recon is an OSINT CLI tool designed to fast track IP Reputation and Geo-locaton look up for Security Analysts.

Setup

This tool is compactible with:

  • Any Linux Operating System (Debian, Ubuntu, CentOS)
  • Termux

Linux Setup

git clone https://github.com/radioactivetobi/geo-recon.git
cd geo-recon
chmod +x geo-recon.py
pip install -r requirements.txt

Termux Setup

git clone https://github.com/radioactivetobi/geo-recon.git
cd geo-recon
chmod +x geo-recon.py
pip install -r requirements.txt

Sample Syntax Linux

root@kali:~/geo-recon# python geo-recon.py 138.121.128.19

{*}Running Geo-location Check Against 138.121.128.19

Country: Brazil
Region: Piaui
City: Teresina
Organization: Itech Telecom
ISP: Itech Telecom

{*}Geo-IP Lookup Complete!!!

Running Reputation Check Against 138.121.128.19
Domain: “redeitechtelecom.com.br”
Hostname: []
Usage Type: “Fixed Line ISP”
Confidence of Abuse: 100
Number Times of Reported: 982
Last Reported: “2020-08-21T16:43:12+00:00”
Whitelisted: false

The IP Address 138.121.128.19 Is Malicious and well known for SSH Bruteforce Attacks

IP Reputation Look up Complete!!!

Sample Syntax Termux

$ python2 geo-recon.py 138.121.128.19

{*}Running Geo-location Check Against 138.121.128.19
Country: Brazil
Region: Piaui
City: Teresina
Organization: Itech Telecom
ISP: Itech Telecom

{*}Geo-IP Lookup Complete!!!

{*}Running Reputation Check Against 138.121.128.19

Domain: “redeitechtelecom.com.br”
Hostname: []
Usage Type: “Fixed Line ISP”
Confidence of Abuse: 100
Number Times of Reported: 982
Last Reported: “2020-08-21T16:43:12+00:00”
Whitelisted: false

The IP Address 138.121.128.19 Is Malicious and well known for SSH Bruteforce Attacks

IP Reputation Look up Complete!!!

To Do List

  • Include Longitude & Latitude For Geo-IP Lookup
  • Fix API
R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago