Geo-Recon is an OSINT CLI tool designed to fast track IP Reputation and Geo-locaton look up for Security Analysts.
Setup
This tool is compactible with:
Linux Setup
git clone https://github.com/radioactivetobi/geo-recon.git
cd geo-recon
chmod +x geo-recon.py
pip install -r requirements.txt
Termux Setup
git clone https://github.com/radioactivetobi/geo-recon.git
cd geo-recon
chmod +x geo-recon.py
pip install -r requirements.txt
Sample Syntax Linux
root@kali:~/geo-recon# python geo-recon.py 138.121.128.19
{*}Running Geo-location Check Against 138.121.128.19
Country: Brazil
Region: Piaui
City: Teresina
Organization: Itech Telecom
ISP: Itech Telecom
{*}Geo-IP Lookup Complete!!!
Running Reputation Check Against 138.121.128.19
Domain: “redeitechtelecom.com.br”
Hostname: []
Usage Type: “Fixed Line ISP”
Confidence of Abuse: 100
Number Times of Reported: 982
Last Reported: “2020-08-21T16:43:12+00:00”
Whitelisted: false
The IP Address 138.121.128.19 Is Malicious and well known for SSH Bruteforce Attacks
IP Reputation Look up Complete!!!
Sample Syntax Termux
$ python2 geo-recon.py 138.121.128.19
{*}Running Geo-location Check Against 138.121.128.19
Country: Brazil
Region: Piaui
City: Teresina
Organization: Itech Telecom
ISP: Itech Telecom
{*}Geo-IP Lookup Complete!!!
{*}Running Reputation Check Against 138.121.128.19
Domain: “redeitechtelecom.com.br”
Hostname: []
Usage Type: “Fixed Line ISP”
Confidence of Abuse: 100
Number Times of Reported: 982
Last Reported: “2020-08-21T16:43:12+00:00”
Whitelisted: false
The IP Address 138.121.128.19 Is Malicious and well known for SSH Bruteforce Attacks
IP Reputation Look up Complete!!!
To Do List
SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…
The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…
The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…
The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…
AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It…
Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to…