SIPI tool is aimed for Incident Response Team and anyone what’s want to know the behaviour of the “suspicious” IP Address. The tools do search looking for reputation info from a set of open threat intelligence sources. Information about this IP like malware activity, malicious activity, blacklist, spam and botnet activity.
Also Read Idisagree – Control Remote Computers Using Discord Bot & Python 3
pip install requests & easy_install shodan
git clone "repositori"
config API token into config.json
try: $> python sipi.py any_ip -A
Simple IP Information Tool
sIPi - is a free reconnaissance tool for obtain IP Address Information from
many Open Sources: cymon.io | shoda.io | ipinfo.io Julian J. Gonzalez Caracuel
It is a tool that analyzes an IP or IP list, obtaining as a result information about:
- reputación / actividad
- nivel de exposición
- geolocalización Reputation / detection of the IP in blacklists according to the following categories:
Source: cymon.io - Cymon is the largest open tracker of malware, phishing, botnets, spam, and more
['malware',
'botnet',
'spam',
'phishing',
'malicious activity',
'blacklist',
'dnsbl']
Nivel de exposición:
Source: shodan.io - Shodan is the world's first search engine for Internet-connected devices.
Obtiene información toda la dirección IP que tiene SHODAN sobre la dirección IP, dependiendo del nivel de acceso al motor SHODAN
se podra obtener información con mayor cantidad de datos (número de puertos, banner, geolocalización)
Geolocalización:
Source: ipinfo.io
Obtiene información simple de la dirección IP, geolocalización e información sobre el ASN, permite un ratio de 1000/day cymon.io - Necesita token de autenticación - usuario registrado ratio: 1000/days
shodan.io - Necesita token de autenticación - usuario registrado limite 100 resultados, puertos limitados The configuration of the tokens is entered in File: config.json, which must be in the directory where sipi.py is executed << API token from all service is setting up into a “config.json” filename place in the root directory >>
requests
pip install requests
shodan
easy_install shodan
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…