This is a CSV list of malicious IPs that have performed unsolicited scans against production applications.
git clone https://github.com/ashleykleynhans/ipset.git
cd ipset
python3 -m venv venv
source venv/bin/activate
pip3 install -r requirements.txt
- Copy the
.env.example file to .env
cp .env.example .env
- Edit the .env file and configure your AbuseIPDB API Key and timezone.
- Save the file.
python3 create_ip_set_json.py
This will output JSON in the following format:
[
"64.176.194.36/32",
"104.234.204.32/32",
"104.207.139.139/32",
"54.206.45.15/32",
"138.199.18.131/32",
"20.127.152.198/32"
]
Note
Obviously change the IP address below to the IP address that you actually want to check.
python3 check_abuse_ipdb.py --ip-address 64.176.194.36
Note
This is just an example, you should obviously change the IP address to the one that you actually want to report. You can get a list of category ids here, and set the reason to the reason why you are reporting the malicious IP.
python3 report_to_abuse_ipdb.py \
--ip-address 64.176.194.36 \
--categories 19,21 \
--reason "Malicious Behaviour/Probing for vulnerabilities/Brute force attempts"
python3 find_duplicates.py
python3 generate_pie_chart.py --field Country
Pull requests and issues on GitHub are welcome. Bug fixes and new features are encouraged.