Easy DNSBL querying
Project description
A first stab at writing something that could be construed as a python script. Aims to simplify querying multiple DNSBLs.
Setup
Run setup.py
Put your Project Honey Pot API token in provider/httpbl_apikey.py (use httpbl_apikey.py.sample) -OR- remove HTTBL from the ipv4 array in provider/__init__.py
Usage
Run the program with an argument of either an IP address, domain name, AS number, or MD5/SHA1 hash. If no argument is given, drop into a python shell with dnsbl_query imported as a library.
Take a look at the source for more info.
NOTE: This script makes NO ATTEMPT to rate-limit queries - it is up to YOU to ensure that your usage conforms to the various AUPs and terms of each of the providers listed below.
DNS Blacklists Queried
The following DNSBL providers are queried:
- APEWS (apews.py)
- TeamCymru MHR and IP-ASN Mapping (cymru.py)
- dan.me’s TOR Node Blacklist (dan.py)
- GBUdb (gbudb.py)
- Project Honeypot’s Http:BL (honeypot.py, httbl_apikey.py)
- LashBack’s Unsubscribe Blacklist (lashback.py)
- Spamhaus’ ZEN and DBL (spamhaus.py)
- Rik van Riel’s Spamikaze instance, Passive Spam Block List (surriel.py)
Acknowledgements
Inspired by vincecarney’s dnsbl: https://github.com/vincecarney/dnsbl
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.