Easy DNSBL querying
Project description
A first stab at writing something that could be construed as a python script. Aims to simplify querying multiple DNSBLs.
Usage
Run the program with an argument of either an IP address, domain name, AS number, or MD5/SHA1 hash. If no argument is given, drop into a python shell with dnsbl_query imported as a library.
To utilize HTTBL, provide the DNSBLResults instance with auth_tokens={‘HTTPBL’: ‘<your_api_key>’}.
>>> from ezdnsbl import DNSBLResults >>> results = DNSBLResults('192.0.32.11', auth_tokens={'HTTPBL': '<your_api_key>'}) >>> print(a) IPtoASN: IP 192.0.32.11 Returned 2 result(s): 40528 | 192.0.32.0/22 | US | arin | 2009-06-29 40528 | 192.0.32.0/24 | US | arin | 2009-06-29 IPtoASNPeers: IP 192.0.32.11 Returned 2 result(s): 2914 3257 11164 | 192.0.32.0/24 | US | arin | 2009-06-29 2914 3257 11164 16876 | 192.0.32.0/22 | US | arin | 2009-06-29
Take a look at the source for more info.
NOTE: This script makes NO ATTEMPT to rate-limit queries - it is up to YOU to ensure that your usage conforms to the various AUPs and terms of each of the providers listed below.
DNS Blacklists Queried
The following DNSBL providers are queried:
- APEWS (apews.py)
- TeamCymru MHR and IP-ASN Mapping (cymru.py)
- dan.me’s TOR Node Blacklist (dan.py)
- GBUdb (gbudb.py)
- Project Honeypot’s Http:BL (honeypot.py, httbl_apikey.py)
- LashBack’s Unsubscribe Blacklist (lashback.py)
- Spamhaus’ ZEN and DBL (spamhaus.py)
- Rik van Riel’s Spamikaze instance, Passive Spam Block List (surriel.py)
Acknowledgements
Inspired by vincecarney’s dnsbl: https://github.com/vincecarney/dnsbl
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.