A tool for proving intel on IP addresses and enabling detection and response.
Project description
IP Inspector
IP Inspector is a command line tool and library for proving intel on IP addresses for the purpose of enabling Intel Detection and Response.
It's built to be modular so it can add value around any API that delivers IP address or computer network information. However, currently it only uses the free GeoLite2 databases provided by MaxMind and the tool/library can be used just interface with the MaxMind API in a convenient way. That said, I wrote this for the purpose of adding value to our intel, detect, and response program. That value is obtained by tracking and responding to IP addresses that show up in our detection apparatuses differently based on their metadata. With respect to ip-inspector that's achieved via simple blacklists and/or whitelists you can manually or programmatically maintain for the different IP address metadata fields valuable to your situation, such as the ASN, the Organization name, the country, etc.
Install and Setup
python3 -m pip install ip-inspector
MaxMind GeoLite2
The command line tool and MaxMind Client will first look for local MaxMind GeoLite2 database files and then look for system files at the following default locations (debian):
/usr/share/GeoIP/GeoLite2-ASN.mmdb
/usr/share/GeoIP/GeoLite2-City.mmdb
/usr/share/GeoIP/GeoLite2-Country.mmdb
You can register for a free license key here: https://www.maxmind.com/en/geolite2/signup. Then you can use the MaxMind geoipupdate command to keep your system databases updated.
However, If you want to use ip-inspector to download and maintain your GeoLite2 databases, you will need to provide the license key. There are a couple of ways to supply that license key, depending on how you want to use ip-inspector.
Suppling on the command line will save your license key for future use:
$ ip-inspector -lk 'your_license_key'
Next, you can use the update command to download the most recent databases files.
$ ip-inspector -u
You can accomplish the same with the library, if you want to download a local copy of the GeoLite2 databases:
from ip_inspector import maxmind
# I'm pretending we have already loaded a config and PROXIES, for the sake of the example and to show
# that update_databases accepts **args to pass to requests.
proxies = PROXIES if 'use_proxy' in config and config.getboolean('use_proxy') else None
maxmind.update_databases(license_key='your_license_key', proxies=proxies):
Using it
Get your free MaxMind license key.
Like a library:
from ip_inspector import maxmind
from ip_inspector import Inspector
# If you just want the maxmind client:
mmc = maxmind.Client(license_key='your_license_key')
# The Inspector with blacklist/whitelist functionality
mmi = Inspector(maxmind.Client(license_key='your_license_key'))
The command line tool:
$ ip-inspector -h
usage: ip-inspector [-h] [-d] [-u] [-r] [-pp] [-i IP]
[-f {IP,ASN,ORG,Continent,Country,Region,City,Time Zone,Latitude,Longitude,Accuracy Radius}]
[-csv] [--from-stdin] [-lk LICENSE_KEY] [-c CONFIG_PATH]
[--customize]
{whitelist,blacklist} ...
Inspect IP address metadata for IDR purposes
positional arguments:
{whitelist,blacklist}
whitelist For interacting with the IP Network Organization
whitelist
blacklist For interacting with the IP Network Organization
blacklist.
optional arguments:
-h, --help show this help message and exit
-d, --debug Turn on debug logging.
-u, --update-databases
Update the MaxMind GeoLite2 Databases
-r, --raw-results return results in their raw json format
-pp, --pretty-print Pretty print the raw json results
-i IP, --ip IP A single IP address to inspect.
-f {IP,ASN,ORG,Continent,Country,Region,City,Time Zone,Latitude,Longitude,Accuracy Radius}, --field {IP,ASN,ORG,Continent,Country,Region,City,Time Zone,Latitude,Longitude,Accuracy Radius}
specific fields to return
-csv print fields as comma seperated with --from-stdin and
fields
--from-stdin Inspect each IP in a list of IP addresses passed to
STDIN
-lk LICENSE_KEY, --license-key LICENSE_KEY
MaxMind Liscense Key (saves to config for future use)
-c CONFIG_PATH, --config-path CONFIG_PATH
A JSON config to override the default configuration.
The path is saved for future use.
--customize Write a copy of the existing configuration to the
local config path for easily making configuration
overrideschanges, or updates. Edit the local config to
meet your needs.
Incomplete
I've implemented the minimum of what I needed to solve immediate needs but built this for long term use. Some features I planned on have not yet been implemented. If anyone reads this, you're wicked cool.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file ip-inspector-0.0.4.tar.gz
.
File metadata
- Download URL: ip-inspector-0.0.4.tar.gz
- Upload date:
- Size: 12.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.22.0 setuptools/41.0.1 requests-toolbelt/0.9.1 tqdm/4.36.1 CPython/3.6.9
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 684d0750d2687c23ab2100f2577cb513c7471cb7be677c43c1305ba5e96ef8a8 |
|
MD5 | 634ce56116bdcfb118897ce02fce832e |
|
BLAKE2b-256 | 9aa3e3bf0c535872e669f602316477279ae8601dda3f387c8bf4c4590a3bf836 |
File details
Details for the file ip_inspector-0.0.4-py3-none-any.whl
.
File metadata
- Download URL: ip_inspector-0.0.4-py3-none-any.whl
- Upload date:
- Size: 18.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.22.0 setuptools/41.0.1 requests-toolbelt/0.9.1 tqdm/4.36.1 CPython/3.6.9
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | a822923f38744fb439274042d16331d5c9a8e8c90e40a84f637d5c5eebb648d9 |
|
MD5 | 8543ea97c0803f54dc76b425e3af8a01 |
|
BLAKE2b-256 | e2148c9b456ddedeb8a6bf2eb0e29c5a9d3bcbbae19a06f07e44386a5f8a232c |