maltrail | Malicious traffic detection system | Security library
kandi X-RAY | maltrail Summary
kandi X-RAY | maltrail Summary
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com for Banjori malware), URL (e.g. hXXp://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware).
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Update trails
- Return True if the given address is a Bogon IP address
- Return True if address is a CDN IP address
- Check if trail is whitelisted
- Read whitelist
- Start an HTTP server
- Generate a regular expression
- Write text to the console
- Returns the IP address associated with the given address
- Create log directory
- Check if the user is sudo
- Patch the given parser
- Fetch csv files
- A worker that processes a given buffer
- Start UDP connection
- Updates the ipcat database
- Read whitelisted whitelist
- Read INI txt file
- Set the signal handler
- Decorator to add a metaclass
- Checks if the current user is sudo
- Readogon_ranges txt
- Reads CDN ranges
- Read the worst ASN txt file
- Check for deprecated options
- Return True if fullname is a package
- Read configuration file
- Monitor IP addresses
maltrail Key Features
maltrail Examples and Code Snippets
alienvault, asprox, autoshun, badips, bambenekconsultingc2,
bambenekconsultingdga, binarydefense, blocklist, botscout,
bruteforceblocker, ciarmy, cruzit, cybercrimetracker, dshielddns,
dshieldip, emergingthreatsbot, emergingthreatscip,
malc0de, malwa
sudo apt-get install python-pcapy
git clone https://github.com/stamparm/maltrail.git
cd maltrail
sudo python sensor.py
[[ -d maltrail ]] || git clone https://github.com/stamparm/maltrail.git
cd maltrail
python server.py
ping -c 1 136.161.101.53
cat
Community Discussions
Trending Discussions on maltrail
QUESTION
I'm trying to work out how to edit a file in a bash script, and replace it with a variable with the dots escaped. For example 123.123.123.123
needs to be replaced in the file jail.local, as 123\.123\.123\.123
. I found some posts on SO that gave me some ideas, but I just can't get it right:
ANSWER
Answered 2020-Nov-03 at 17:17With a little more fiddling we can replace the '.'
with both digits with word characters and have it work with your example. For instance:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install maltrail
For Ubuntu/Debian
For SUSE/openSUSE
For Docker environment instructions can be found here.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page