Upload folder using huggingface_hub
Browse files- command.sh +1 -0
- exclude.conf +513 -0
- out.parquet +3 -0
- process.py +54 -0
command.sh
ADDED
@@ -0,0 +1 @@
|
|
|
|
|
1 |
+
sudo masscan 0.0.0.0/0 -p22 --banners -oJ out.json --excludefile ./exclude.conf -e wg0-mullvad --max-rate 1000000
|
exclude.conf
ADDED
@@ -0,0 +1,513 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
# http://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
|
2 |
+
# http://tools.ietf.org/html/rfc5735
|
3 |
+
# "This" network
|
4 |
+
0.0.0.0/8
|
5 |
+
# Private networks
|
6 |
+
10.0.0.0/8
|
7 |
+
# Carrier-grade NAT - RFC 6598
|
8 |
+
100.64.0.0/10
|
9 |
+
# Host loopback
|
10 |
+
127.0.0.0/8
|
11 |
+
# Link local
|
12 |
+
169.254.0.0/16
|
13 |
+
# Private networks
|
14 |
+
172.16.0.0/12
|
15 |
+
# IETF Protocol Assignments
|
16 |
+
192.0.0.0/24
|
17 |
+
# DS-Lite
|
18 |
+
192.0.0.0/29
|
19 |
+
# NAT64
|
20 |
+
192.0.0.170/32
|
21 |
+
# DNS64
|
22 |
+
192.0.0.171/32
|
23 |
+
# Documentation (TEST-NET-1)
|
24 |
+
192.0.2.0/24
|
25 |
+
# 6to4 Relay Anycast
|
26 |
+
192.88.99.0/24
|
27 |
+
# Private networks
|
28 |
+
192.168.0.0/16
|
29 |
+
# Benchmarking
|
30 |
+
198.18.0.0/15
|
31 |
+
# Documentation (TEST-NET-2)
|
32 |
+
198.51.100.0/24
|
33 |
+
# Documentation (TEST-NET-3)
|
34 |
+
203.0.113.0/24
|
35 |
+
# Reserved
|
36 |
+
240.0.0.0/4
|
37 |
+
# Limited Broadcast
|
38 |
+
255.255.255.255/32
|
39 |
+
|
40 |
+
|
41 |
+
#Received: from elbmasnwh002.us-ct-eb01.gdeb.com ([153.11.13.41]
|
42 |
+
# helo=ebsmtp.gdeb.com) by mx1.gd-ms.com with esmtp (Exim 4.76) (envelope-from
|
43 |
+
# <bmandes@gdeb.com>) id 1VS55c-0004qL-0F for support@erratasec.com; Fri, 04
|
44 |
+
# Oct 2013 09:06:40 -0400
|
45 |
+
#To: <support@erratasec.com>
|
46 |
+
#CC: <ebsoc@gdeb.com>
|
47 |
+
#Subject: Scanning and Probing our network
|
48 |
+
#From: Robert Mandes <bmandes@gdeb.com>
|
49 |
+
#Date: Fri, 4 Oct 2013 09:06:36 -0400
|
50 |
+
#
|
51 |
+
#Stop scanning and probing our network, 153.11.0.0/16. We are a defense
|
52 |
+
#contractor and report to Federal law enforcement authorities when scans
|
53 |
+
#and probes are directed at our network. I assume you don't want to be
|
54 |
+
#part of that report. Please permanently remove our network range from
|
55 |
+
#your current and future research.
|
56 |
+
#
|
57 |
+
#Thank you
|
58 |
+
#
|
59 |
+
#Robert Mandes
|
60 |
+
#Information Security Officer
|
61 |
+
#General Dynamics
|
62 |
+
#Electric Boat
|
63 |
+
#
|
64 |
+
#C 860-625-0605
|
65 |
+
#P 860-433-1553
|
66 |
+
|
67 |
+
153.11.0.0/16
|
68 |
+
|
69 |
+
|
70 |
+
|
71 |
+
|
72 |
+
#Date: Mon, 7 Oct 2013 17:25:41 -0700
|
73 |
+
#Subject: Re: please stop the attack to our router
|
74 |
+
#From: Di Li <di@egihosting.com>
|
75 |
+
#
|
76 |
+
#Make sure you stop the scan immediately, that's not OK for any company or
|
77 |
+
#organization scan our network at all.
|
78 |
+
#
|
79 |
+
#If you fail to do that we will block whole traffic from ASN 10439, and we
|
80 |
+
#will file a police report after that.
|
81 |
+
#
|
82 |
+
#Let me know when you stop, since we still receive the attack from you, and
|
83 |
+
#by the way your scan are not going anywhere, it's was dropped from our edge
|
84 |
+
#since the first 5 scan
|
85 |
+
#
|
86 |
+
#Oct 7 17:17:32:I:SNMP: Auth. failure, intruder IP: 209.126.230.72
|
87 |
+
#...
|
88 |
+
#Oct 7 16:55:27:I:SNMP: Auth. failure, intruder IP: 209.126.230.72
|
89 |
+
#
|
90 |
+
#Di
|
91 |
+
|
92 |
+
4.53.201.0/24
|
93 |
+
5.152.179.0/24
|
94 |
+
8.12.162.0-8.12.164.255
|
95 |
+
8.14.84.0/22
|
96 |
+
8.14.145.0-8.14.147.255
|
97 |
+
8.17.250.0-8.17.252.255
|
98 |
+
23.27.0.0/16
|
99 |
+
23.231.128.0/17
|
100 |
+
37.72.172.0/23
|
101 |
+
38.72.200.0/22
|
102 |
+
50.93.192.0-50.93.197.255
|
103 |
+
50.115.128.0/20
|
104 |
+
50.117.0.0/17
|
105 |
+
50.118.128.0/17
|
106 |
+
63.141.222.0/24
|
107 |
+
64.62.253.0/24
|
108 |
+
64.92.96.0/19
|
109 |
+
64.145.79.0/24
|
110 |
+
64.145.82.0/23
|
111 |
+
64.158.146.0/23
|
112 |
+
65.49.24.0/24
|
113 |
+
65.49.93.0/24
|
114 |
+
65.162.192.0/22
|
115 |
+
66.79.160.0/19
|
116 |
+
66.160.191.0/24
|
117 |
+
68.68.96.0/20
|
118 |
+
69.46.64.0/19
|
119 |
+
69.176.80.0/20
|
120 |
+
72.13.80.0/20
|
121 |
+
72.52.76.0/24
|
122 |
+
74.82.43.0/24
|
123 |
+
74.82.160.0/19
|
124 |
+
74.114.88.0/22
|
125 |
+
74.115.0.0/24
|
126 |
+
74.115.2.0/24
|
127 |
+
74.115.4.0/24
|
128 |
+
74.122.100.0/22
|
129 |
+
75.127.0.0/24
|
130 |
+
103.251.91.0/24
|
131 |
+
108.171.32.0/24
|
132 |
+
108.171.42.0/24
|
133 |
+
108.171.52.0/24
|
134 |
+
108.171.62.0/24
|
135 |
+
118.193.78.0/23
|
136 |
+
130.93.16.0/23
|
137 |
+
136.0.0.0/16
|
138 |
+
142.111.0.0/16
|
139 |
+
142.252.0.0/16
|
140 |
+
146.82.55.93
|
141 |
+
149.54.136.0/21
|
142 |
+
149.54.152.0/21
|
143 |
+
166.88.0.0/16
|
144 |
+
172.252.0.0/16
|
145 |
+
173.245.64.0/19
|
146 |
+
173.245.194.0/23
|
147 |
+
173.245.220.0/22
|
148 |
+
173.252.192.0/18
|
149 |
+
178.18.16.0/22
|
150 |
+
178.18.26.0-178.18.29.255
|
151 |
+
183.182.22.0/24
|
152 |
+
192.92.114.0/24
|
153 |
+
192.155.160.0/19
|
154 |
+
192.177.0.0/16
|
155 |
+
192.186.0.0/18
|
156 |
+
192.249.64.0/20
|
157 |
+
192.250.240.0/20
|
158 |
+
194.110.214.0/24
|
159 |
+
198.12.120.0-198.12.122.255
|
160 |
+
198.144.240.0/20
|
161 |
+
199.33.120.0/24
|
162 |
+
199.33.124.0/22
|
163 |
+
199.48.147.0/24
|
164 |
+
199.68.196.0/22
|
165 |
+
199.127.240.0/21
|
166 |
+
199.187.168.0/22
|
167 |
+
199.188.238.0/23
|
168 |
+
199.255.208.0/24
|
169 |
+
203.12.6.0/24
|
170 |
+
204.13.64.0/21
|
171 |
+
204.16.192.0/21
|
172 |
+
204.19.238.0/24
|
173 |
+
204.74.208.0/20
|
174 |
+
205.159.189.0/24
|
175 |
+
205.164.0.0/18
|
176 |
+
205.209.128.0/18
|
177 |
+
206.108.52.0/23
|
178 |
+
206.165.4.0/24
|
179 |
+
208.77.40.0/21
|
180 |
+
208.80.4.0/22
|
181 |
+
208.123.223.0/24
|
182 |
+
209.51.185.0/24
|
183 |
+
209.54.48.0/20
|
184 |
+
209.107.192.0/23
|
185 |
+
209.107.210.0/24
|
186 |
+
209.107.212.0/24
|
187 |
+
211.156.110.0/23
|
188 |
+
216.83.33.0-216.83.49.255
|
189 |
+
216.83.51.0-216.83.63.255
|
190 |
+
216.151.183.0/24
|
191 |
+
216.151.190.0/23
|
192 |
+
216.172.128.0/19
|
193 |
+
216.185.36.0/24
|
194 |
+
216.218.233.0/24
|
195 |
+
216.224.112.0/20
|
196 |
+
|
197 |
+
#Received: from [194.77.40.242] (HELO samba.agouros.de)
|
198 |
+
# for abuse@erratasec.com; Sat, 12 Oct 2013 09:55:35 -0500
|
199 |
+
#Received: from rumba.agouros.de (rumba-internal [192.168.8.1]) by
|
200 |
+
# samba.agouros.de (Postfix) with ESMTPS id 9055FBAD1D for
|
201 |
+
# <abuse@erratasec.com>; Sat, 12 Oct 2013 16:55:32 +0200 (CEST)
|
202 |
+
#Received: from rumba.agouros.de (localhost [127.0.0.1]) by rumba.agouros.de
|
203 |
+
# (Postfix) with ESMTP id 7B5DD206099 for <abuse@erratasec.com>; Sat, 12 Oct
|
204 |
+
# 2013 16:55:32 +0200 (CEST)
|
205 |
+
#Received: from localhost.localdomain (localhost [127.0.0.1]) by
|
206 |
+
# rumba.agouros.de (Postfix) with ESMTP id 5FBC420601D for
|
207 |
+
# <abuse@erratasec.com>; Sat, 12 Oct 2013 16:55:32 +0200 (CEST)
|
208 |
+
#To: <abuse@erratasec.com>
|
209 |
+
#Subject: Loginattempts from Your net
|
210 |
+
#Message-ID: <20131012145532.5FBC420601D@rumba.agouros.de>
|
211 |
+
#Date: Sat, 12 Oct 2013 16:55:32 +0200
|
212 |
+
#From: <elwood@agouros.de>
|
213 |
+
#
|
214 |
+
#The address 209.126.230.72 from Your network tried to log in to
|
215 |
+
#our network using Port 22 (1)/tcp. Below You will find a listing of the dates and
|
216 |
+
#times the incidents occured as well as the attacked IP-Addresses.
|
217 |
+
#This is a matter of concern for us and continued tries might result in
|
218 |
+
#legal action. If the machine was victim to a hack take it offline, repair
|
219 |
+
#the damage and use better protection next time.
|
220 |
+
#The times included are in Central European (Summer) Time.
|
221 |
+
#Date Sourceip port destips
|
222 |
+
#
|
223 |
+
#07.10.2013 22:34:40 CEST 209.126.230.72 22 194.77.40.242 (1)
|
224 |
+
#08.10.2013 01:44:15 CEST 209.126.230.72 22 194.77.40.246 (1)
|
225 |
+
#
|
226 |
+
#Regards,
|
227 |
+
#Konstantin Agouros
|
228 |
+
|
229 |
+
194.77.40.242
|
230 |
+
194.77.40.246
|
231 |
+
|
232 |
+
|
233 |
+
|
234 |
+
#Received: from [165.160.9.58] (HELO mx2.cscinfo.com)
|
235 |
+
#X-Virus-Scanned: amavisd-new at cscinfo.com
|
236 |
+
#Received: from mx2.cscinfo.com ([127.0.0.1]) by localhost
|
237 |
+
# (plmail02.wil.csc.local [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id
|
238 |
+
# GGQ7EiQaK2P0 for <protodev@erratasec.com>; Wed, 30 Oct 2013 09:26:00 -0400
|
239 |
+
# (EDT)
|
240 |
+
#Received: from casarray.cscinfo.com (pwmailch02.cscinfo.com [172.20.53.94]) by
|
241 |
+
# mx2.cscinfo.com (Postfix) with ESMTPS id 4BA5E58170 for
|
242 |
+
# <protodev@erratasec.com>; Wed, 30 Oct 2013 09:26:00 -0400 (EDT)
|
243 |
+
#Received: from PWMAILM02.cscinfo.com ([169.254.7.52]) by
|
244 |
+
# PWMAILCH02.cscinfo.com ([172.20.53.94]) with mapi id 14.02.0247.003; Wed, 30
|
245 |
+
# Oct 2013 09:26:00 -0400
|
246 |
+
#From: "Derksen, Bill" <bderksen@cscinfo.com>
|
247 |
+
#Subject: Unauthorized Scanning
|
248 |
+
#Date: Wed, 30 Oct 2013 13:25:59 +0000
|
249 |
+
#Message-ID: <1F80316A0C861F40A9A88F18465F138E01EF885F@PWMAILM02.cscinfo.com>
|
250 |
+
#x-originating-ip: [172.31.252.72]
|
251 |
+
#
|
252 |
+
#We have detected unauthorized activity from your systems on our public netw=
|
253 |
+
#ork. Please suspend scanning of our networks immediately.
|
254 |
+
#
|
255 |
+
#Our network block is 165.160/16
|
256 |
+
#
|
257 |
+
#Further scanning will result in reports of unauthorized activity being file=
|
258 |
+
#d with law enforcement agencies.
|
259 |
+
#
|
260 |
+
#Corporation Service Company
|
261 |
+
#
|
262 |
+
#
|
263 |
+
#
|
264 |
+
#________________________________
|
265 |
+
#
|
266 |
+
#NOTICE: This e-mail and any attachments is intended only for use by the add=
|
267 |
+
#ressee(s) named herein and may contain legally privileged, proprietary or c=
|
268 |
+
#onfidential information. If you are not the intended recipient of this e-ma=
|
269 |
+
#il, you are hereby notified that any dissemination, distribution or copying=
|
270 |
+
# of this email, and any attachments thereto, is strictly prohibited. If you=
|
271 |
+
# receive this email in error please immediately notify me via reply email o=
|
272 |
+
#r at (800) 927-9800 and permanently delete the original copy and any copy o=
|
273 |
+
#f any e-mail, and any printout.
|
274 |
+
|
275 |
+
165.160.0.0/16
|
276 |
+
|
277 |
+
#******************************
|
278 |
+
#Greetings from the IT Security Team at Utah State University.
|
279 |
+
#
|
280 |
+
#We have detected network activity that might be suspicious or
|
281 |
+
#malicious. We think it might be sourced from your network. We
|
282 |
+
#include IP Addresses as well as description, log snippets, and
|
283 |
+
#other useful information.
|
284 |
+
#
|
285 |
+
#Please review this information or forward to the responsible person.
|
286 |
+
129.123.0.0/16
|
287 |
+
144.39.0.0/16
|
288 |
+
204.113.91.0/24
|
289 |
+
|
290 |
+
|
291 |
+
#On Friday, November 17th 2017 starting at 03:39 EST (UTC-5:00), part of the
|
292 |
+
#Physics Network at McGill University (132.206.9.0/24, 132.206.123.0/24
|
293 |
+
#and/or 132.206.125.0/24) was scanned from xxx.xxx.xxx.xxx (see syslog
|
294 |
+
#snippet below). The scan targetted the domain service (port 53/udp). We
|
295 |
+
#consider this scan to be an attempt to unlawfully access or abuse our
|
296 |
+
#network (intentionally or as a result of virus or worm activity).
|
297 |
+
|
298 |
+
132.206.9.0/24
|
299 |
+
132.206.123.0/24
|
300 |
+
132.206.125.0/24
|
301 |
+
|
302 |
+
|
303 |
+
#
|
304 |
+
# Add DOD + US Military, often not a great idea to scan military ranges.
|
305 |
+
# If you desire, you can comment these ranges out.
|
306 |
+
#
|
307 |
+
|
308 |
+
6.0.0.0/8
|
309 |
+
7.0.0.0/8
|
310 |
+
11.0.0.0/8
|
311 |
+
21.0.0.0/8
|
312 |
+
22.0.0.0/8
|
313 |
+
26.0.0.0/8
|
314 |
+
28.0.0.0/8
|
315 |
+
29.0.0.0/8
|
316 |
+
30.0.0.0/8
|
317 |
+
33.0.0.0/8
|
318 |
+
55.0.0.0/8
|
319 |
+
205.0.0.0/8
|
320 |
+
214.0.0.0/8
|
321 |
+
215.0.0.0/8
|
322 |
+
|
323 |
+
#******************************
|
324 |
+
#Janet is a UK research and education network!
|
325 |
+
#Please DO NOT scan, you been warned!
|
326 |
+
|
327 |
+
31.25.0.0/23
|
328 |
+
31.25.2.0/23
|
329 |
+
31.25.4.0/22
|
330 |
+
37.72.112.0/21
|
331 |
+
46.254.200.0/21
|
332 |
+
81.87.0.0/16
|
333 |
+
85.12.64.0/18
|
334 |
+
89.207.208.0/21
|
335 |
+
92.245.224.0/19
|
336 |
+
128.16.0.0/16
|
337 |
+
128.40.0.0/16
|
338 |
+
128.41.0.0/18
|
339 |
+
128.86.0.0/16
|
340 |
+
128.232.0.0/16
|
341 |
+
128.240.0.0/16
|
342 |
+
128.243.0.0/16
|
343 |
+
129.11.0.0/16
|
344 |
+
129.12.0.0/16
|
345 |
+
129.31.0.0/16
|
346 |
+
129.67.0.0/16
|
347 |
+
129.169.0.0/16
|
348 |
+
129.215.0.0/16
|
349 |
+
129.234.0.0/16
|
350 |
+
130.88.0.0/16
|
351 |
+
130.159.0.0/16
|
352 |
+
130.209.0.0/16
|
353 |
+
130.246.0.0/16
|
354 |
+
131.111.0.0/16
|
355 |
+
131.227.0.0/16
|
356 |
+
131.231.0.0/16
|
357 |
+
131.251.0.0/16
|
358 |
+
134.36.0.0/16
|
359 |
+
134.83.0.0/16
|
360 |
+
134.151.0.0/16
|
361 |
+
134.219.0.0/16
|
362 |
+
134.220.0.0/16
|
363 |
+
134.225.0.0/16
|
364 |
+
136.148.0.0/16
|
365 |
+
136.156.0.0/16
|
366 |
+
137.44.0.0/16
|
367 |
+
137.50.0.0/16
|
368 |
+
137.73.0.0/16
|
369 |
+
137.108.0.0/16
|
370 |
+
137.195.0.0/16
|
371 |
+
137.222.0.0/16
|
372 |
+
137.253.0.0/16
|
373 |
+
138.38.0.0/16
|
374 |
+
138.40.0.0/16
|
375 |
+
138.250.0.0/15
|
376 |
+
138.253.0.0/16
|
377 |
+
139.133.0.0/16
|
378 |
+
139.153.0.0/16
|
379 |
+
139.166.0.0/16
|
380 |
+
139.184.0.0/16
|
381 |
+
139.222.0.0/16
|
382 |
+
140.97.0.0/16
|
383 |
+
141.163.0.0/16
|
384 |
+
141.170.64.0/19
|
385 |
+
141.170.96.0/22
|
386 |
+
141.170.100.0/23
|
387 |
+
141.241.0.0/16
|
388 |
+
143.52.0.0/15
|
389 |
+
143.117.0.0/16
|
390 |
+
143.167.0.0/16
|
391 |
+
143.210.0.0/16
|
392 |
+
143.234.0.0/16
|
393 |
+
144.32.0.0/16
|
394 |
+
144.82.0.0/16
|
395 |
+
144.124.0.0/16
|
396 |
+
144.173.0.0/16
|
397 |
+
146.87.0.0/16
|
398 |
+
146.97.0.0/16
|
399 |
+
146.169.0.0/16
|
400 |
+
146.176.0.0/16
|
401 |
+
146.179.0.0/16
|
402 |
+
146.191.0.0/16
|
403 |
+
146.227.0.0/16
|
404 |
+
147.143.0.0/16
|
405 |
+
147.188.0.0/16
|
406 |
+
147.197.0.0/16
|
407 |
+
148.79.0.0/16
|
408 |
+
148.88.0.0/16
|
409 |
+
148.197.0.0/16
|
410 |
+
149.155.0.0/16
|
411 |
+
149.170.0.0/16
|
412 |
+
150.204.0.0/16
|
413 |
+
152.71.0.0/16
|
414 |
+
152.78.0.0/16
|
415 |
+
152.105.0.0/16
|
416 |
+
155.198.0.0/16
|
417 |
+
155.245.0.0/16
|
418 |
+
157.140.0.0/16
|
419 |
+
157.228.0.0/16
|
420 |
+
158.94.0.0/16
|
421 |
+
158.125.0.0/16
|
422 |
+
158.143.0.0/16
|
423 |
+
158.223.0.0/16
|
424 |
+
159.86.128.0/18
|
425 |
+
159.92.0.0/16
|
426 |
+
160.5.0.0/16
|
427 |
+
160.9.0.0/16
|
428 |
+
161.73.0.0/16
|
429 |
+
161.74.0.0/16
|
430 |
+
161.76.0.0/16
|
431 |
+
161.112.0.0/16
|
432 |
+
163.1.0.0/16
|
433 |
+
163.119.0.0/16
|
434 |
+
163.160.0.0/16
|
435 |
+
163.167.0.0/16
|
436 |
+
164.11.0.0/16
|
437 |
+
185.83.168.0/22
|
438 |
+
192.12.72.0/24
|
439 |
+
192.18.195.0/24
|
440 |
+
192.35.172.0/24
|
441 |
+
192.41.104.0/21
|
442 |
+
192.41.112.0/20
|
443 |
+
192.41.128.0/22
|
444 |
+
192.68.153.0/24
|
445 |
+
192.76.6.0/23
|
446 |
+
192.76.8.0/21
|
447 |
+
192.76.16.0/20
|
448 |
+
192.76.32.0/22
|
449 |
+
192.82.153.0/24
|
450 |
+
192.84.5.0/24
|
451 |
+
192.84.75.0/24
|
452 |
+
192.84.76.0/22
|
453 |
+
192.84.80.0/22
|
454 |
+
192.84.212.0/24
|
455 |
+
192.88.9.0/24
|
456 |
+
192.88.10.0/24
|
457 |
+
192.94.235.0/24
|
458 |
+
192.100.78.0/24
|
459 |
+
192.100.154.0/24
|
460 |
+
192.107.168.0/24
|
461 |
+
192.108.120.0/24
|
462 |
+
192.124.46.0/24
|
463 |
+
192.133.244.0/24
|
464 |
+
192.149.111.0/24
|
465 |
+
192.150.180.0/22
|
466 |
+
192.150.184.0/24
|
467 |
+
192.153.213.0/24
|
468 |
+
192.156.162.0/24
|
469 |
+
192.160.194.0/24
|
470 |
+
192.171.128.0/18
|
471 |
+
192.171.192.0/21
|
472 |
+
192.173.1.0/24
|
473 |
+
192.173.2.0/23
|
474 |
+
192.173.4.0/24
|
475 |
+
192.173.128.0/21
|
476 |
+
192.188.157.0/24
|
477 |
+
192.188.158.0/24
|
478 |
+
192.190.201.0/24
|
479 |
+
192.190.202.0/24
|
480 |
+
192.195.42.0/23
|
481 |
+
192.195.105.0/24
|
482 |
+
192.195.116.0/23
|
483 |
+
192.195.118.0/24
|
484 |
+
193.32.22.0/24
|
485 |
+
193.37.225.0/24
|
486 |
+
193.37.240.0/21
|
487 |
+
193.38.143.0/24
|
488 |
+
193.39.80.0/21
|
489 |
+
193.39.172.0/22
|
490 |
+
193.39.212.0/24
|
491 |
+
193.60.0.0/14
|
492 |
+
193.107.116.0/22
|
493 |
+
193.130.15.0/24
|
494 |
+
193.133.28.0/23
|
495 |
+
193.138.86.0/24
|
496 |
+
194.32.32.0/20
|
497 |
+
194.35.93.0/24
|
498 |
+
194.35.186.0/24
|
499 |
+
194.35.192.0/19
|
500 |
+
194.35.241.0/24
|
501 |
+
194.36.1.0/24
|
502 |
+
194.36.2.0/23
|
503 |
+
194.36.121.0/24
|
504 |
+
194.36.152.0/21
|
505 |
+
194.60.218.0/24
|
506 |
+
194.66.0.0/16
|
507 |
+
194.80.0.0/14
|
508 |
+
194.187.32.0/22
|
509 |
+
195.194.0.0/15
|
510 |
+
212.121.0.0/19
|
511 |
+
212.121.192.0/19
|
512 |
+
212.219.0.0/16
|
513 |
+
|
out.parquet
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:17437ecbd9f79fc782a5f03b2504ccbdc5c307c32914cb4ae6778f20744a855d
|
3 |
+
size 248518017
|
process.py
ADDED
@@ -0,0 +1,54 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
import json
|
2 |
+
import pandas as pd
|
3 |
+
import sys
|
4 |
+
from tqdm import tqdm
|
5 |
+
import uuid
|
6 |
+
|
7 |
+
def main(input_file, output_file):
|
8 |
+
# Read JSON data from file
|
9 |
+
with open(input_file, 'r') as f:
|
10 |
+
data = json.load(f)
|
11 |
+
|
12 |
+
# Process each entry and create a list of dictionaries for DataFrame
|
13 |
+
records = []
|
14 |
+
for entry in tqdm(data):
|
15 |
+
try:
|
16 |
+
ip = entry['ip']
|
17 |
+
for port in entry['ports']:
|
18 |
+
# Initialize service fields
|
19 |
+
service_name = None
|
20 |
+
service_banner = None
|
21 |
+
|
22 |
+
# Extract service information if available
|
23 |
+
if 'service' in port:
|
24 |
+
service = port['service']
|
25 |
+
service_name = service.get('name')
|
26 |
+
service_banner = service.get('banner')
|
27 |
+
|
28 |
+
# Create record with consistent fields
|
29 |
+
record = {
|
30 |
+
'ip': str(uuid.uuid4()),
|
31 |
+
'service_name': service_name,
|
32 |
+
'service_banner': service_banner
|
33 |
+
}
|
34 |
+
|
35 |
+
if service_banner is not None:
|
36 |
+
records.append(record)
|
37 |
+
except KeyError as e:
|
38 |
+
print(f"Keyerror on following entry: `{entry}`... skipping!")
|
39 |
+
pass
|
40 |
+
|
41 |
+
# Create DataFrame
|
42 |
+
df = pd.DataFrame(records)
|
43 |
+
# Write to Parquet format
|
44 |
+
df.to_parquet(output_file)
|
45 |
+
print(f"Successfully saved Parquet file to {output_file}")
|
46 |
+
|
47 |
+
if __name__ == "__main__":
|
48 |
+
if len(sys.argv) != 3:
|
49 |
+
print("Usage: python script.py <input.json> <output.parquet>")
|
50 |
+
sys.exit(1)
|
51 |
+
|
52 |
+
input_json = sys.argv[1]
|
53 |
+
output_parquet = sys.argv[2]
|
54 |
+
main(input_json, output_parquet)
|