Skip to content

A python script to automate shodan.io queries for finding internal IPs of web servers.

License

Notifications You must be signed in to change notification settings

AtharavRH/Web-Server-IP-Extractor

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Web-Server-IP-Extractor

A python script to automate shodan.io queries for finding origin IPs of web servers.

alt text

Introduction:

Many companies often forget to take down their internal IPs from directly accessing to their websites. These IP addresses often remain without Cloudflare protection, making a ground for DDoS Attacks. This tool automates shodan.io to find vulnerable internal IPs.

Pre-requisites:

(Shodan Library) To install the Shodan library:

$ pip install shodan

Or if you don't have pip installed (which you should seriously install):

$ easy_install shodan

Install:

$ git clone https://github.com/omkoli/Web-Server-IP-Extractor
$ cd Web-Server-IP-Extractor

Run:

$ python3 ipx.py <search_query>

For Termux, you need root permissions,

$ tsu
$ python3 ipx.py <search_query>

Contributors :

Om Suryakant Koli ([email protected])

Atharva R. Hedage ([email protected])

GitHub :

LinkedIn :

Instagram :

DISCLAIMER :- This script is only for penetration testing and security research. I will not be responsible if you use it for any illegal activities.

About

A python script to automate shodan.io queries for finding internal IPs of web servers.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%