Skip to content

A simple utility to quickly gather historic Port and CVE exposures from an IP range.

Notifications You must be signed in to change notification settings

S-RM/HistoricShodanScanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 

Repository files navigation

Historic Shodan Scanner

Historic Shodan Scanner is a simply Python utility that takes a range of IP addresses and queries Shodan for its historic Port and CVE data. This is useful to quickly assess the exposure of a Public IP estate during a cyber security incident.

Requirements

Historic Shodan Scanner requires the following modules:

  • shodan
  • IPNetwork

You will need to activate your Shodan API integration prior to running the script, for example, by running shodan init [API_TOKEN].

Acknowledgements

All credit to development goes to @Luke-Dyer and @AidanStrong for supporting.

Usage

  • Input the IP ranges you want to scan in ranges.txt
  • Run the script
  • Scan_result.csv will contain a timeline of identified events

About

A simple utility to quickly gather historic Port and CVE exposures from an IP range.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages