/DomainBlockList

:zap: This is a threat intelligence automatic crawling tool that also contains some high-value threat intelligence.

Primary LanguagePythonMIT LicenseMIT

peeker-logo

Build status

DomainBlockList

📜 About

DomainBlockList is part of Peeker, which provides a part of the feed for Peeker. These feeds are mainly composed of domain names, and of course some IPs (we think these IPs are high-value intelligence)

⚒️ Start contributing

I wanted to make the setup of the environment as easy as possible. To start the environment you need the following prerequisites:

Prerequisites

  • GitPython
  • loguru
  • pandas
  • pyfiglet
  • requests
  • termcolor

Start environment

You only (fingers crossed) need to execute the following to start the environment:

pip install -r requirements.txt

Architecture and patterns

The structure of the code is the following:

  • DomainBlockList/craw: the main code is kept here.
  • DomainBlockList/trail: trail files are kept here.
  • DomainBlockList/Log: log files

FAQ

What can these trails be used for?

  • They can be integrated into the firewall as rules.
  • They can be used for data mining, for example as the Feed of Peeker.

When the data is updated?

  • Updated every hour.

🚩 License

The code is available under the MIT license.