Net::Abuse::Utils - Routines useful for processing network abuse
version 0.24
use Net::Abuse::Utils qw( :all );
print "IP Whois Contacts: ", join( ' ', get_ipwi_contacts($ip) ), "\n";
print "Abuse.net Contacts: ", get_abusenet_contact($domain), "\n";
Net::Abuse::Utils provides serveral functions useful for determining information about an IP address including contact/reporting addresses, ASN/network info, reverse dns, and DNSBL listing status. Functions which take an IP accept either IPv6 or IPv4 IPs unless indicated otherwise.
There is a @RESOLVERS
package variable you can use to specify name servers
different than the systems nameservers for queries from this module. If you
intend to use Google's nameservers here, please see This issue on GitHub for
a note of caution.
The following functions are exportable from this module. You may import all
of them into your namespace with the :all
tag.
Returns a list containing (ASN, Network/Mask, CC code, RIR, modified date)
for the network announcing IP
.
Returns a reference to a list of listrefs containting ASN(s), Network,Mask,
CC code, RIR, and modified date fall all networks announcing IP
.
IPv4 Only. Returns an array of hash references containing (ASN, Network/Mask,
CC code, RIR, modified date) for the peers of the network announcing IP
.
Returns the AS description for ASN
.
Similiar to get_as_description
but attempts to clean it up some before
returning it.
Returns the SOA contact email address for the reverse DNS /24
zone containing IP
.
Returns a list of all email addresses found in whois information
for IP
with duplicates removed.
Returns the reverse PTR for IP
.
IPv4 Only. Returns the listing text for IP
for the designated DNSBL.
DNSBL zone
should be the zone used for looking up addresses in the
blocking list.
Returns the 2 letter country code for IP
.
Returns the 2 letter country code for ASN
.
Returns the abuse.net listed contact email addresses for domain
.
Returns true if IP
looks like an IP, false otherwise.
Takes a hostname and attempts to return the domain name.
Takes a malware md5 hash and tests it against http://www.team-cymru.org/Services/MHR. Returns a HASHREF of last_seen and detection_rate.
Each subroutine will return undef if unsuccessful. In the furture, debugging output will be available.
There are two commented out lines that can be uncommented to enable Memoize support. I haven't yet decided whether to include this option by default. It may be made available in the future via an import flag to use.
This module makes use of the following modules:
Net::IP, Net::DNS, Net::Whois::IP, and Email::Address
There are no known bugs in this module. Please report problems to Michael Greb ([email protected])
Patches are welcome.
This module was inspired by Karsten M. Self's SpamTools shell scripts, available at http://linuxmafia.com/~karsten/.
Thanks as well to my employer, Linode.com, for allowing me the time to work on this module.
Rik Rose, Jon Honeycutt, Brandon Hale, TJ Fontaine, A. Pagaltzis, and Heidi Greb all provided invaluable input during the development of this module.
For a detailed usage example, please see examples/ip-info.pl included in this module's distribution.
- mikegrb [email protected]
- Wes Young [email protected]
This software is copyright (c) 2013 by Mike Greb.
This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.
- mikegrb [email protected]
- Wes Young [email protected]
This software is copyright (c) 2013 by =over 4.
This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.