#!/usr/bin/python
# -*- coding: utf-8 -*-
from libnmap.process import NmapProcess
from libnmap.parser import NmapParser
import requests
x=90
while x < 255:
print "\033[1;31mstart 118.192.%s.0/24\033[0m" %(str(x))
#调用nmap扫描段内开放80端口的IP
mission = NmapProcess("118.192.%s.0/24" % (str(x)),options = "-p 80")
mission.run()
hosts_hash = {}
#处理nmap输出结果
report = NmapParser.parse(mission.stdout)
#得到每一个开放80端口的IP,结果存放到hash中
for _host in report.hosts:
if _host.is_up() and _host.services[0].state =='open':
hosts_hash[_host.address] = str(_host.services[0].port)+"/"+_host.services[0].state
print hosts_hash.keys()
#对每一个IP反向域名解析
for ips in hosts_hash.keys():
print "\033[1;32m[+]"+ips+"\033[0m"
target_page = 1
count = 1
#循环遍历每一页
while 1:
try:
r = requests.get("http://dns.aizhan.com/index.php?r=index/
python实现利用nmap和爱站扫描开放80端口的IP并进行反向域名解析
最新推荐文章于 2022-01-04 17:36:03 发布
该Python脚本利用libnmap库扫描118.192.0.0/24子网内开放80端口的IP,并通过爱站API进行反向域名解析。对每个找到的IP,脚本会打印出其对应的域名及连接状态。
摘要由CSDN通过智能技术生成