python检测异常ip,并查询ip详细信息

#!/usr/local/bin/python3
# coding:utf-8

import string, subprocess, send_mail
from time import strftime, gmtime, sleep, re
import urllib.request, re


def filter_tags(htmlstr):
    re_cdata = re.compile('//<!\[CDATA\[[^>]*//\]\]>', re.I)  # 匹配CDATA
    re_script = re.compile('<\s*script[^>]*>[^<]*<\s*/\s*script\s*>', re.I)  # Script
    re_style = re.compile('<\s*style[^>]*>[^<]*<\s*/\s*style\s*>', re.I)  # style
    re_br = re.compile('<br\s*?/?>')  # 处理换行
    re_h = re.compile('</?\w+[^>]*>')  # HTML标签
    re_comment = re.compile('<!--[^>]*-->')  # HTML注释
    s = re_cdata.sub('', htmlstr)  # 去掉CDATA
    s = re_script.sub('', s)  # 去掉SCRIPT
    s = re_style.sub('', s)  # 去掉style
    s = re_br.sub('\n', s)  # 将br转换为换行
    s = re_h.sub('', s)  # 去掉HTML 标签
    s = re_comment.sub('', s)
    blank_line = re.compile('\n+')
    s = blank_line.sub('\n', s)
    return s


def ip_info(ip):
    # url = 'http://ip.taobao.com/service/getIpInfo.php?ip=%s' % ip
    url = 'http://www.ip.cn/index.php?ip=%s' % ip
    f = urllib.request.Request(url)
    f.add_header('User-Agent', 'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:51.0) Gecko/20100101 Firefox/51.0')
    response = ((urllib.request.urlopen(f)).read()).decode('utf-8')
    ip_information = (filter_tags(response)).split('\n\t')[19]
    return ip_information


tcptmpStr = (
((subprocess.Popen("ss -antp |grep -v LISTEN", shell=True, stdout=subprocess.PIPE)).stdout.read()).decode()).strip()
whiteIp = ['127.0.0.1', 'x.x.x.x', 'x.x.x.x']
whitePort = ['80', '22', '3306']
# udptmpStr = ((subprocess.check_output(["netstat", "-nulp"])).decode('utf-8')).strip()
# get tcp connect
#
# def getTCPservice(tcptmpStr):
tmpList = tcptmpStr.split("\n")
del tmpList[0]
# newList = []

for i in tmpList:
    val = i.split()
    del val[0:3]

    valTmpip = (val[1].split(":"))[-2]  # remote addr
    valTmpprot = (val[0].split(":"))[-1]  # local port

    if valTmpip not in whiteIp and valTmpprot not in whitePort:
        with open('/var/openresty/nginx/logs/suspicious.txt', 'a') as f:
            current_time = '#================<< Capture Time : ' + strftime("%Y-%m-%d %H:%M:%S",
                                                                            gmtime()) + ' >>==============\n'
            f.write(current_time)
            f.write(val[2] + '\n')
            f.write(valTmpip + '\n')
            sleep(5)
            ipInfo = ip_info(valTmpip)
            f.write(ipInfo)
            # send_mail.sendMail('/var/openresty/nginx/logs/suspicious.txt')



 

 

转载于:https://www.cnblogs.com/changbo/p/6558267.html

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值