时间:2023-01-30 16:20:01 | 来源:建站知识
时间:2023-01-30 16:20:01 来源:建站知识
xsec ip database为一个恶意IP和域名库(Malicious ip database),它获取恶意IP和域名的方式有以下几种:$ ./main [xorm] [info] 2017/09/26 13:22:58.220496 PING DATABASE mysqlNAME: xsec Malicious ip database - A Malicious ip databaseUSAGE: main [global options] command [command options] [arguments...] VERSION: 20170925 AUTHOR(S): netxfly <x@xsec.io> COMMANDS: serve startup evil ips dump Fetch all evil ips info and save to file load load ips from file help, h Shows a list of commands or help for one commandGLOBAL OPTIONS: --help, -h show help --version, -v print the version
package routers_testimport ( "testing" "time" "net/http" "net/url" "xsec-evil-ips/util")func TestUpdateIp(t *testing.T) { u := "http://127.0.0.1:8000/api/ip/" timestamp := time.Now().Format("2006-01-02 15:04:05") k := "aadcbfbc837757a9a24ac96cf9171c8b" ip := "212.129.58.111" pro := "xsec test pro" t.Log(http.PostForm(u, url.Values{"timestamp": {timestamp}, "secureKey": {util.MakeSign(timestamp, k)}, "ip": {ip}, "pro": {pro}}))}func TestUpdateDomain(t *testing.T) { u := "http://127.0.0.1:8000/api/domain/" timestamp := time.Now().Format("2006-01-02 15:04:05") k := "aadcbfbc837757a9a24ac96cf9171c8b" domain := "www.hosting2balooonba.com" pro := "xsec test pro" t.Log(http.PostForm(u, url.Values{"timestamp": {timestamp}, "secureKey": {util.MakeSign(timestamp, k)}, "domain": {domain}, "pro": {pro}}))}
提交的参数需要有以下几个参数,而且安全产品的key必须与恶意IP库的相同,否则不会接受提交的恶意ip或域名信息。url := "http://data.netlab.360.com/feeds/dga/dga.txt"// url := "http://127.0.0.1:8000/dga.txt"
关键词:恶意,简单