kvsaurav / C2-Tracker

Live Feed of Suspected C2 Servers

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

C2 Tracker

This repo houses the code I made to mine various C2/malware IPs from Shodan. Most of the searches used were sourced from Michael Koczwara's and @BushidoToken's (Will's) research (see references below). Huge thanks to the both of them!

What do I track?

Current State

I currently have this script running nightly on a crontab and automatically updating the files in data. There is a backup of the data in backup, this is not touched by the automation and will occassionally be updated manually.

Last Backup: 1/6/2023

Running Locally

However if you want to host a private version, put your Shodan API key in an environment variable called SHODAN_API_KEY

echo SHODAN_API_KEY=API_KEY >> ~/.bashrc
bash
python3 -m pip install -r requirements.txt
python3 tracker.py

Future State

  • Write scripts to analyze DNS/WHOIS info
  • Build automation into the script
  • Write script to identify servers with multiple frameworks running
  • Track metrics over time

References

About

Live Feed of Suspected C2 Servers


Languages

Language:Python 97.8%Language:Shell 2.2%