時間:2023-01-30 16:20:01 | 來源:建站知識
時間:2023-01-30 16:20:01 來源:建站知識
xsec ip database為一個惡意IP和域名庫(Malicious ip database),它獲取惡意IP和域名的方式有以下幾種:$ ./main [xorm] [info] 2017/09/26 13:22:58.220496 PING DATABASE mysqlNAME: xsec Malicious ip database - A Malicious ip databaseUSAGE: main [global options] command [command options] [arguments...] VERSION: 20170925 AUTHOR(S): netxfly <x@xsec.io> COMMANDS: serve startup evil ips dump Fetch all evil ips info and save to file load load ips from file help, h Shows a list of commands or help for one commandGLOBAL OPTIONS: --help, -h show help --version, -v print the version
package routers_testimport ( "testing" "time" "net/http" "net/url" "xsec-evil-ips/util")func TestUpdateIp(t *testing.T) { u := "http://127.0.0.1:8000/api/ip/" timestamp := time.Now().Format("2006-01-02 15:04:05") k := "aadcbfbc837757a9a24ac96cf9171c8b" ip := "212.129.58.111" pro := "xsec test pro" t.Log(http.PostForm(u, url.Values{"timestamp": {timestamp}, "secureKey": {util.MakeSign(timestamp, k)}, "ip": {ip}, "pro": {pro}}))}func TestUpdateDomain(t *testing.T) { u := "http://127.0.0.1:8000/api/domain/" timestamp := time.Now().Format("2006-01-02 15:04:05") k := "aadcbfbc837757a9a24ac96cf9171c8b" domain := "www.hosting2balooonba.com" pro := "xsec test pro" t.Log(http.PostForm(u, url.Values{"timestamp": {timestamp}, "secureKey": {util.MakeSign(timestamp, k)}, "domain": {domain}, "pro": {pro}}))}
提交的參數(shù)需要有以下幾個參數(shù),而且安全產(chǎn)品的key必須與惡意IP庫的相同,否則不會接受提交的惡意ip或域名信息。url := "http://data.netlab.360.com/feeds/dga/dga.txt"// url := "http://127.0.0.1:8000/dga.txt"
關(guān)鍵詞:惡意,簡單
微信公眾號
版權(quán)所有? 億企邦 1997-2025 保留一切法律許可權(quán)利。