This rubygem queries 5 major Passive DNS databases: BFK, CERTEE, DNSParse, DNSDB, and VirusTotal. Passive DNS is a technique where IP to hostname mappings are made by recording the answers of other people's queries.
There is a tool included, pdnstool, that wraps a lot of the functionality that you would need.
Please note that use of any passive DNS database is subject to the terms of use of that passive DNS database. Use of this script in violation of their terms is strongly discouraged. Also, please do not add any obfuscation to try to work around their terms of service. If you need special services, ask the providers for help/permission. Remember, these passive DNS operators are my friends. I don't want to have a row with them because some jerk used this library to abuse them.
If you like this library, please buy the Passive DNS operators a round of beers.
Add this line to your application's Gemfile:
gem 'passivedns-client'
And then execute:
$ bundle
Or install it yourself as:
$ gem install passivedns-client
The DNSDB configuration file is located at $HOME/.dnsdb-query.conf by default. The format for its configuration file only requires one line in the following format:
APIKEY="0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"
To request an API Key, please read https://api.dnsdb.info/.
CERT-EE does not require any configuration.
BFK.de does not require any configuration. However, please read and abide by their usage policy at BFK.de. Currently, it just says not to perform automated queries.
VirusTotal's (https://www.virustotal.com) passive DNS database requires an apikey in $HOME/.virustotal. It is a 64 character hexstring on a single line.
01234567890abcdef01234567890abcdef01234567890abcdef01234567890abcdef
TCPIPUtils's (http://www.tcpiputils.com/premium-access) passive DNS database requires and apikey in $HOME/.tcpiputils. It is a 64 character hexstring on a single line.
01234567890abcdef01234567890abcdef01234567890abcdef01234567890abcdef
PassiveDNS.cn (http://www.passivedns.cn) requires an API ID and and API KEY, which is obtainable by creating an account and sending an email to request an API key.
The configuration file can be in /etc/flint.conf (flint is the name of their tool, which is available at https://github.com/360netlab/flint) or in $HOME/.flint.conf (which is my preference).
The file must have three lines and looks like:
API = http://some.web.address.for.their.api
API_ID = a username that is given when you register
API_KEY = a long and random password of sorts that is used along with the page request to generate a per page API key
require 'passivedns/client'
c = PassiveDNS::Client.new(['bfk','dnsdb']) # providers: bfk, tcpiputils, certee, dnsdb, virustotal
results = c.query("example.com")
Or use the included tool!
Usage: bin/pdnstool [-d [bedvt]] [-g|-v|-m|-c|-x|-y|-j|-t] [-os <sep>] [-f <file>] [-r#|-w#|-v] [-l <count>] <ip|domain|cidr>
-dbedvt uses all of the available passive dns databases
-db only use BFK
-de only use CERT-EE (default)
-dd only use DNSDB (formerly ISC)
-dv only use VirusTotal
-dt only use TCPIPUtils
-dvt uses VirusTotal and TCPIPUtils (for example)
-g outputs a link-nodal GDF visualization definition
-v outputs a link-nodal graphviz visualization definition
-m output a link-nodal graphml visualization definition
-c outputs CSV
-x outputs XML
-y outputs YAML
-j outputs JSON
-t outputs ASCII text (default)
-s <sep> specifies a field separator for text output, default is tab
-f[file] specifies a sqlite3 database used to read the current state - useful for large result sets and generating graphs of previous runs.
-r# specifies the levels of recursion to pull. **WARNING** This is quite taxing on the pDNS servers, so use judiciously (never more than 3 or so) or find yourself blocked!
-w# specifies the amount of time to wait, in seconds, between queries (Default: 0)
-v outputs debugging information
-l <count> limits the number of records returned per passive dns database queried.
There is an RFC, Passive DNS - Common Output Format, and a proof of concept implementation, pdns-qof-server, that describes a recommened JSON format for passive DNS data. passivedns-client is very close to supporting it, but since I've never enteracted with a true implementation of this RFC, I can't attest that I could correctly parse it. I think they way that they can encode multiple results into one record would actually break what I have right now.
Right now, I'm in a wait and see mode with how this progresses before I start supporting yet another format or request that other providers start to adhere to a common output format. If you have thoughts on the matter, I would love to discuss.
- Fork it
- Create your feature branch (
git checkout -b my-new-feature
) - Commit your changes (
git commit -am 'Add some feature'
) - Push to the branch (
git push origin my-new-feature
) - Create new Pull Request