IP反查域名工具简称:IPgo,模仿(抄袭)subfinder实现

Related tags

iplookup
Overview

iplookup

简介

IP反查域名工具简称:IPgo,模仿(抄袭)subfinder实现

主要接口

使用说明

有些接口会有历史绑定域名,默认提取50个域名防止查询CDN域名数量过多

可自行设置阈值-count 9999

查询过多会导致IP被封,建议搭配代理使用

可以搭配httpx,nuclei等工具食用效果更佳

以下接口需要设置 API 密钥。

usege

常规用法

echo 1.1.1.1 | ipgo 
cat ips.txt | ipgo -oD out
#搭配httpx使用
ipgo.exe -i 1.1.1.1 -silent | httpx -title -ip -content-length -status-code -tech-detect -random-agent
#设置阈值 
ipgo.exe -count 9999 -iL ips.txt -oD out  

编译命令

make build-all

完整参数

C:\Users\administrator
λ ipgo

  _       _             _
 (_)_ __ | | ___   ___ | | ___   _ _ __
 | | '_ \| |/ _ \ / _ \| |/ / | | | '_ \
 | | |_) | | (_) | (_) |   <| |_| | |_) |
 |_| .__/|_|\___/ \___/|_|\_\\__,_| .__/
   |_|                            |_|      v1.0

[FTL] Program exiting: no input list provided

C:\Users\ot
λ ipgo -h
Usage of ipgo:
  -all
        Use all sources (slow) for enumeration
  -config string
        Configuration file for API Keys, etc (default "C:\\Users\\administrator/.config/iplookup/config.yaml")
  -count int
          Number of domain name thresholds (default 50)
  -exclude-sources string
        List of sources to exclude from enumeration
  -i string
        ip to find domain for
  -iL string
        File containing list of ips to enumerate
  -json
        Write output in JSON lines Format
  -max-time int
        Minutes to wait for enumeration results (default 10)
  -nC
        Don't Use colors in output
  -o string
        File to write output to (optional)
  -oD string
        Directory to write enumeration results to (optional)
  -silent
        Show only subdomains in output
  -sources string
        Comma separated list of sources to use
  -t int
        Number of concurrent goroutines for resolving (default 10)
  -timeout int
        Seconds to wait before timing out (default 30)
  -v    Show Verbose output
  -version

一个示例配置文件 $HOME/.config/iplookup/config.yaml

sources:
    - webscan
    - rapiddns
    - ip138
    - yougetsignal
    - aizhan
    - chinaz
    - viewdns
    - c99
    - bugscaner
    - hackertarget
    - dnslytics
    - omnisint
    - dnsgrep
    - domaintools
    - securitytrails
all-sources:
    - webscan
    - rapiddns
    - ip138
    - yougetsignal
    - aizhan
    - c99
    - chinaz
    - viewdns
    - bugscaner
    - hackertarget
    - dnslytics
    - omnisint
    - dnsgrep
    - domaintools
    - securitytrails
proxy: "http://127.0.0.1:8080/" 
dnsgrep: []
c99:
    - XXXXX-XXXXX-XXXXX-XXXXX
iplookup-version: "1.0"

参考

https://github.com/projectdiscovery/subfinder

Issues