2024-03-17 06:11:26 +00:00
2024-03-04 02:04:31 +01:00
2024-03-10 12:34:24 +00:00
2024-03-17 06:11:26 +00:00
2024-03-04 01:41:29 +01:00
2024-03-03 23:40:11 +01:00
2024-03-03 12:47:32 +01:00
2024-03-14 16:27:32 +01:00
2024-03-03 17:51:12 +01:00
2024-03-03 12:56:16 +01:00
2024-02-29 14:35:24 +01:00
2024-03-03 15:36:43 +01:00
2024-03-03 23:40:11 +01:00
2024-03-03 23:51:32 +01:00
2024-03-04 02:02:17 +01:00

Russian government agencies and their associated networks.

This repository contains Python scripts that allow you to retrieve network lists based on either an Autonomous System (AS) name or a Network name. Also you can download and parse the whole RIPE database to get information about Networks for the further analysis.

Files and features

  • network_list_from_as.py: Retrieves a list of networks associated with a given AS name.

  • network_list_from_netname.py: Retrieves a list of networks associated with a given Network name.

  • get_info_from_ripe.py: Retrieves information about Russian AS numbers and Networks from RIPE database for the further analysis.

  • get_description.py: Retrieves network names, AS names and organisation names from RIPE. Updates te lists in the folder auto/.

  • parse_ripe_db.py: Parses the whole RIPE database to get information about Networks for the further analysis.

  • Contributors are welcome!

    • lists/ru-gov-netnames.txt: A list of network names associated with the Russian government.
    • lists/ru-gov-asns.txt: A list of AS numbers associated with the Russian government.
  • blacklist_updater.sh: Static blacklist updater.

  • blacklists/blacklist.txt: Static daily generated blacklist!

  • blacklists/blacklist_with_comments.txt: Static daily generated blacklist with comments!

  • auto/all-ru-*.txt: Static monthly generated lists of Russian networks and ASNs!

  • auto/ripe-ru-*.txt: Static weekly generated lists of Russian networks from RIPE database!

image

These scripts have been tested on MacOS, FreeBSD and Linux.

Prerequisites

Installation

  1. Clone this repository:

    git clone https://github.com/C24Be/AS_Network_List.git
    
  2. Navigate to the repository folder:

    cd AS_Network_List
    
  3. Install the required Python packages:

    ./requirements.sh
    

    If this step causes issue PEP 668 due to python version >=3.12 and you're unfamiliar with virtual environments, use this workaround:

    pip install -r requirements.txt --break-system-packages
    

Usage

network_list_from_as.py

  1. Run the script with the AS number as an argument:

    ./network_list_from_as.py AS61280
    
  2. Run the script with a URL to a file in a GitHub repository as an argument:

    ./network_list_from_as.py https://github.com/C24Be/AS_Network_List/blob/main/lists/ru-gov-asns.txt
    

    Or better use the raw file link:

    ./network_list_from_as.py https://raw.githubusercontent.com/C24Be/AS_Network_List/main/lists/ru-gov-asns.txt
    
  3. To display a help message, use the -h or --help switch:

    ./network_list_from_as.py --help
    

network_list_from_netname.py

  1. Run the script with a file containing a list of network names as an argument:

    ./network_list_from_netname.py lists/ru-gov-netnames.txt
    
  2. Run the script with a URL to a file in a GitHub repository as an argument:

    ./network_list_from_netname.py https://github.com/C24Be/AS_Network_List/blob/main/lists/ru-gov-netnames.txt
    

    Or better use the raw file link:

    ./network_list_from_netname.py https://raw.githubusercontent.com/C24Be/AS_Network_List/main/lists/ru-gov-netnames.txt
    
  3. To display a help message, use the -h or --help switch:

    ./network_list_from_netname.py --help
    

Screenshots

image image

Additional information

Contributing

We are welcome contributions! Feel free to submit a pull request or open an issue.

Description
Blacklists generator of subnets of Russian government agencies for blocking them on one's servers.
Readme BSD-2-Clause 138 MiB
Languages
Python 69.2%
Shell 30.8%