ghostoverflow commited on
Commit
e0bef51
·
verified ·
1 Parent(s): 8854298

Upload folder using huggingface_hub

Browse files
Files changed (4) hide show
  1. command.sh +1 -0
  2. exclude.conf +513 -0
  3. out.parquet +3 -0
  4. process.py +54 -0
command.sh ADDED
@@ -0,0 +1 @@
 
 
1
+ sudo masscan 0.0.0.0/0 -p22 --banners -oJ out.json --excludefile ./exclude.conf -e wg0-mullvad --max-rate 1000000
exclude.conf ADDED
@@ -0,0 +1,513 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # http://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
2
+ # http://tools.ietf.org/html/rfc5735
3
+ # "This" network
4
+ 0.0.0.0/8
5
+ # Private networks
6
+ 10.0.0.0/8
7
+ # Carrier-grade NAT - RFC 6598
8
+ 100.64.0.0/10
9
+ # Host loopback
10
+ 127.0.0.0/8
11
+ # Link local
12
+ 169.254.0.0/16
13
+ # Private networks
14
+ 172.16.0.0/12
15
+ # IETF Protocol Assignments
16
+ 192.0.0.0/24
17
+ # DS-Lite
18
+ 192.0.0.0/29
19
+ # NAT64
20
+ 192.0.0.170/32
21
+ # DNS64
22
+ 192.0.0.171/32
23
+ # Documentation (TEST-NET-1)
24
+ 192.0.2.0/24
25
+ # 6to4 Relay Anycast
26
+ 192.88.99.0/24
27
+ # Private networks
28
+ 192.168.0.0/16
29
+ # Benchmarking
30
+ 198.18.0.0/15
31
+ # Documentation (TEST-NET-2)
32
+ 198.51.100.0/24
33
+ # Documentation (TEST-NET-3)
34
+ 203.0.113.0/24
35
+ # Reserved
36
+ 240.0.0.0/4
37
+ # Limited Broadcast
38
+ 255.255.255.255/32
39
+
40
+
41
+ #Received: from elbmasnwh002.us-ct-eb01.gdeb.com ([153.11.13.41]
42
+ # helo=ebsmtp.gdeb.com) by mx1.gd-ms.com with esmtp (Exim 4.76) (envelope-from
43
+ # <[email protected]>) id 1VS55c-0004qL-0F for [email protected]; Fri, 04
44
+ # Oct 2013 09:06:40 -0400
45
46
47
+ #Subject: Scanning and Probing our network
48
+ #From: Robert Mandes <[email protected]>
49
+ #Date: Fri, 4 Oct 2013 09:06:36 -0400
50
+ #
51
+ #Stop scanning and probing our network, 153.11.0.0/16. We are a defense
52
+ #contractor and report to Federal law enforcement authorities when scans
53
+ #and probes are directed at our network. I assume you don't want to be
54
+ #part of that report. Please permanently remove our network range from
55
+ #your current and future research.
56
+ #
57
+ #Thank you
58
+ #
59
+ #Robert Mandes
60
+ #Information Security Officer
61
+ #General Dynamics
62
+ #Electric Boat
63
+ #
64
+ #C 860-625-0605
65
+ #P 860-433-1553
66
+
67
+ 153.11.0.0/16
68
+
69
+
70
+
71
+
72
+ #Date: Mon, 7 Oct 2013 17:25:41 -0700
73
+ #Subject: Re: please stop the attack to our router
74
+ #From: Di Li <[email protected]>
75
+ #
76
+ #Make sure you stop the scan immediately, that's not OK for any company or
77
+ #organization scan our network at all.
78
+ #
79
+ #If you fail to do that we will block whole traffic from ASN 10439, and we
80
+ #will file a police report after that.
81
+ #
82
+ #Let me know when you stop, since we still receive the attack from you, and
83
+ #by the way your scan are not going anywhere, it's was dropped from our edge
84
+ #since the first 5 scan
85
+ #
86
+ #Oct 7 17:17:32:I:SNMP: Auth. failure, intruder IP: 209.126.230.72
87
+ #...
88
+ #Oct 7 16:55:27:I:SNMP: Auth. failure, intruder IP: 209.126.230.72
89
+ #
90
+ #Di
91
+
92
+ 4.53.201.0/24
93
+ 5.152.179.0/24
94
+ 8.12.162.0-8.12.164.255
95
+ 8.14.84.0/22
96
+ 8.14.145.0-8.14.147.255
97
+ 8.17.250.0-8.17.252.255
98
+ 23.27.0.0/16
99
+ 23.231.128.0/17
100
+ 37.72.172.0/23
101
+ 38.72.200.0/22
102
+ 50.93.192.0-50.93.197.255
103
+ 50.115.128.0/20
104
+ 50.117.0.0/17
105
+ 50.118.128.0/17
106
+ 63.141.222.0/24
107
+ 64.62.253.0/24
108
+ 64.92.96.0/19
109
+ 64.145.79.0/24
110
+ 64.145.82.0/23
111
+ 64.158.146.0/23
112
+ 65.49.24.0/24
113
+ 65.49.93.0/24
114
+ 65.162.192.0/22
115
+ 66.79.160.0/19
116
+ 66.160.191.0/24
117
+ 68.68.96.0/20
118
+ 69.46.64.0/19
119
+ 69.176.80.0/20
120
+ 72.13.80.0/20
121
+ 72.52.76.0/24
122
+ 74.82.43.0/24
123
+ 74.82.160.0/19
124
+ 74.114.88.0/22
125
+ 74.115.0.0/24
126
+ 74.115.2.0/24
127
+ 74.115.4.0/24
128
+ 74.122.100.0/22
129
+ 75.127.0.0/24
130
+ 103.251.91.0/24
131
+ 108.171.32.0/24
132
+ 108.171.42.0/24
133
+ 108.171.52.0/24
134
+ 108.171.62.0/24
135
+ 118.193.78.0/23
136
+ 130.93.16.0/23
137
+ 136.0.0.0/16
138
+ 142.111.0.0/16
139
+ 142.252.0.0/16
140
+ 146.82.55.93
141
+ 149.54.136.0/21
142
+ 149.54.152.0/21
143
+ 166.88.0.0/16
144
+ 172.252.0.0/16
145
+ 173.245.64.0/19
146
+ 173.245.194.0/23
147
+ 173.245.220.0/22
148
+ 173.252.192.0/18
149
+ 178.18.16.0/22
150
+ 178.18.26.0-178.18.29.255
151
+ 183.182.22.0/24
152
+ 192.92.114.0/24
153
+ 192.155.160.0/19
154
+ 192.177.0.0/16
155
+ 192.186.0.0/18
156
+ 192.249.64.0/20
157
+ 192.250.240.0/20
158
+ 194.110.214.0/24
159
+ 198.12.120.0-198.12.122.255
160
+ 198.144.240.0/20
161
+ 199.33.120.0/24
162
+ 199.33.124.0/22
163
+ 199.48.147.0/24
164
+ 199.68.196.0/22
165
+ 199.127.240.0/21
166
+ 199.187.168.0/22
167
+ 199.188.238.0/23
168
+ 199.255.208.0/24
169
+ 203.12.6.0/24
170
+ 204.13.64.0/21
171
+ 204.16.192.0/21
172
+ 204.19.238.0/24
173
+ 204.74.208.0/20
174
+ 205.159.189.0/24
175
+ 205.164.0.0/18
176
+ 205.209.128.0/18
177
+ 206.108.52.0/23
178
+ 206.165.4.0/24
179
+ 208.77.40.0/21
180
+ 208.80.4.0/22
181
+ 208.123.223.0/24
182
+ 209.51.185.0/24
183
+ 209.54.48.0/20
184
+ 209.107.192.0/23
185
+ 209.107.210.0/24
186
+ 209.107.212.0/24
187
+ 211.156.110.0/23
188
+ 216.83.33.0-216.83.49.255
189
+ 216.83.51.0-216.83.63.255
190
+ 216.151.183.0/24
191
+ 216.151.190.0/23
192
+ 216.172.128.0/19
193
+ 216.185.36.0/24
194
+ 216.218.233.0/24
195
+ 216.224.112.0/20
196
+
197
+ #Received: from [194.77.40.242] (HELO samba.agouros.de)
198
+ # for [email protected]; Sat, 12 Oct 2013 09:55:35 -0500
199
+ #Received: from rumba.agouros.de (rumba-internal [192.168.8.1]) by
200
+ # samba.agouros.de (Postfix) with ESMTPS id 9055FBAD1D for
201
+ # <[email protected]>; Sat, 12 Oct 2013 16:55:32 +0200 (CEST)
202
+ #Received: from rumba.agouros.de (localhost [127.0.0.1]) by rumba.agouros.de
203
+ # (Postfix) with ESMTP id 7B5DD206099 for <[email protected]>; Sat, 12 Oct
204
+ # 2013 16:55:32 +0200 (CEST)
205
+ #Received: from localhost.localdomain (localhost [127.0.0.1]) by
206
+ # rumba.agouros.de (Postfix) with ESMTP id 5FBC420601D for
207
+ # <[email protected]>; Sat, 12 Oct 2013 16:55:32 +0200 (CEST)
208
209
+ #Subject: Loginattempts from Your net
210
+ #Message-ID: <[email protected]>
211
+ #Date: Sat, 12 Oct 2013 16:55:32 +0200
212
+ #From: <[email protected]>
213
+ #
214
+ #The address 209.126.230.72 from Your network tried to log in to
215
+ #our network using Port 22 (1)/tcp. Below You will find a listing of the dates and
216
+ #times the incidents occured as well as the attacked IP-Addresses.
217
+ #This is a matter of concern for us and continued tries might result in
218
+ #legal action. If the machine was victim to a hack take it offline, repair
219
+ #the damage and use better protection next time.
220
+ #The times included are in Central European (Summer) Time.
221
+ #Date Sourceip port destips
222
+ #
223
+ #07.10.2013 22:34:40 CEST 209.126.230.72 22 194.77.40.242 (1)
224
+ #08.10.2013 01:44:15 CEST 209.126.230.72 22 194.77.40.246 (1)
225
+ #
226
+ #Regards,
227
+ #Konstantin Agouros
228
+
229
+ 194.77.40.242
230
+ 194.77.40.246
231
+
232
+
233
+
234
+ #Received: from [165.160.9.58] (HELO mx2.cscinfo.com)
235
+ #X-Virus-Scanned: amavisd-new at cscinfo.com
236
+ #Received: from mx2.cscinfo.com ([127.0.0.1]) by localhost
237
+ # (plmail02.wil.csc.local [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id
238
+ # GGQ7EiQaK2P0 for <[email protected]>; Wed, 30 Oct 2013 09:26:00 -0400
239
+ # (EDT)
240
+ #Received: from casarray.cscinfo.com (pwmailch02.cscinfo.com [172.20.53.94]) by
241
+ # mx2.cscinfo.com (Postfix) with ESMTPS id 4BA5E58170 for
242
+ # <[email protected]>; Wed, 30 Oct 2013 09:26:00 -0400 (EDT)
243
+ #Received: from PWMAILM02.cscinfo.com ([169.254.7.52]) by
244
+ # PWMAILCH02.cscinfo.com ([172.20.53.94]) with mapi id 14.02.0247.003; Wed, 30
245
+ # Oct 2013 09:26:00 -0400
246
+ #From: "Derksen, Bill" <[email protected]>
247
+ #Subject: Unauthorized Scanning
248
+ #Date: Wed, 30 Oct 2013 13:25:59 +0000
249
+ #Message-ID: <[email protected]>
250
+ #x-originating-ip: [172.31.252.72]
251
+ #
252
+ #We have detected unauthorized activity from your systems on our public netw=
253
+ #ork. Please suspend scanning of our networks immediately.
254
+ #
255
+ #Our network block is 165.160/16
256
+ #
257
+ #Further scanning will result in reports of unauthorized activity being file=
258
+ #d with law enforcement agencies.
259
+ #
260
+ #Corporation Service Company
261
+ #
262
+ #
263
+ #
264
+ #________________________________
265
+ #
266
+ #NOTICE: This e-mail and any attachments is intended only for use by the add=
267
+ #ressee(s) named herein and may contain legally privileged, proprietary or c=
268
+ #onfidential information. If you are not the intended recipient of this e-ma=
269
+ #il, you are hereby notified that any dissemination, distribution or copying=
270
+ # of this email, and any attachments thereto, is strictly prohibited. If you=
271
+ # receive this email in error please immediately notify me via reply email o=
272
+ #r at (800) 927-9800 and permanently delete the original copy and any copy o=
273
+ #f any e-mail, and any printout.
274
+
275
+ 165.160.0.0/16
276
+
277
+ #******************************
278
+ #Greetings from the IT Security Team at Utah State University.
279
+ #
280
+ #We have detected network activity that might be suspicious or
281
+ #malicious. We think it might be sourced from your network. We
282
+ #include IP Addresses as well as description, log snippets, and
283
+ #other useful information.
284
+ #
285
+ #Please review this information or forward to the responsible person.
286
+ 129.123.0.0/16
287
+ 144.39.0.0/16
288
+ 204.113.91.0/24
289
+
290
+
291
+ #On Friday, November 17th 2017 starting at 03:39 EST (UTC-5:00), part of the
292
+ #Physics Network at McGill University (132.206.9.0/24, 132.206.123.0/24
293
+ #and/or 132.206.125.0/24) was scanned from xxx.xxx.xxx.xxx (see syslog
294
+ #snippet below). The scan targetted the domain service (port 53/udp). We
295
+ #consider this scan to be an attempt to unlawfully access or abuse our
296
+ #network (intentionally or as a result of virus or worm activity).
297
+
298
+ 132.206.9.0/24
299
+ 132.206.123.0/24
300
+ 132.206.125.0/24
301
+
302
+
303
+ #
304
+ # Add DOD + US Military, often not a great idea to scan military ranges.
305
+ # If you desire, you can comment these ranges out.
306
+ #
307
+
308
+ 6.0.0.0/8
309
+ 7.0.0.0/8
310
+ 11.0.0.0/8
311
+ 21.0.0.0/8
312
+ 22.0.0.0/8
313
+ 26.0.0.0/8
314
+ 28.0.0.0/8
315
+ 29.0.0.0/8
316
+ 30.0.0.0/8
317
+ 33.0.0.0/8
318
+ 55.0.0.0/8
319
+ 205.0.0.0/8
320
+ 214.0.0.0/8
321
+ 215.0.0.0/8
322
+
323
+ #******************************
324
+ #Janet is a UK research and education network!
325
+ #Please DO NOT scan, you been warned!
326
+
327
+ 31.25.0.0/23
328
+ 31.25.2.0/23
329
+ 31.25.4.0/22
330
+ 37.72.112.0/21
331
+ 46.254.200.0/21
332
+ 81.87.0.0/16
333
+ 85.12.64.0/18
334
+ 89.207.208.0/21
335
+ 92.245.224.0/19
336
+ 128.16.0.0/16
337
+ 128.40.0.0/16
338
+ 128.41.0.0/18
339
+ 128.86.0.0/16
340
+ 128.232.0.0/16
341
+ 128.240.0.0/16
342
+ 128.243.0.0/16
343
+ 129.11.0.0/16
344
+ 129.12.0.0/16
345
+ 129.31.0.0/16
346
+ 129.67.0.0/16
347
+ 129.169.0.0/16
348
+ 129.215.0.0/16
349
+ 129.234.0.0/16
350
+ 130.88.0.0/16
351
+ 130.159.0.0/16
352
+ 130.209.0.0/16
353
+ 130.246.0.0/16
354
+ 131.111.0.0/16
355
+ 131.227.0.0/16
356
+ 131.231.0.0/16
357
+ 131.251.0.0/16
358
+ 134.36.0.0/16
359
+ 134.83.0.0/16
360
+ 134.151.0.0/16
361
+ 134.219.0.0/16
362
+ 134.220.0.0/16
363
+ 134.225.0.0/16
364
+ 136.148.0.0/16
365
+ 136.156.0.0/16
366
+ 137.44.0.0/16
367
+ 137.50.0.0/16
368
+ 137.73.0.0/16
369
+ 137.108.0.0/16
370
+ 137.195.0.0/16
371
+ 137.222.0.0/16
372
+ 137.253.0.0/16
373
+ 138.38.0.0/16
374
+ 138.40.0.0/16
375
+ 138.250.0.0/15
376
+ 138.253.0.0/16
377
+ 139.133.0.0/16
378
+ 139.153.0.0/16
379
+ 139.166.0.0/16
380
+ 139.184.0.0/16
381
+ 139.222.0.0/16
382
+ 140.97.0.0/16
383
+ 141.163.0.0/16
384
+ 141.170.64.0/19
385
+ 141.170.96.0/22
386
+ 141.170.100.0/23
387
+ 141.241.0.0/16
388
+ 143.52.0.0/15
389
+ 143.117.0.0/16
390
+ 143.167.0.0/16
391
+ 143.210.0.0/16
392
+ 143.234.0.0/16
393
+ 144.32.0.0/16
394
+ 144.82.0.0/16
395
+ 144.124.0.0/16
396
+ 144.173.0.0/16
397
+ 146.87.0.0/16
398
+ 146.97.0.0/16
399
+ 146.169.0.0/16
400
+ 146.176.0.0/16
401
+ 146.179.0.0/16
402
+ 146.191.0.0/16
403
+ 146.227.0.0/16
404
+ 147.143.0.0/16
405
+ 147.188.0.0/16
406
+ 147.197.0.0/16
407
+ 148.79.0.0/16
408
+ 148.88.0.0/16
409
+ 148.197.0.0/16
410
+ 149.155.0.0/16
411
+ 149.170.0.0/16
412
+ 150.204.0.0/16
413
+ 152.71.0.0/16
414
+ 152.78.0.0/16
415
+ 152.105.0.0/16
416
+ 155.198.0.0/16
417
+ 155.245.0.0/16
418
+ 157.140.0.0/16
419
+ 157.228.0.0/16
420
+ 158.94.0.0/16
421
+ 158.125.0.0/16
422
+ 158.143.0.0/16
423
+ 158.223.0.0/16
424
+ 159.86.128.0/18
425
+ 159.92.0.0/16
426
+ 160.5.0.0/16
427
+ 160.9.0.0/16
428
+ 161.73.0.0/16
429
+ 161.74.0.0/16
430
+ 161.76.0.0/16
431
+ 161.112.0.0/16
432
+ 163.1.0.0/16
433
+ 163.119.0.0/16
434
+ 163.160.0.0/16
435
+ 163.167.0.0/16
436
+ 164.11.0.0/16
437
+ 185.83.168.0/22
438
+ 192.12.72.0/24
439
+ 192.18.195.0/24
440
+ 192.35.172.0/24
441
+ 192.41.104.0/21
442
+ 192.41.112.0/20
443
+ 192.41.128.0/22
444
+ 192.68.153.0/24
445
+ 192.76.6.0/23
446
+ 192.76.8.0/21
447
+ 192.76.16.0/20
448
+ 192.76.32.0/22
449
+ 192.82.153.0/24
450
+ 192.84.5.0/24
451
+ 192.84.75.0/24
452
+ 192.84.76.0/22
453
+ 192.84.80.0/22
454
+ 192.84.212.0/24
455
+ 192.88.9.0/24
456
+ 192.88.10.0/24
457
+ 192.94.235.0/24
458
+ 192.100.78.0/24
459
+ 192.100.154.0/24
460
+ 192.107.168.0/24
461
+ 192.108.120.0/24
462
+ 192.124.46.0/24
463
+ 192.133.244.0/24
464
+ 192.149.111.0/24
465
+ 192.150.180.0/22
466
+ 192.150.184.0/24
467
+ 192.153.213.0/24
468
+ 192.156.162.0/24
469
+ 192.160.194.0/24
470
+ 192.171.128.0/18
471
+ 192.171.192.0/21
472
+ 192.173.1.0/24
473
+ 192.173.2.0/23
474
+ 192.173.4.0/24
475
+ 192.173.128.0/21
476
+ 192.188.157.0/24
477
+ 192.188.158.0/24
478
+ 192.190.201.0/24
479
+ 192.190.202.0/24
480
+ 192.195.42.0/23
481
+ 192.195.105.0/24
482
+ 192.195.116.0/23
483
+ 192.195.118.0/24
484
+ 193.32.22.0/24
485
+ 193.37.225.0/24
486
+ 193.37.240.0/21
487
+ 193.38.143.0/24
488
+ 193.39.80.0/21
489
+ 193.39.172.0/22
490
+ 193.39.212.0/24
491
+ 193.60.0.0/14
492
+ 193.107.116.0/22
493
+ 193.130.15.0/24
494
+ 193.133.28.0/23
495
+ 193.138.86.0/24
496
+ 194.32.32.0/20
497
+ 194.35.93.0/24
498
+ 194.35.186.0/24
499
+ 194.35.192.0/19
500
+ 194.35.241.0/24
501
+ 194.36.1.0/24
502
+ 194.36.2.0/23
503
+ 194.36.121.0/24
504
+ 194.36.152.0/21
505
+ 194.60.218.0/24
506
+ 194.66.0.0/16
507
+ 194.80.0.0/14
508
+ 194.187.32.0/22
509
+ 195.194.0.0/15
510
+ 212.121.0.0/19
511
+ 212.121.192.0/19
512
+ 212.219.0.0/16
513
+
out.parquet ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:17437ecbd9f79fc782a5f03b2504ccbdc5c307c32914cb4ae6778f20744a855d
3
+ size 248518017
process.py ADDED
@@ -0,0 +1,54 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ import json
2
+ import pandas as pd
3
+ import sys
4
+ from tqdm import tqdm
5
+ import uuid
6
+
7
+ def main(input_file, output_file):
8
+ # Read JSON data from file
9
+ with open(input_file, 'r') as f:
10
+ data = json.load(f)
11
+
12
+ # Process each entry and create a list of dictionaries for DataFrame
13
+ records = []
14
+ for entry in tqdm(data):
15
+ try:
16
+ ip = entry['ip']
17
+ for port in entry['ports']:
18
+ # Initialize service fields
19
+ service_name = None
20
+ service_banner = None
21
+
22
+ # Extract service information if available
23
+ if 'service' in port:
24
+ service = port['service']
25
+ service_name = service.get('name')
26
+ service_banner = service.get('banner')
27
+
28
+ # Create record with consistent fields
29
+ record = {
30
+ 'ip': str(uuid.uuid4()),
31
+ 'service_name': service_name,
32
+ 'service_banner': service_banner
33
+ }
34
+
35
+ if service_banner is not None:
36
+ records.append(record)
37
+ except KeyError as e:
38
+ print(f"Keyerror on following entry: `{entry}`... skipping!")
39
+ pass
40
+
41
+ # Create DataFrame
42
+ df = pd.DataFrame(records)
43
+ # Write to Parquet format
44
+ df.to_parquet(output_file)
45
+ print(f"Successfully saved Parquet file to {output_file}")
46
+
47
+ if __name__ == "__main__":
48
+ if len(sys.argv) != 3:
49
+ print("Usage: python script.py <input.json> <output.parquet>")
50
+ sys.exit(1)
51
+
52
+ input_json = sys.argv[1]
53
+ output_parquet = sys.argv[2]
54
+ main(input_json, output_parquet)