Skip to content

curated-intel/Attribution-to-IP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

55 Commits
 
 

Repository files navigation

Attribution to IP

  • A collection of methods to learn who the owner of an IP address is.
  • The reason for this could be for the IP being victimised in an attack, being currently compromised, or having security misconfigurations and could be attacked.
  • These methods are useful for cyber threat intelligence (CTI) analysts performing victim notifications or security researchers working on bug bounty programs.

OSINT & Freemium Services

Note

These are free methods, but paid accounts may be available for some of these services for more information, authenticated APIs, and higher rate limits.

Method Description Source(s)
Passive DNS (pDNS) Shows historical DNS resolutions for an IP and allows you to identify domains that have pointed to the IP. ViewDNS.info / VirusTotal / OTX AlienVault / Mnemonic / DNSlytics / subdomainfinder / Validin / SilentPush / Driftnet / SecurityTrails / Rapid7 Project Sonar
Domain DNS Records Includes A, PTR, MX, TXT, and CNAME records. PTR records can reveal the hostname; TXT and MX can give clues about the domain’s owner or provider. ViewDNS.info / CentralOps / DNSlytics / DNSDumpster / VirusTotal / Validin / SilentPush / Driftnet / SecurityTrails / Rapid7 Project Sonar
IP WHOIS Queries registrar and network block registration info. Can directly identify the entity or ISP that registered the IP range. ViewDNS.info / DomainTools / CentralOps / Who.is / IPVOID / VirusTotal / Validin / SilentPush / ZoomEye / SANS ISC
Open Ports & Running Services Scanning the IP for accessible ports and services. Banner grabbing can reveal software, versions, and sometimes organization names. Shodan / FOFA / Censys / Onyphe / Modat / Odin / IPVOID / Driftnet / ZoomEye / Rapid7 Project Sonar
X509 Certificates Examine SSL certs served on open HTTPS ports. Certs often contain domains, email addresses, or organization names. Certificate Search / Certstream / Shodan / Censys / Modat / Odin / Validin / SilentPush / Driftnet / Rapid7 Project Sonar
Autonomous System Names (ASNs) ASNs describe ownership of blocks of IP addresses. Helps identify the ISP, hosting provider, or large organization behind a network. Team Cymru / IPinfo / InfoByIP / IPQS / Shodan / FOFA / Censys / Onyphe / Modat / Odin / IPVOID / Cloudflare Radar / VirusTotal / Driftnet / ZoomEye / SilentPush
IP Geolocation Maps IP to approximate physical location. Helps determine country or city, which may assist in narrowing the scope of who the owner is. MaxMind / IPinfo / InfoByIP / IPQS / Shodan / FOFA / Censys / Onyphe / Odin / IPVOID / Cloudflare Radar / SilentPush
Border Gateway Protocol (BGP) BGP announcements tell you who is routing the IP block and confirms the autonomous system or network managing the address. BGP Hurricane Electric / BGP Tools / Qrator Radar / BGPView
Content Archives Archived content of websites on the IP or screenshots of the services on the IP and may show earlier branding, contact info, or domains before a site changed. URLscan / Wayback Machine / Shodan / SilentPush / WebPageTest
Manual Browsing Visiting the IP directly in a browser can sometimes reveals landing pages, admin panels, or redirect behavior with company names or logos. Browserling / ANY.RUN
Google Dorking Use advanced search engine operators to find references to the IP online search engine results that could be used to identify its owner. Google Dork Examples / VirusTotal
Code Repositories Search in code repositories for references to the IP as the developers sometimes hardcode IPs in their code and configuration files. GitHub / BitBucket
Linked to Tor Nodes, VPNs, or Proxies Checking in lists of Tor, VPNs, or Proxy nodes suggests the IP is not owned by a specific end-user but part of a privacy or anonymisation network. TOR Node List / IPQS / Spur / IP2PROXY / Proxycheck.io / SilentPush
Cloud Storage Cloud storage buckets may contain config files, logs, build artifacts, or naming conventions that tie back to the IP owner. GrayHatWarfare / Odin
IP Behaviours Honeypot networks and crowdsourced reporting sites can also help discern what an IP is doing and who owns it based on it's observed interactions with honeypot and victim IPs. GreyNoise / AbuseIPDB / CrowdSec / Project Honeypot / SANS ISC
Security TXT Records Querying the IP directly can reveal the security TXT file at .well_known/security.txt or /security.txt paths on a host ip. DNS implementations also exist for security TXT files, these can be found as DNS TXT records. Browserling / Mxtoolbox / urlscan / security txt / dns security txt
Cryptocurrency Network Nodes Lists of IPs used for publicly distributed networks supporting cryptocurrency mining and ledger recording activities. Bitnodes.io / Ethernodes.org
Service Provider IP Ranges Lists of IP addresses reported as belonging to Cloud, CDN, and other service providers. Cloudflare / Oracle / GitHub / Microsoft Azure / Microsoft 365 / Google Cloud / Amazon Web Services / Fastly / Imperva / Akamai

Commercial

Warning

These are paid services only typically available for enterprises or public sector organisations and provide more information and authenticated APIs.

Method Description Source(s)
NetFlow NetFlow captures metadata about traffic flows (source/destination IPs, ports, protocol, timestamps) and can be used to track communication patterns, peer IPs, and usage behavior. Repeated traffic between an IP and a corporate network could indicate ownership. Team Cymru Pure Signal
Breach Data Breach Data includes leaked credentials, config files, and service records from compromised systems and could be used to directly connect an IP to an email address, domain, or username and imply corporate ownership. SpyCloud / AmIBreached / Intelx / Dehashed / Socradar / Hudsonrock
Internet Scraping Databases Internet scraping databases collect, store, and index citations from the darkweb, cybercrime forum posts, messaging services, paste sites, legit news sites, and technical blogs, among other sources. They may have data on IP addresses such as where they were first and last mentioned and in what context. Recorded Future / Anomali ThreatStream / Intel471 / Flashpoint / Cyble

Additional Resources

  • Pivot Atlas - A list of various tools and platforms that enable different types of pivots on different types of data.
  • IOC Vetting Sources - A list of various tools and platforms to check the reputation of an IP address.
  • ThreatFox - ThreatFox is a platform from abuse.ch and Spamhaus dedicated to sharing indicators of compromise (IOCs) associated with malware, with the infosec community, AV vendors and cyber threat intelligence providers. Upload IOCs and explore the database for valuable intelligence. Use the APIs to seamlessly push and pull signals, and automate bulk queries.

Special Credits

  • Thanks to Dan, Conor, and Josh from Team Cymru
  • Thanks to Amitai and Ralph from Curated Intel

About

A collection of methods to learn who the owner of an IP address is.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published