Skip to content

digininja/scanner_user_agents

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 

Repository files navigation

Scanner User Agents

The idea of this project is to collect a list of user agent strings used by common web application scanners, things like Nikto or Acunetix. These strings can then be used by defenders to block or play with attackers.

I've no idea what the best format for this is so I'm going to start with a very simple JSON object and see what happens.

{
  "ua": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36",
  "scanner": "Nikto",
  "version": "Github master branch",
  "last seen": "2022-06-23",
  "known ips": [
    "1.2.3.4",
	"2.3.4.5"
  ]
}

If you think this could be improved, please make suggestions sooner rather than later, I'd rather mess with the format at the start than in six months.

Updates

At a suggestion from a viewer, I've just added known scanner IP addresses to the structure. It won't be much use for the majority of tools, but bigger vendors, such as Acunetix, publish their scanner IPs and so including these may be of use.

Warning

Some of these scanners use the same UAs as legitimate browsers, for example Nikto, and so blindly blocking or messing with traffic based purely on items in this list could affect real users. Think before you use it.

The idea is based on a short Twitter chat with Daniel Cuthbert.

About

A list of user agents belonging to common web scanners.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •