Luis Muñoz > Mail-Abuse > maps-scan

Download:
Mail-Abuse-1.026.tar.gz

Annotate this POD

CPAN RT

New  1
Open  0
View/Report Bugs
Source  

NAME ^

maps-scan - Checks listing status on mail-abuse.org's RBLs

SYNOPSIS ^

    maps-scan [-h] [-d delay] [-v] [-m regexp] [-M regexp] IPs

DESCRIPTION ^

This script automates the task of verifying that your address space is in one of the mail-abuse.org's RBL. You can supply a single host, a subnet or a list of hosts or subnets in the command line. Every host is listed against said RBLs.

Queries are done through HTTP, as these lists are in the process of becoming private.

Do not abuse this script

In general, it is not polite to send large numbers of queries to a host, as this might be interpreted as an attack. Use this scipt judiciously and avoid long and repeated queries.

Note that mail-abuse.org has a limit on the number of queries allowed per hour. If you need to scan an address block using this tool, you should probably use a delay of a few minutes between queries, using the -d option.

The following options are recognized:

-h

Outputs this documentation.

-d delay

Delay in seconds between a set of queries to the RBLs. Defaults to 60 seconds, which is ok for ocassional scans of a few addresses. If you need to scan larger blocks, increase the delay so that the abuse prevention mechanisms don not block you.

-m regexp

Only query RBLs whose tags match the given regular expression.

-M regexp

Similar to -m, but the regexp must not match to use the given RBL.

This is very useful as there are some RBLs that match a significant proportion of the address space or that are not helpful in your particular scenario.

Another potential use of -M and -m, is to taylor the list of RBLs to search in order to speed up the lookups. This is specially true if you are interested in a scan of a large piece of address space.

-v

Be verbose about progress.

HISTORY ^

Oct, 2003

First version of this code.

LICENSE AND WARRANTY ^

This code and all accompanying software comes with NO WARRANTY. You use it at your own risk.

This code and all accompanying software can be used freely under the same terms as Perl itself.

AUTHOR ^

Luis E. Muñoz <luismunoz@cpan.org>

SEE ALSO ^

perl(1), LWP::RobotUA(3)

syntax highlighting: