Historic Shodan Scanner is a simply Python utility that takes a range of IP addresses and queries Shodan for its historic Port and CVE data. This is useful to quickly assess the exposure of a Public IP estate during a cyber security incident.
Historic Shodan Scanner requires the following modules:
- shodan
- IPNetwork
You will need to activate your Shodan API integration prior to running the script, for example, by running shodan init [API_TOKEN]
.
All credit to development goes to @Luke-Dyer and @AidanStrong for supporting.
- Input the IP ranges you want to scan in ranges.txt
- Run the script
- Scan_result.csv will contain a timeline of identified events