Ayashige provides a list of suspicious newly registered domains as a JSON feed.
- It collects newly registered domains via WebAnalyzer, WhoisDS, DomainWatch and Certififate Transparency log servers.
- It computes a suspicious score of a given domain.
- The scoring rule comes from x0rz/phishing_catcher.
- It stores suspicious domains into a Redis instance.
- It provides suspicious domains as a JSON via
/feed
endpoint.
git clone https://github.com/ninoseki/ayashige
bundle install --path vendor/bundle
Please set following environment variables before using.
REDIS_HOST = YOUR_REDIS_HOST
REDIS_PORT = YOUR_REDIS_PORT
REDIS_PASSWORD = YOUR_REDIS_PASSWORD
# Grab domains from CT log servers
bundle exec ruby bin/ct_job.rb
# Grab domains from DomainWatch
bundle exec ruby bin/domain_watch_job.rb
# Grab domains from WebAnalyzer (it should be a daily job)
bundle exec ruby bin/web_analyzer_job.rb
# Grab domains from WhoisDS (it should be a daily job)
bundle exec ruby bin/whoisds_job.rb
- It checks a suspicious score of a given each domain and stores a suspicious one into a Redis instance with TTL 24 hours.
- You can specify your own default TTL via
DEFAULT_TTL
environment variable.
- You can specify your own default TTL via
bundle exec puma config.ru
-
Notes:
- This app is hosted on Heroku free dyno.
- I'm running this app just as a hobby and I cannot assure its consistency.
Bug reports and pull requests are welcome on GitHub at https://github.com/ninoseki/ayashige.
The gem is available as open source under the terms of the MIT License.