Nmap

Nmap蜘蛛/爬蟲屬於漏洞/病毒掃描型別,由Gordon Lyon開發執行。您可以繼續閱讀下方資訊,以深入瞭解Nmap基本資訊,使用者代理和訪問控制等。

基本資訊

Nmap的基本資訊如下表。但部分不是很規範的蜘蛛和爬蟲,可能存在資訊不明的情況。
蜘蛛/爬蟲名稱
Nmap
型別
漏洞/病毒掃描
開發商
Gordon Lyon
當前狀態
活動

使用者代理

關於Nmap蜘蛛或者爬蟲的使用者代理字串,IP地址和伺服器,所在地等資訊如下表格所示:
Nmap
使用者代理字串
Mozilla/5.0 (compatible; Nmap Scripting Engine; http://nmap.org/book/nse.html)
首次出現
2014-06-28 20:55:19
最後出現
2021-11-08 06:12:27
遵循robots.txt
未知
來源
IP地址(28) 伺服器名稱 所屬國家
154.6.25.101 ? US
78.128.112.10 ip-112-10.4vendeta.com BG
58.229.132.108 58.229.132.108 KR
190.42.95.46 190.42.95.46 PE
51.158.66.189 189-66-158-51.instances.scw.cloud FR
154.6.25.213 154.6.25.213 US
115.144.166.94 115.144.166.94 KR
94.158.80.118 host-118.hls.tv UA
94.158.80.126 host-126.hls.tv UA
94.158.80.114 host-114.hls.tv UA
124.129.5.234 124.129.5.234 CN
223.99.228.201 223.99.228.201 CN
221.1.222.114 221.1.222.114 CN
221.2.196.3 221.2.196.3 CN
208.100.26.232 ip232.208-100-26.static.steadfastdns.net US
208.100.26.231 ip231.208-100-26.static.steadfastdns.net US
208.100.26.230 ip230.208-100-26.static.steadfastdns.net US
185.100.87.191 ? RO
208.100.26.229 ip229.208-100-26.static.steadfastdns.net US
85.25.79.124 icsresearch3.plcscan.org DE
103.187.190.53 103.187.190.53 IN
103.187.190.32 103.187.190.32 IN
103.187.190.49 103.187.190.49 IN
103.187.190.46 103.187.190.46 IN
103.187.190.45 103.187.190.45 ?
103.187.190.4 103.187.190.4 IN
103.187.190.58 103.187.190.58 IN
103.187.190.59 103.187.190.59 IN
103.187.190.119 103.187.190.119 IN
172.104.51.254 172-104-51-254.ip.linodeusercontent.com SG
45.33.109.190 45-33-109-190.ip.linodeusercontent.com US
85.159.211.40 85-159-211-40.ip.linodeusercontent.com GB
172.105.20.227 172-105-20-227.ip.linodeusercontent.com CA
103.187.191.154 103.187.191.154 IN
103.187.191.161 103.187.191.161 IN
103.187.191.251 103.187.191.251 IN
103.187.191.255 103.187.191.255 IN
103.187.191.165 103.187.191.165 IN
34.27.40.85 85.40.27.34.bc.googleusercontent.com US
200.182.206.50 smtp.supportsglobal.com BR
103.187.191.153 103.187.191.153 ?
103.187.191.171 103.187.191.171 ?
103.187.191.225 103.187.191.225 ?
103.187.191.219 103.187.191.219 ?
103.187.191.139 103.187.191.139 ?
103.187.191.202 103.187.191.202 ?
103.187.191.178 103.187.191.178 ?
103.187.191.194 103.187.191.194 ?
103.187.191.212 103.187.191.212 ?
103.187.191.134 103.187.191.134 ?
51.15.108.158 158-108-15-51.instances.scw.cloud NL
103.187.191.222 103.187.191.222 IN
103.187.191.147 103.187.191.147 IN
103.187.191.160 103.187.191.160 IN
103.187.191.228 103.187.191.228 IN
103.187.191.210 103.187.191.210 IN
103.187.191.142 103.187.191.142 IN
34.78.6.216 216.6.78.34.bc.googleusercontent.com BE
34.78.120.99 99.120.78.34.bc.googleusercontent.com BE
103.187.191.170 103.187.191.170 ?
103.187.191.149 103.187.191.149 ?
103.187.191.226 103.187.191.226 ?
103.187.191.192 103.187.191.192 ?
103.187.191.155 103.187.191.155 ?
103.187.191.220 103.187.191.220 ?
103.187.191.223 103.187.191.223 IN
103.187.191.183 103.187.191.183 IN
103.187.191.217 103.187.191.217 IN
51.15.87.70 70-87-15-51.instances.scw.cloud NL
103.187.191.211 103.187.191.211 IN
103.187.191.140 103.187.191.140 IN
103.187.191.172 103.187.191.172 IN
103.187.191.168 103.187.191.168 IN
35.233.62.116 116.62.233.35.bc.googleusercontent.com BE
103.187.191.182 103.187.191.182 ?
103.187.191.196 103.187.191.196 ?
103.187.191.152 103.187.191.152 ?
103.187.191.138 103.187.191.138 ?
103.187.191.157 103.187.191.157 ?
103.187.191.133 103.187.191.133 ?
103.187.191.131 103.187.191.131 ?
103.187.191.197 103.187.191.197 ?
103.187.191.146 103.187.191.146 ?
3.101.216.99 ec2-3-101-216-99.us-west-1.compute.amazonaws.com US
3.101.226.148 ec2-3-101-226-148.us-west-1.compute.amazonaws.com US
3.101.216.122 ec2-3-101-216-122.us-west-1.compute.amazonaws.com US
3.101.216.74 ec2-3-101-216-74.us-west-1.compute.amazonaws.com US
3.101.216.65 ec2-3-101-216-65.us-west-1.compute.amazonaws.com US
3.101.226.176 ec2-3-101-226-176.us-west-1.compute.amazonaws.com US
183.87.15.48 host-15148.fivenetwork.com IN
183.87.15.29 host-15129.fivenetwork.com IN
103.187.191.201 103.187.191.201 IN
3.101.226.154 ec2-3-101-226-154.us-west-1.compute.amazonaws.com US
3.101.230.229 ec2-3-101-230-229.us-west-1.compute.amazonaws.com US
3.101.216.123 ec2-3-101-216-123.us-west-1.compute.amazonaws.com US
3.101.226.184 ec2-3-101-226-184.us-west-1.compute.amazonaws.com US
3.101.230.187 ec2-3-101-230-187.us-west-1.compute.amazonaws.com US
3.101.230.205 ec2-3-101-230-205.us-west-1.compute.amazonaws.com US
183.87.15.228 host-15328.fivenetwork.com IN
77.239.235.109 109.235.239.77.at-home.ru RU
34.76.158.233 233.158.76.34.bc.googleusercontent.com BE
116.105.70.233 116.105.70.233 VN
185.196.9.204 185.196.9.204 US
46.30.1.50 46.30.1.50 DE
3.101.239.89 ec2-3-101-239-89.us-west-1.compute.amazonaws.com US
3.101.240.24 ec2-3-101-240-24.us-west-1.compute.amazonaws.com US
109.168.223.105 109.168.223.105 RU
35.190.199.12 12.199.190.35.bc.googleusercontent.com BE
49.43.5.22 49.43.5.22 IN
104.199.31.214 214.31.199.104.bc.googleusercontent.com BE
157.245.67.36 157.245.67.36 NL
91.92.240.181 91.92.240.181 BG
49.43.4.19 49.43.4.19 IN
64.227.23.14 64.227.23.14 US
208.76.253.234 208.76.253.234.rdns.colocationamerica.com US
60.205.206.91 60.205.206.91 CN
使用者代理字串
Mozilla/5.0 (compatible; Nmap Scripting Engine; http://nmap.org/book/nse.html)
首次出現
2014-06-28 20:55:19
最後出現
2021-11-08 06:12:27
遵循robots.txt
未知
來源
IP地址(29) 伺服器名稱 所屬國家
124.129.5.234 124.129.5.234 CN
223.99.228.201 223.99.228.201 CN
221.1.222.114 221.1.222.114 CN
221.2.196.3 221.2.196.3 CN
208.100.26.232 ip232.208-100-26.static.steadfastdns.net US
208.100.26.231 ip231.208-100-26.static.steadfastdns.net US
208.100.26.230 ip230.208-100-26.static.steadfastdns.net US
185.100.87.191 ? RO
208.100.26.229 ip229.208-100-26.static.steadfastdns.net US
85.25.79.124 icsresearch3.plcscan.org DE

訪問控制

瞭解如何控制Nmap訪問許可權,避免Nmap抓取行為不當。

是否攔截Nmap?

一般不攔截。此類爬蟲通常是網站所有者提交掃描請求才會出現。如果攔截,則無法執行相應的掃描動作。

通過Robots.txt攔截

您可以通過在網站的 robots.txt 中設定使用者代理訪問規則來遮蔽 Nmap 或限制其訪問許可權。我們建議安裝 Spider Analyser 外掛,以檢查它是否真正遵循這些規則。

Plain text
Copy to clipboard
Open code in new window
EnlighterJS 3 Syntax Highlighter
# robots.txt
# 下列程式碼一般情況可以攔截該代理
User-agent: Nmap
Disallow: /
# robots.txt # 下列程式碼一般情況可以攔截該代理 User-agent: Nmap Disallow: /
	# robots.txt
	# 下列程式碼一般情況可以攔截該代理
	
	User-agent: Nmap
	Disallow: /

您無需手動執行此操作,可通過我們的 Wordpress 外掛 Spider Analyser 來攔截不必要的蜘蛛或者爬蟲。

常見蜘蛛/爬蟲

Common Spiders
WhatWeb
WhatWeb蜘蛛/爬蟲屬於漏洞/病毒掃描型別,由Andrew Horton開發執行。您可以繼續閱讀下方資訊,以深入瞭解WhatWeb基本資訊,使用者代理和訪問控制等。
YandexBot
YandexBot蜘蛛/爬蟲屬於搜尋引擎型別,由Yandex LLC開發執行。您可以繼續閱讀下方資訊,以深入瞭解YandexBot基本資訊,使用者代理和訪問控制等。
OpenVAS
OpenVAS蜘蛛/爬蟲屬於漏洞/病毒扫描型別,由Greenbone AG開發執行。您可以繼續閱讀下方資訊,以深入瞭解OpenVAS基本資訊,使用者代理和訪問控制等。
Tenable crawler
Tenable crawler蜘蛛/爬蟲屬於漏洞/病毒掃描型別,由Tenable, Inc.開發執行。您可以繼續閱讀下方資訊,以深入瞭解Tenable crawler基本資訊,使用者代理和訪問控制等。
Foregenix crawler
Foregenix crawler蜘蛛/爬蟲屬於漏洞/病毒掃描型別,由Foregenix Ltd.開發執行。您可以繼續閱讀下方資訊,以深入瞭解Foregenix crawler基本資訊,使用者代理和訪問控制等。
virustotal
virustotal蜘蛛/爬蟲屬於漏洞/病毒掃描型別,由Chronicle LLC開發執行。您可以繼續閱讀下方資訊,以深入瞭解virustotal基本資訊,使用者代理和訪問控制等。
WPScan
WPScan蜘蛛/爬蟲屬於漏洞/病毒掃描型別,由Automattic Inc.開發執行。您可以繼續閱讀下方資訊,以深入瞭解WPScan基本資訊,使用者代理和訪問控制等。
WPSec
WPSec蜘蛛/爬蟲屬於漏洞/病毒掃描型別,由Triop AB開發執行。您可以繼續閱讀下方資訊,以深入瞭解WPSec基本資訊,使用者代理和訪問控制等。

相關文章

Related Articles