Crates.io | combot |
lib.rs | combot |
version | 0.1.1 |
source | src |
created_at | 2021-04-16 18:14:31.455513 |
updated_at | 2021-05-13 21:15:06.916713 |
description | A utility to parse server access logs and detect bots based on URI paths and User Agents. |
homepage | |
repository | https://github.com/LogoiLab/combot |
max_upload_size | |
id | 385404 |
size | 60,696 |
A command line utility to parse server access logs, detect bots, and output a list of detected bots in the specified format.
This tool supports specifying "trigger lists" or using the built in lists.
List files should be specified in the following format:
botname1|trigger string one
botname2|trigger string two
The pipe |
character is used to separate the trigger name from the trigger string, each line is a trigger.
Two lists are supported, these are URI lists and User Agent lists. Trigger strings work best when they are a substring of the respective part of the log entry. For example:
For a URI trigger use phpunit
not /test/phpunit/submit.php
.
For a User Agent trigger use zgrab
not Mozilla/5.0 zgrab/0.x
.
URIs take precedence over User Agents as they tend to be more specific.
combot 0.1.0 GNU-GPL-3.0
Chad Baxter
A utility to parse server access logs and detect bots based on URI paths and User Agents.
USAGE:
combot [OPTIONS] <input> <output> --input_format <input_format> --output_format <output_format>
FLAGS:
-h, --help Prints help information
-V, --version Prints version information
OPTIONS:
-i, --input_format <input_format> Select the input format: nginx
-f, --output_format <output_format> Select the output format: csv, abuseipdb-csv
-a, --ua_list <ua_list> Specify a path to a list of User Agent pieces to trigger on.
-u, --uri_list <uri_list> Specify a path to a list of URI pieces to trigger on.
ARGS:
<input> The input file path.
<output> The output file path (will be overwritten).