# ComBot 0.1.1
A command line utility to parse server access logs, detect bots, and output a list of detected bots in the specified format.
## Supported Input Formats
- [x] NGINX
- [ ] Apache
## Supported Output Formats
- [x] CSV
- [x] [AbuseIPDB](https://abuseipdb.com) CSV (don't forget to dedpulicate this list before submitting)
- [ ] JSON
## Trigger Lists
This tool supports specifying "trigger lists" or using the built in lists.
List files should be specified in the following format:
```
botname1|trigger string one
botname2|trigger string two
```
The pipe `|` character is used to separate the trigger name from the trigger string, each line is a trigger.
Two lists are supported, these are URI lists and User Agent lists. Trigger strings work best when they are a substring of the respective part of the log entry. For example:
For a URI trigger use `phpunit` not `/test/phpunit/submit.php`.
For a User Agent trigger use `zgrab` not `Mozilla/5.0 zgrab/0.x`.
URIs take precedence over User Agents as they tend to be more specific.
## Help
```
combot 0.1.0 GNU-GPL-3.0
Chad Baxter
A utility to parse server access logs and detect bots based on URI paths and User Agents.
USAGE:
combot [OPTIONS]