ComBot 0.1.1

A command line utility to parse server access logs, detect bots, and output a list of detected bots in the specified format.

Supported Input Formats

Supported Output Formats

Trigger Lists

This tool supports specifying "trigger lists" or using the built in lists.

List files should be specified in the following format:

botname1|trigger string one botname2|trigger string two

The pipe | character is used to separate the trigger name from the trigger string, each line is a trigger.

Two lists are supported, these are URI lists and User Agent lists. Trigger strings work best when they are a substring of the respective part of the log entry. For example:

For a URI trigger use phpunit not /test/phpunit/submit.php.

For a User Agent trigger use zgrab not Mozilla/5.0 zgrab/0.x.

URIs take precedence over User Agents as they tend to be more specific.

Help

``` combot 0.1.0 GNU-GPL-3.0 Chad Baxter A utility to parse server access logs and detect bots based on URI paths and User Agents.

USAGE: combot [OPTIONS] --inputformat --outputformat

FLAGS: -h, --help Prints help information -V, --version Prints version information

OPTIONS: -i, --inputformat Select the input format: nginx -f, --outputformat Select the output format: csv, abuseipdb-csv -a, --ualist Specify a path to a list of User Agent pieces to trigger on. -u, --urilist Specify a path to a list of URI pieces to trigger on.

ARGS: The input file path. The output file path (will be overwritten). ```