This program ingests a Cisco "sh ip arp" as a text file and produces the list of vendors seen in the file

Overview

IP-ARP-Vendor_lookup

This program ingests a Cisco "sh ip arp" as a text file and produces the list of vendors seen in the file

Why?

  • Answers the question what are the different vendors seen in a Cisco #sh ip arp
  • Helps to understand what is in a network

Requirements:

  • This uses a restful API to search for the vendors, so it needs an internet connection
  • This needs the output of a "#sh ip arp", as it is using this to do the lookup

Output:

  • Program Output: image
  • Vendor_list.txt Output: image
You might also like...
Converts Cisco formatted MAC Addresses to PC formatted MAC Addresses
Converts Cisco formatted MAC Addresses to PC formatted MAC Addresses

Cisco-MAC-to-PC-MAC Converts a file with a list of Cisco formatted MAC Addresses to PC formatted MAC Addresses... Ex: abcd.efgh.ijkl to AB:CD:EF:GH:I

This is simple script that changes the config register of a cisco router over serial so that you can reset the password

Cisco-router-config-bypass-tool- This is simple script that changes the config register of a cisco router over serial so that you can bypass the confi

List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting.

List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting.

Take a list of domains and probe for working HTTP and HTTPS servers

httprobe Take a list of domains and probe for working http and https servers. Install ▶ go get -u github.com/tomnomnom/httprobe Basic Usage httprobe

 Fmog: Fortinet Mass Object Generator. This script will take a list of IP addresses and create address objects with the same name
Fmog: Fortinet Mass Object Generator. This script will take a list of IP addresses and create address objects with the same name

Fmog: Fortinet Mass Object Generator This script will take a list of IP addresses and create address objects with the same name. It will also add them

A website to list Shadowsocks proxies and check them periodically

Shadowmere An automatically tested list of Shadowsocks proxies. Motivation Collecting proxies around the internet is fun, but what if they stop workin

Takes a file of hosts or domains and outputs the IP address of each host/domain in the file.
Takes a file of hosts or domains and outputs the IP address of each host/domain in the file.

Takes a file of hosts or domains and outputs the IP address of each host/domain in the file. Installation $ git clone https://github.com/whoamisec75/i

This is an open project to maintain a list of domain names that serve YouTube ads

The YouTube ads blocklist project This is an open project to maintain a list of domain names that serve YouTube ads. The original project only produce

This is a simple python code to get the list of banned IP addresses from Fail2ban

Fail2ban Scripts Usage banned_list.py This script tries to get the banned list of IP addresses by Fail2ban for the service freeswitch. You can modify

Releases(v11.0)
  • v11.0(May 19, 2022)

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      image program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Automatically attempts to upgrade required libraries (05/22/2022)
    • [x] Added a banner and info box (see output section of readme, 04/21/22)
    • [x] Fixed issue if text / CSV files already exist (04/07/2022)
    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)

    This app is free❗



    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(35.25 KB)
  • v10.0(Apr 21, 2022)

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      image program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Added a banner and info box (see output section of readme, 04/21/22)
    • [x] Fixed issue if text / CSV files already exist (04/07/2022)
    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)

    This app is free❗



    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(34.57 KB)
  • v9.5(Apr 7, 2022)

    NetVendor

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      program_output1 program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Fixed issue if text / CSV files already exist (04/07/2022)
    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)

    This app is free❗

    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(33.16 KB)
  • v9.0(Apr 6, 2022)

    NetVendor

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      program_output1 program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)
    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(32.77 KB)
  • v8.5(Mar 29, 2022)

    NetVendor

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      program_output1 program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    As of 03/29:

    Features:

    • Produces output on the vendors (companies) seen within the network, such as their hardware address, IP address, VLAN etc
    • Produces an interactive web-based pie chart if you have Firefox or Chrome available on a Windows Apple, or Linux system
    • Rich color formatting for the screen for easy viewing
    • Organizes files into two folders csv_files and text_files for easy review

    Fixes:

    • Now requests for the application to be restarted if needed libraries are installed
    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(32.62 KB)
  • v8.0(Mar 23, 2022)

    03/23/2022

    • Fixed CSV bug, now csv files contain the correct info
    • *.csv device files are now in the csv_files folder
    • *.txt files are now moved to the folder text_files for cleaner organization

    As of 03/19/2022

    • Any Device.txt files created are also saved as csv (comma separated value) files in the created csv_files folder; for easy import into spreadsheet applications

    Previous updates:

    • Added current directory path instead of saying "current directory" review by spreadsheet applications
    • CLI / Terminal output is now colored
    • Output is organized
    • Shows an interactive (mouse over the section pieces) pie graph on Linux / Mac / Windows if Chrome or Firefox is available
    • Works with the output of any MAC or ARP table (saved as plain text)
    • Produces files showing details like IP address (ARP input) or switch interface port (MAC address table input) where the vendors are within the network
    • Cross platform
    • If required libraries are not installed, the software automatically installs them (in rare instances one may have to run the software twice)
    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(31.83 KB)
  • 7.5(Mar 19, 2022)

    As of 03/19/2022

    • Any Device.txt files created are also saved as csv (comma separated value) files in the created csv_files folder; for easy import into spreadsheet applications

    Previous updates:

    • Added current directory path instead of saying "current directory" review by spreadsheet applications
    • CLI / Terminal output is now colored
    • Output is organized
    • Shows an interactive (mouse over the section pieces) pie graph on Linux / Mac / Windows if Chrome or Firefox is available
    • Works with the output of any MAC or ARP table (saved as plain text)
    • Produces files showing details like IP address (ARP input) or switch interface port (MAC address table input) where the vendors are within the network
    • Cross platform
    • If required libraries are not installed, the software automatically installs them (in rare instances one may have to run the software twice)
    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(30.28 KB)
  • 7.1(Mar 7, 2022)

    03/16/2022

    • Added current directory path instead of saying "current directory"

    As of 03/0/7/2022

    • CLI / Terminal output is now colored
    • Output is organized

    Previous updates:

    • Shows an interactive (mouse over the section pieces) pie graph on Linux / Mac / Windows if Chrome or Firefox is available
    • Works with the output of any MAC or ARP table (saved as plain text)
    • Produces files showing details like IP address (ARP input) or switch interface port (MAC address table input) where the vendors are within the network
    • Cross platform
    • If required libraries are not installed, the software automatically installs them (in rare instances one may have to run the software twice)
    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(28.22 KB)
  • 6.5(Dec 3, 2021)

    This program reads a text file containing the output of a MAC address table or an ARP table like a Cisco sh ip arp it then data mines that file, getting the company and OUI information, it then searches the text file using the specific OUIs for Apple, Cisco, Dell, Mitel and HP devices to get how many of each of these devices are in the ARP / MAC address table.

    It produces text files containing:

    • The alphabetized list of unique vendors (as in companies) shown in the file (via a restful API lookup)
    • A list of all the unique OUIs (hardware types) seen in the ARP / MAC Address table (removes duplicate entries)
    • A total list of Apple systems seen in the ARP /MAC address table
    • A total list of the Cisco devices seen in the ARP / MAC address table
    • A total list of the Dell devices see in the ARP / MAC address table
    • A total list of all the HP devices in the ARP / MAC address table
    • A total list of all the Mitel Inc phones in the ARP / MAC address table
    • A total list of all the unique VLANs in the ARP / MAC address table

    The files above contain relevant information such as (if an ARP table was digested) the IP address, time the system in question saw the device, the MAC address of the specific device, and the VLAN it is in.

    ... And now shows progress bars and produces an interactive Pie Chart if you have Firefox or Chrome available on a Linux, Windows or Mac computer

    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(27.95 KB)
Owner
Stew Alexander
Systems Engineer - On the hunt for simplicity and efficiency.
Stew Alexander
Simulate Attacks With Mininet And Hping3

Miniattack Simulate Attacks With Mininet And Hping3 It measures network load with bwm-ng when the net is under attack and plots the result. This demo

Geraked 3 Oct 03, 2022
Jogo da forca simples com conexão entre cliente e servidor utilizando TCP.

JogoDaForcaTCP Um jogo da forca simples com conexão entre cliente e servidor utilizando o protocólo TCP. Como jogar: Habilite a porta 20000, inicie o

Kelvin Santos 1 Dec 01, 2021
This is a simple python script to collect sub-domains from hackertarget API

Domain-Scraper 🌐 This is a simple python script to collect sub-domains from hackertarget API Note : This is tool is limited to 20 Queries / day with

CHINO TECH TOOLS 4 Sep 09, 2021
StarCraft II Client - protocol definitions used to communicate with StarCraft II.

Overview The StarCraft II API is an interface that provides full external control of StarCraft II. This API exposes functionality for developing softw

Blizzard Entertainment 3.6k Dec 30, 2022
Bittensor - an open, decentralized, peer-to-peer network that functions as a market system for the development of artificial intelligence

At Bittensor, we are creating an open, decentralized, peer-to-peer network that functions as a market system for the development of artificial intelligence.

Opentensor 169 Dec 30, 2022
Lightweight asyncio compatible utilities for consuming broker messages.

A simple asyncio compatible consumer for handling amqp messages.

Mehdi Kamani 3 Apr 10, 2022
Official ProtonVPN Linux app

ProtonVPN Linux App Copyright (c) 2021 Proton Technologies AG This repository holds the ProtonVPN Linux App. For licensing information see COPYING. Fo

ProtonVPN 288 Jan 01, 2023
Vent domain information retrieval tool, which is capable of retrieving customer information

Vent domain information retrieval tool, which is capable of retrieving customer information. This tool has been created for the purpose of complete education, Iam not responsible for any illegal acti

Md. Ridwanul Islam Muntakim 25 Dec 09, 2022
Python 3.3+'s ipaddress for older Python versions

ipaddress Python 3.3+'s ipaddress for Python 2.6, 2.7, 3.2. This repository tracks the latest version from cpython, e.g. ipaddress from cpython 3.8 as

Philipp Hagemeister 103 Nov 11, 2022
Simple HTTP Server for CircuitPython

Introduction Simple HTTP Server for CircuitPython Dependencies This driver depen

Adafruit Industries 22 Jan 06, 2023
Process incoming JSON-RPC requests in Python

August 16, 2021: Version 5 has been released. Read about the changes in version 5, or read the full documentation. Version 5 is for Python 3.8+ only.

Exploding Labs 156 Dec 31, 2022
Query protocol and response

whois Query protocol and response _MᵃˢᵗᵉʳBᵘʳⁿᵗ_ _ ( ) _ ( )( ) _ | | ( ) | || |__ _ (_) ___ | | | | | || _ `\ /'_`\ | |/',__) |

MasterBurnt 4 Sep 05, 2021
Simple app that redirect fixed URL to changing URL, configurable via POST requests

This is a basic URL redirection service. It stores associations between apps and redirection URLs, for apps with changing URLs. You can then use GET r

Maxime Weyl 2 Jan 28, 2022
This is a top level socket library, making servers and clients EASY!

quick-net Sockets don't have to be a pain That's the motto this library was built with, and that's exactly what we made! This is a top-level socket li

Nate the great 15 Dec 17, 2021
Juniper SNMP Migrations For Python

Juniper SNMP Migrations This example will show how to use the PyEZ plugin for Nornir to build a NETCONF connection to a remote device validate that SN

Calvin Remsburg 1 Jan 07, 2022
Ipscanner - A simple threaded IP-Scanner written in python3 that can monitor local IP's in your network

IPScanner 🔬 A simple threaded IP-Scanner written in python3 that can monitor lo

4 Dec 12, 2022
This is a python based command line Network Scanner utility, which input as an argument for the exact IP address or the relative IP Address range you wish to do the Network Scan for and returns all the available IP addresses with their MAC addresses on your current Network.

This is a python based command line Network Scanner utility, which input as an argument for the exact IP address or the relative IP Address range you wish to do the Network Scan for and returns all t

Abhinandan Khurana 1 Feb 09, 2022
This is the code repository for Mastering Python for Networking and Security – Second Edition

Mastering Python for Networking and Security – Second Edition This is the code repository for Mastering Python for Networking and Security – Second Ed

Frank Gottinger 1 Feb 09, 2022
pyngrok is a Python wrapper for ngrok

pyngrok is a Python wrapper for ngrok that manages its own binary, making ngrok available via a convenient Python API.

Alex Laird 329 Dec 31, 2022
Socialhome is best described as a federated personal profile with social networking functionality

Description Socialhome is best described as a federated personal profile with social networking functionality. Users can create rich content using Mar

Jason Robinson 332 Dec 30, 2022