This program ingests a Cisco "sh ip arp" as a text file and produces the list of vendors seen in the file

Overview

IP-ARP-Vendor_lookup

This program ingests a Cisco "sh ip arp" as a text file and produces the list of vendors seen in the file

Why?

  • Answers the question what are the different vendors seen in a Cisco #sh ip arp
  • Helps to understand what is in a network

Requirements:

  • This uses a restful API to search for the vendors, so it needs an internet connection
  • This needs the output of a "#sh ip arp", as it is using this to do the lookup

Output:

  • Program Output: image
  • Vendor_list.txt Output: image
You might also like...
Converts Cisco formatted MAC Addresses to PC formatted MAC Addresses
Converts Cisco formatted MAC Addresses to PC formatted MAC Addresses

Cisco-MAC-to-PC-MAC Converts a file with a list of Cisco formatted MAC Addresses to PC formatted MAC Addresses... Ex: abcd.efgh.ijkl to AB:CD:EF:GH:I

This is simple script that changes the config register of a cisco router over serial so that you can reset the password

Cisco-router-config-bypass-tool- This is simple script that changes the config register of a cisco router over serial so that you can bypass the confi

List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting.

List of ngrok alternatives and other ngrok-like tunneling software and services. Focus on self-hosting.

Take a list of domains and probe for working HTTP and HTTPS servers

httprobe Take a list of domains and probe for working http and https servers. Install ▶ go get -u github.com/tomnomnom/httprobe Basic Usage httprobe

 Fmog: Fortinet Mass Object Generator. This script will take a list of IP addresses and create address objects with the same name
Fmog: Fortinet Mass Object Generator. This script will take a list of IP addresses and create address objects with the same name

Fmog: Fortinet Mass Object Generator This script will take a list of IP addresses and create address objects with the same name. It will also add them

A website to list Shadowsocks proxies and check them periodically

Shadowmere An automatically tested list of Shadowsocks proxies. Motivation Collecting proxies around the internet is fun, but what if they stop workin

Takes a file of hosts or domains and outputs the IP address of each host/domain in the file.
Takes a file of hosts or domains and outputs the IP address of each host/domain in the file.

Takes a file of hosts or domains and outputs the IP address of each host/domain in the file. Installation $ git clone https://github.com/whoamisec75/i

This is an open project to maintain a list of domain names that serve YouTube ads

The YouTube ads blocklist project This is an open project to maintain a list of domain names that serve YouTube ads. The original project only produce

This is a simple python code to get the list of banned IP addresses from Fail2ban

Fail2ban Scripts Usage banned_list.py This script tries to get the banned list of IP addresses by Fail2ban for the service freeswitch. You can modify

Releases(v11.0)
  • v11.0(May 19, 2022)

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      image program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Automatically attempts to upgrade required libraries (05/22/2022)
    • [x] Added a banner and info box (see output section of readme, 04/21/22)
    • [x] Fixed issue if text / CSV files already exist (04/07/2022)
    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)

    This app is free❗



    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(35.25 KB)
  • v10.0(Apr 21, 2022)

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      image program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Added a banner and info box (see output section of readme, 04/21/22)
    • [x] Fixed issue if text / CSV files already exist (04/07/2022)
    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)

    This app is free❗



    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(34.57 KB)
  • v9.5(Apr 7, 2022)

    NetVendor

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      program_output1 program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Fixed issue if text / CSV files already exist (04/07/2022)
    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)

    This app is free❗

    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(33.16 KB)
  • v9.0(Apr 6, 2022)

    NetVendor

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      program_output1 program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    To Do / Updates

    • [x] Added a timeout to the Vendor lookup, and significantly improved company lookup time (04/06/2022)
    • [x] Created CSV files for every created device text file in a separate csv_files folder, for easy review by any spreadsheet app like visidata (added 03/23/2022)
    • [x] Added code to move all the *.txt files to a created text_files folder (added 03/23/2022)
    • [x] Fixed a bug where a created csv file may have contents from more than one device file in it (resolved 03/23/2022)
    • [x] Used the rich library to colorize cli output (added 03/06/2022)
    • [x] Style Improvements [on-going, started 03/06/2022]
    • [x] Added lookup for Mitel Corperation Phones (02/11/2022)
    • [x] Streamlined API call, add support for Apple Macs (supporting Windows, Linux or Mac computers (Added 02/10/2022)
    • [x] Added a progress bar for collecting oui info via “tqdm” (added 12/22/2021)
    • [ ] Use the sanitized OUI list here, to increase filtering (on-going)
    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(32.77 KB)
  • v8.5(Mar 29, 2022)

    NetVendor

    What vendors are lurking on your network?

    This software figures this out!

    How?

    This program reviews an ARP or MAC Address table (Such as a Cisco IOS sh ip arp or sh mac add output), and produces information on your network like:

    • How many different vendors (as in companies) exist within your network?
    • How many different types of hardware (MAC OUIs) exist within your network?
    • Where are all these things, and what are their IPs?
    • A list (and total) of all the Apple, Cisco, Dell, HP, and Mitel products that exist on your network
    • Are there any hidden VLANs lurking within your network? This answers this too!

    Table of Contents:

    Why?

    • Understanding what exactly is in your network is essential for security reasons...
    • Benchmarks your network so you can easily see changes

    Dependencies

    • This uses a restful API to search for the vendors, so it needs a working internet connection
    • This needs the output of an ARP or MAC Address table as a text file (such as the Cisco IOS #sh ip arp format seen below), as it is using this to do the lookup

    Input

    • Contents of an ARP or MAC Address table as a text file (such as a Cisco #sh ip arp output, like below):

      image

    Output

    • Example of the output:

      program_output1 program_output2 image
    • If Chrome or Firefox is available (on a Windows, Mac or Linux system), it will create an interactive web-based pie chart and display it in the browser: 2022-03-06 18 43 25
    • Created text file "company_list.txt" output:

      image
    • Created text file "oui_final_list.txt" output:

      image
    • Created Vendor-Devices.txt file:

      image
    • Creates a list of CSV "spreadsheet" device files and puts them in a new csv_files folder
    • Puts all the *.txt files created into the text_files folder

    As of 03/29:

    Features:

    • Produces output on the vendors (companies) seen within the network, such as their hardware address, IP address, VLAN etc
    • Produces an interactive web-based pie chart if you have Firefox or Chrome available on a Windows Apple, or Linux system
    • Rich color formatting for the screen for easy viewing
    • Organizes files into two folders csv_files and text_files for easy review

    Fixes:

    • Now requests for the application to be restarted if needed libraries are installed
    Source code(tar.gz)
    Source code(zip)
    NetVendor.py(32.62 KB)
  • v8.0(Mar 23, 2022)

    03/23/2022

    • Fixed CSV bug, now csv files contain the correct info
    • *.csv device files are now in the csv_files folder
    • *.txt files are now moved to the folder text_files for cleaner organization

    As of 03/19/2022

    • Any Device.txt files created are also saved as csv (comma separated value) files in the created csv_files folder; for easy import into spreadsheet applications

    Previous updates:

    • Added current directory path instead of saying "current directory" review by spreadsheet applications
    • CLI / Terminal output is now colored
    • Output is organized
    • Shows an interactive (mouse over the section pieces) pie graph on Linux / Mac / Windows if Chrome or Firefox is available
    • Works with the output of any MAC or ARP table (saved as plain text)
    • Produces files showing details like IP address (ARP input) or switch interface port (MAC address table input) where the vendors are within the network
    • Cross platform
    • If required libraries are not installed, the software automatically installs them (in rare instances one may have to run the software twice)
    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(31.83 KB)
  • 7.5(Mar 19, 2022)

    As of 03/19/2022

    • Any Device.txt files created are also saved as csv (comma separated value) files in the created csv_files folder; for easy import into spreadsheet applications

    Previous updates:

    • Added current directory path instead of saying "current directory" review by spreadsheet applications
    • CLI / Terminal output is now colored
    • Output is organized
    • Shows an interactive (mouse over the section pieces) pie graph on Linux / Mac / Windows if Chrome or Firefox is available
    • Works with the output of any MAC or ARP table (saved as plain text)
    • Produces files showing details like IP address (ARP input) or switch interface port (MAC address table input) where the vendors are within the network
    • Cross platform
    • If required libraries are not installed, the software automatically installs them (in rare instances one may have to run the software twice)
    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(30.28 KB)
  • 7.1(Mar 7, 2022)

    03/16/2022

    • Added current directory path instead of saying "current directory"

    As of 03/0/7/2022

    • CLI / Terminal output is now colored
    • Output is organized

    Previous updates:

    • Shows an interactive (mouse over the section pieces) pie graph on Linux / Mac / Windows if Chrome or Firefox is available
    • Works with the output of any MAC or ARP table (saved as plain text)
    • Produces files showing details like IP address (ARP input) or switch interface port (MAC address table input) where the vendors are within the network
    • Cross platform
    • If required libraries are not installed, the software automatically installs them (in rare instances one may have to run the software twice)
    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(28.22 KB)
  • 6.5(Dec 3, 2021)

    This program reads a text file containing the output of a MAC address table or an ARP table like a Cisco sh ip arp it then data mines that file, getting the company and OUI information, it then searches the text file using the specific OUIs for Apple, Cisco, Dell, Mitel and HP devices to get how many of each of these devices are in the ARP / MAC address table.

    It produces text files containing:

    • The alphabetized list of unique vendors (as in companies) shown in the file (via a restful API lookup)
    • A list of all the unique OUIs (hardware types) seen in the ARP / MAC Address table (removes duplicate entries)
    • A total list of Apple systems seen in the ARP /MAC address table
    • A total list of the Cisco devices seen in the ARP / MAC address table
    • A total list of the Dell devices see in the ARP / MAC address table
    • A total list of all the HP devices in the ARP / MAC address table
    • A total list of all the Mitel Inc phones in the ARP / MAC address table
    • A total list of all the unique VLANs in the ARP / MAC address table

    The files above contain relevant information such as (if an ARP table was digested) the IP address, time the system in question saw the device, the MAC address of the specific device, and the VLAN it is in.

    ... And now shows progress bars and produces an interactive Pie Chart if you have Firefox or Chrome available on a Linux, Windows or Mac computer

    Source code(tar.gz)
    Source code(zip)
    Vendor-Finder.py(27.95 KB)
Owner
Stew Alexander
Systems Engineer - On the hunt for simplicity and efficiency.
Stew Alexander
Tool that creates a complete copy of your server

Discord-Server-Cloner Tool that creates a complete copy of your server Setup: Open run.bat If the file closes, open cmd And write: pip install -r requ

DEEM 3 Dec 13, 2021
Asyncer, async and await, focused on developer experience

Asyncer, async and await, focused on developer experience. Documentation: https:

Sebastián Ramírez 895 Dec 28, 2022
This Tool Help To Information gathering for domain name or ip address...

Owl-Eye This Tool Help To Information gathering for domain name or ip address... follow this command $apt update && upgrade $apt install python apt in

Black Owl 6 Nov 12, 2022
Program can control your server via discord bot

GTPS Controller Program can control your server via discord bot Require Python How To Use Download This Source Extract The Zip File Paste gtps.py to y

Lamp 2 Mar 15, 2022
TsuserverMoS - A Python-based server for Attorney Online,

tsuserverMoS A Python-based server for Attorney Online, forked from RealKaiser/tsuserverCC Requires Python 3.7+ and PyYAML. Changes/additions from tsu

1 Dec 30, 2021
A simple software which can use to make a server in local network

home-nas it is simple software which can use to make a server in local network, it has a web site on it which can use by multipale system, i use nginx

R ansh joseph 1 Nov 10, 2021
Free,Cross-platform,Single-file mass network protocol server simulator

FaPro Free,Cross-platform,Single-file mass network protocol server simulator 中文Readme Description FaPro is a Fake Protocol Server tool, Can easily sta

FOFA Pro 1.4k Jan 06, 2023
JF⚡can - Super fast port scanning & service discovery using Masscan and Nmap. Scan large networks with Masscan and use Nmap's scripting abilities to discover information about services. Generate report.

Description Killing features Perform a large-scale scans using Nmap! Allows you to use Masscan to scan targets and execute Nmap on detected ports with

377 Jan 03, 2023
Port Traffic/Bandwidth Monitor Script

python-switch-port-traffic-alarm Port Traffic/Bandwidth Monitor Script That's an Switch Port Traffic monitor program is checking the switch uplink por

goksinenki 4 Sep 02, 2021
BibleNotifyDesktop - Desktop version of Bible Notify

Bible Notify Desktop This is the repository for the Desktop version of the daily

Bible Notify 5 Nov 16, 2022
ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking.

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking. This is the main ARTEMIS repository that composes artemis-frontend, artemis-backend, artemis-monitor and other needed c

INSPIRE Group @FORTH-ICS 273 Jan 01, 2023
MoreIP 一款基于Python的面向 MacOS/Linux 用户用于查询IP/域名信息的日常渗透小工具

MoreIP 一款基于Python的面向 MacOS/Linux 用户用于查询IP/域名信息的日常渗透小工具

xq17 9 Sep 21, 2022
An ftp syncing python package that I use to sync pokemon saves between my hacked 3ds running ftpd and my server

Sync file pairs over ftp and apply patches to them. Useful for using ftpd to transfer ROM save files to and from your DS if you also play on an emulator. Setup a cron job to check for your DS's ftp s

17 Jan 04, 2023
Burp Extension that copies a request and builds a FFUF skeleton

ffuf is gaining a lot of traction within the infosec community as a fast portable web fuzzer. It has been compared and aligned (kinda) to Burp's Intruder functionality. Thus, Copy As FFUF is trying t

Desmond Miles 81 Dec 22, 2022
A Powerful, Smart And Simple Userbot In Telethon

Owner: KeinShin 🇮🇳 BLACK LIGHTNING A Powerful, Smart And Simple Userbot In Telethon. Credits This is A Remix Bot Of Many UserBot. DARKCOBRA FridayUs

Akki ThePro 1 Nov 29, 2021
ServerStatus with node management and monitor

ServerStatus with node management and monitor

lidalao 162 Jan 01, 2023
Azure-function-proxy - Basic proxy as an azure function serverless app

azure function proxy (for phishing) here are config files for using *[.]azureweb

17 Nov 09, 2022
Utility for converting IP Fabric webhooks into a Teams format.

IP Fabric Webhook Integration for Microsoft Teams Setup IP Fabric Setup Go to Settings Webhooks Add webhook Provide a name URL will be: 'http://Y

Community Fabric 1 Jan 26, 2022
Dos attack a Bluetooth connection!

Bluetooth Denial of service Script made for attacking Bluetooth Devices By Samrat Katwal. Warning This project was created only for fun purposes and p

Samrat 1 Oct 29, 2021
PetrickScanner is a simple Python OOP TCP Port Scanner

PetrickScanner PetrickScanner is a simple Python OOP TCP Port Scanner Functions Python TCP Port Scanner DNS Resolver Random Scanner PLEASE ANY PROBLEM

11 Nov 30, 2021