Provided by: asn_0.78.0-1_all 

NAME
asn - ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / ASPath / Organization / IP reputation lookup
tool
SYNOPSIS
asn [OPTIONS] [TARGET]
asn [-v] -l [SERVER OPTIONS]
DESCRIPTION
ASN is a tool for performing various lookup operations related to ASN (Autonomous System Number), RPKI
validity, BGP statistics, IPv4/v6 addresses, prefixes, ASPaths, organizations, and IP reputations.
OPTIONS
-t (enable trace)
Enable AS path trace to the TARGET (this is the default behavior)
-n (no trace|no additional INETNUM lookups)
Disable tracing the AS path to the TARGET (for IP targets) or
Disable additional (unannounced / announced by other AS) INETNUM lookups for the TARGET (for AS
targets)
-d (detailed) Output detailed hop info during the AS path trace to the TARGET
This option also enables RPKI validation/BGP hijacking detection for every hop
-a (ASN Suggest)
Lookup AS names and numbers matching TARGET
-u (Transit/Upstream lookup)
Inspect BGP updates and ASPATHs for the TARGET address/prefix and identify possible
transit/upstream autonomous systems
-c (Country CIDR)
Lookup all IPv4/v6 CIDR blocks allocated to the TARGET country
-g (Bulk Geolocate)
Geolocate all IPv4/v6 addresses passed as TARGET
This mode supports multiple targets, stdin input and IP extraction from input, e.g.
asn -g < /var/log/apache2/error.log or echo 1.1.1.1 2.2.2.2 | asn -g
-s (Shodan scan)
Query Shodan's InternetDB for CVE/CPE/Tags/Ports/Hostnames data about TARGET
This mode supports multiple targets and stdin input, e.g.
asn -s < iplist or echo 1.1.1.0/24 google.com | asn -s
-o (organization search)
Force TARGET to be treated as an Organization Name
-m (monochrome output)
Disable colored output
-v (verbose)
Enable (and log to $HOME/asndebug.log) debug messages (URLs being queried and variable names being
assigned)
API call response data (i.e. the JSON output) is logged to the logfile.
-j (compact JSON output)
Set output to compact JSON mode (ideal for machine parsing)
-J (pretty-printed JSON output)
Set output to pretty-printed JSON mode
-h (help)
Show this help screen
-l (lookup server)
Launch the script in server mode. See SERVER OPTIONS below
TARGET
<AS Number>
Lookup matching ASN and BGP announcements/neighbours data.
<IPv4/IPv6>
Lookup matching route(4/6), IP reputation, and ASN data.
<Prefix>
Lookup matching ASN data.
<host.name.tld>
Lookup matching IP, route, and ASN data. Supports multiple IPs - e.g. DNS RR.
<URL> Extract hostname/IP from the URL and lookup relative data. Supports any protocol prefix, non-
standard ports, and prepended credentials.
<Organization Name>
Search by company name and lookup network ranges exported by (or related to) the company.
SERVER OPTIONS
BIND_ADDRESS
IP address (v4/v6) to bind the listening server to (e.g., 'asn -l 0.0.0.0').
Default value: 127.0.0.1 (IPv4) or ::1 (IPv6).
BIND_PORT
TCP Port to bind the listening server to (e.g., 'asn -l 12345').
Default value: 49200.
BIND_ADDRESS BIND_PORT
IP address and port to bind the listening server to (e.g., 'asn -l ::1 12345').
-v (verbose)
Enable verbose output and debug messages in server mode.
--allow host[,host,...]
Allow only given hosts to connect to the server.
--allowfile file
A file of hosts allowed to connect to the server.
--deny host[,host,...]
Deny given hosts from connecting to the server.
--denyfile file
A file of hosts denied from connecting to the server.
-m, --max-conns <n>
The maximum number of simultaneous connections accepted by the server. 100 is the default.
NOTES
Every option in server mode (after -l) is passed directly to the ncat listener. Refer to man ncat for
more details on the available commands. Unless specified, the default IP:PORT values of 127.0.0.1:49200
(for IPv4) or [::1]:49200 (for IPv6) will be used (e.g., 'asn -l').
EXAMPLES
Example server usage:
asn -l (starts server on default IP(v4/v6):PORT)
asn -l 0.0.0.0 --allow 192.168.0.0/24,192.168.1.0/24,192.168.2.245 (binds to all available IPv4
interfaces on the default port, allowing only connections from the three specified subnets)
asn -l :: 2222 --allow 2001:DB8::/32 (binds to all available IPv6 interfaces on port 2222, allowing only
connections from the specified prefix)
asn -v -l 0.0.0.0 --allowfile ~/goodips.txt -m 5 (verbose mode, bind to all IPv4 interfaces, use an
allowfile with allowed addresses, accept a maximum of 5 concurrent connections)
SEE ALSO
To file a bug report or feature request, please open an issue on the project homepage:
https://github.com/nitefood/asn
AUTHOR
Project author: nitefood <nitefood0@gmail.com>
This manpage was created by Marcos Rodrigues de Carvalho (aka oday) <marcosrcarvalho42@gmail.com>
0.77.0 July 2024 ASN(1)