2026-01-05 11:54:02 -06:00
|
|
|
# tasks/export_malicious_ips.py
|
|
|
|
|
|
|
|
|
|
import os
|
2026-01-15 13:30:35 -06:00
|
|
|
from datetime import datetime, timedelta
|
|
|
|
|
from zoneinfo import ZoneInfo
|
2026-01-05 11:54:02 -06:00
|
|
|
from logger import get_app_logger
|
|
|
|
|
from database import get_database
|
|
|
|
|
from models import AccessLog
|
|
|
|
|
from sqlalchemy import distinct
|
|
|
|
|
|
|
|
|
|
app_logger = get_app_logger()
|
|
|
|
|
|
|
|
|
|
# ----------------------
|
|
|
|
|
# TASK CONFIG
|
|
|
|
|
# ----------------------
|
|
|
|
|
TASK_CONFIG = {
|
|
|
|
|
"name": "export-malicious-ips",
|
|
|
|
|
"cron": "*/5 * * * *",
|
|
|
|
|
"enabled": True,
|
|
|
|
|
"run_when_loaded": True
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
EXPORTS_DIR = "exports"
|
|
|
|
|
OUTPUT_FILE = os.path.join(EXPORTS_DIR, "malicious_ips.txt")
|
|
|
|
|
|
|
|
|
|
# ----------------------
|
|
|
|
|
# TASK LOGIC
|
|
|
|
|
# ----------------------
|
2026-01-15 13:30:35 -06:00
|
|
|
def has_recent_honeypot_access(session, minutes: int = 5) -> bool:
|
|
|
|
|
"""Check if honeypot was accessed in the last N minutes."""
|
2026-01-17 18:06:09 +01:00
|
|
|
cutoff_time = datetime.now() - timedelta(minutes=minutes)
|
2026-01-15 13:30:35 -06:00
|
|
|
count = session.query(AccessLog).filter(
|
|
|
|
|
AccessLog.is_honeypot_trigger == True,
|
|
|
|
|
AccessLog.timestamp >= cutoff_time
|
|
|
|
|
).count()
|
|
|
|
|
return count > 0
|
|
|
|
|
|
2026-01-05 11:54:02 -06:00
|
|
|
def main():
|
|
|
|
|
"""
|
|
|
|
|
Export all IPs flagged as suspicious to a text file.
|
|
|
|
|
TasksMaster will call this function based on the cron schedule.
|
|
|
|
|
"""
|
|
|
|
|
task_name = TASK_CONFIG.get("name")
|
|
|
|
|
app_logger.info(f"[Background Task] {task_name} starting...")
|
|
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
db = get_database()
|
|
|
|
|
session = db.session
|
|
|
|
|
|
2026-01-15 13:30:35 -06:00
|
|
|
# Check for recent honeypot activity
|
|
|
|
|
if not has_recent_honeypot_access(session):
|
|
|
|
|
app_logger.info(f"[Background Task] {task_name} skipped - no honeypot access in last 5 minutes")
|
|
|
|
|
return
|
|
|
|
|
|
2026-01-05 11:54:02 -06:00
|
|
|
# Query distinct suspicious IPs
|
|
|
|
|
results = session.query(distinct(AccessLog.ip)).filter(
|
|
|
|
|
AccessLog.is_suspicious == True
|
|
|
|
|
).all()
|
|
|
|
|
|
|
|
|
|
# Ensure exports directory exists
|
|
|
|
|
os.makedirs(EXPORTS_DIR, exist_ok=True)
|
|
|
|
|
|
|
|
|
|
# Write IPs to file (one per line)
|
|
|
|
|
with open(OUTPUT_FILE, 'w') as f:
|
|
|
|
|
for (ip,) in results:
|
|
|
|
|
f.write(f"{ip}\n")
|
|
|
|
|
|
|
|
|
|
app_logger.info(f"[Background Task] {task_name} exported {len(results)} IPs to {OUTPUT_FILE}")
|
|
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
|
app_logger.error(f"[Background Task] {task_name} failed: {e}")
|
|
|
|
|
finally:
|
|
|
|
|
db.close_session()
|