
Research
/Security News
Critical Vulnerability in NestJS Devtools: Localhost RCE via Sandbox Escape
A flawed sandbox in @nestjs/devtools-integration lets attackers run code on your machine via CSRF, leading to full Remote Code Execution (RCE).
Detect VPN, Proxy, Tor, Botnets & abusive IPs using hybrid threat intelligence
This project is a Python-based command-line tool that helps you detect whether an IP address is likely coming from a VPN, proxy, or abusive source. It uses a combination of IP metadata, ASN heuristics, and optional third-party API lookups for deeper inspection.
vpnscan --ip <IP>
commandgit clone https://github.com/your-username/vpn-tunnel-detector.git
cd vpn-tunnel-detector
python3 -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
pip install --editable .
This gives you access to the global command vpnscan
.
To get deeper reputation data, you can plug in:
Set them securely using a .env
file.
cp .env.example .env
ABUSEIPDB_API_KEY=your_abuseipdb_key
IPQUALITYSCORE_API_KEY=your_ipqs_key
The app will auto-load them without hardcoding into the source.
Run the scan like this:
vpnscan --ip 104.28.228.78
You’ll get an output like:
------------------------ Welcome to the VPN & Threat Detection CLI Tool ------------------------
This tool checks if an IP address is associated with VPNs, proxies, abuse sources, or threat feeds (e.g. Tor, Botnets).
It uses heuristics, APIs, and auto-updated IP threat feeds for comprehensive detection.
You can cancel the operation at any time by pressing Ctrl+C.
Starting the detection process...
Detection Result
------------------
IP : 104.28.228.78
ORG : Cloudflare, Inc.
ASN : AS13335
Location : Washington, US
Is Suspicious : Yes
Detection Reason : ASN AS13335 is frequently used by VPN or hosting providers. Org name includes 'cloud', commonly seen in VPN or hosting services.
Abuse Score : 100
IPQS Fraud Score : 100
Confidence Level : High
Disclaimer : This result indicates whether the IP shows characteristics of VPN/proxy, abuse, or known threat activity. It does not imply malicious intent. Many users use VPNs for privacy or remote work.
Threat Feed Matches
--------------------
No matches found in known threat feeds.
pymod_detection_engine/
├── detection_engine/
│ ├── __init__.py
│ ├── run_engine.py
│ ├── config/
│ │ ├── __init__.py
│ │ └── suspicious_asns.json
│ ├── engine/
│ │ ├── __init__.py
│ │ ├── detection_engine.py
│ │ ├── heuristics.py
│ │ ├── ipinfo_wrapper.py
│ │ ├── threat_feeds.py
│ │ ├── abuseipdb_checker.py
│ │ └── ipqualityscore_checker.py
│ └── feeds/
│ ├── __init__.py
│ ├── fetch_feeds.py
│ └── known_bad_ips.json
├── .env.example
├── requirements.txt
├── setup.py
├── MANIFEST.in
├── README.md
MIT License — use, fork, improve, or share with attribution.
This is a hobby project built for learning, awareness, and experimentation.
It’s not a replacement for professional threat intelligence platforms — but it’s a great start.
Feedback, ideas, or issues? Feel free to open one on GitHub.
FAQs
Detect VPN, Proxy, Tor, Botnets & abusive IPs using hybrid threat intelligence
We found that detection-engine demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
A flawed sandbox in @nestjs/devtools-integration lets attackers run code on your machine via CSRF, leading to full Remote Code Execution (RCE).
Product
Customize license detection with Socket’s new license overlays: gain control, reduce noise, and handle edge cases with precision.
Product
Socket now supports Rust and Cargo, offering package search for all users and experimental SBOM generation for enterprise projects.