{"id":3928,"date":"2015-06-14T03:46:33","date_gmt":"2015-06-13T19:46:33","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3928"},"modified":"2015-09-09T19:36:36","modified_gmt":"2015-09-09T11:36:36","slug":"just-metadata-gathers-analyse-ip-address-metadata","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/06\/just-metadata-gathers-analyse-ip-address-metadata\/","title":{"rendered":"Just-Metadata – Gathers & Analyse IP Address Metadata"},"content":{"rendered":"

Just-Metadata is a tool that can be used to gather IP address metadata passively about a large number of IP addresses, and attempt to extrapolate relationships that might not otherwise be seen. Just-Metadata has “gather” modules which are used to gather metadata about IPs loaded into the framework across multiple resources on the internet. Just-Metadata also has “analysis” modules. These are used to analyze the data loaded Just-Metadata and perform various operations that can identify potential relationships between the loaded systems.<\/p>\n

\"Just-Metadata<\/p>\n

Just-Metadata will allow you to quickly find the Top “X” number of states, cities, timezones, etc. that the loaded IP addresses are located in. It will allow you to search for IP addresses by country. You can search all IPs to find which ones are used in callbacks as identified by VirusTotal. Want to see if any IPs loaded have been documented as taking part of attacks via the Animus Project, Just-Metadata can do it.<\/p>\n

Additionally, it is easy to create new analysis modules to let people find other relationships between IPs loaded based on the available data. New intel gathering modules can be easily added in just as easily.<\/p>\n

Features<\/h3>\n