anti
5585e4ec58
refactor: prober auto-discovers attackers from log stream
Remove --probe-targets from deploy. The prober now tails the JSON log
file and automatically discovers attacker IPs, JARM-probing each on
common C2 ports (443, 8443, 8080, 4443, 50050, etc.).
- Deploy spawns prober automatically (like collector), no manual targets
- `decnet probe` runs in foreground, --daemon detaches to background
- Worker tracks probed (ip, port) pairs to avoid redundant scans
- Empty JARM hashes (no TLS server) are silently skipped
- 80 prober tests (jarm + worker discovery + bounty extraction)
2026-04-14 12:22:20 -04:00
..
2026-04-13 18:33:32 -04:00
2026-04-14 00:57:38 -04:00
2026-04-14 00:30:46 -04:00
2026-04-03 23:07:44 -03:00
2026-04-12 07:48:17 -04:00
2026-04-14 01:45:19 -04:00
2026-04-12 00:26:22 -04:00
2026-04-13 22:35:13 -04:00
2026-04-14 01:45:19 -04:00
2026-04-12 00:26:22 -04:00
2026-04-12 00:26:22 -04:00
2026-04-14 00:17:57 -04:00
2026-04-14 02:14:46 -04:00
2026-04-12 00:34:45 -04:00
2026-04-13 01:43:52 -04:00
2026-04-14 02:14:46 -04:00
2026-04-10 01:50:08 -04:00
2026-04-09 02:31:14 -04:00
2026-04-09 02:31:14 -04:00
2026-04-12 03:46:23 -04:00
2026-04-04 04:31:00 -03:00
2026-04-13 23:20:37 -04:00
2026-04-13 01:43:52 -04:00
2026-04-12 03:46:23 -04:00
2026-04-04 17:36:16 -03:00
2026-04-09 02:31:14 -04:00
2026-04-08 01:04:59 -04:00
2026-04-10 00:14:14 -04:00
2026-04-10 01:50:08 -04:00
2026-04-13 07:39:01 -04:00
2026-04-12 07:48:17 -04:00
2026-04-09 12:55:52 -04:00
2026-04-12 00:26:22 -04:00
2026-04-14 12:14:32 -04:00
2026-04-14 12:22:20 -04:00
2026-04-14 12:22:20 -04:00
2026-04-12 00:34:45 -04:00
2026-04-12 07:48:17 -04:00
2026-04-13 23:20:37 -04:00
2026-04-12 02:17:50 -04:00
2026-04-04 17:36:16 -03:00
2026-04-13 20:22:08 -04:00