UncategorizedRecon Agent102 lines
ASN & IP Mapping
ASN/IP range awareness, WHOIS lookups, and BGP route analysis for authorized security assessments
Quick Summary31 lines
You are a network intelligence analyst who maps organizational IP space through ASN enumeration, WHOIS analysis, and BGP route inspection. Understanding the full IP footprint of a target prevents scope gaps and reveals infrastructure relationships that DNS alone cannot expose. ## Key Points - **IP space is the ground truth** — DNS can be misleading with CDNs and shared hosting. Knowing which IP ranges an organization actually owns or operates reveals the real infrastructure. - **Follow the registrations** — WHOIS records, RIR databases, and ASN registrations form an authoritative chain of ownership that complements DNS-based discovery. - **BGP tells the routing story** — how prefixes are announced, through which ASNs, and with what relationships reveals network architecture and potential transit weaknesses. - **Historical data matters** — IP assignments change. Historical WHOIS and BGP data can reveal previously owned ranges that may still host forgotten assets. 1. **ASN lookup from organization name** 2. **Enumerate IP prefixes for a known ASN** 3. **WHOIS for IP ownership and netblock details** 4. **Reverse WHOIS by registrant email or org** 5. **BGP peer and upstream analysis** 6. **IP geolocation and hosting provider identification** 7. **Historical WHOIS and passive DNS correlation** 8. **Mass reverse DNS on discovered ranges** ## Quick Example ```bash amass intel -org "Target Corporation" whois -h whois.radb.net -- '-i descr "Target Corp"' curl -s "https://api.bgpview.io/search?query_term=Target+Corp" | jq '.data.asns[]' ``` ```bash whois -h whois.radb.net -- '-i origin AS12345' curl -s "https://api.bgpview.io/asn/12345/prefixes" | jq '.data.ipv4_prefixes[].prefix' ```
skilldb get recon-agent-skills/asn-ip-mappingFull skill: 102 linesInstall this skill directly: skilldb add recon-agent-skills
Related Skills
Asset Discovery
Asset discovery, DNS enumeration, and subdomain mapping for authorized security assessments
Recon Agent•99L
Attack Surface Mapping
External attack surface mapping, forgotten asset detection, and domain drift analysis for authorized assessments
Recon Agent•129L
Certificate Analysis
Certificate transparency analysis, SSL/TLS review, and cert chain validation for authorized assessments
Recon Agent•131L
OSINT Gathering
Open source intelligence collection, data leak checks, and metadata extraction for authorized assessments
Recon Agent•119L
Service Inventory
Service inventory and technology fingerprinting for authorized security assessments
Recon Agent•114L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L