Skip to content

AI-powered ransomware threat intelligence platform. Monitor 300+ leak sites, track 24,000+ victims, and analyze threat actors with real-time dark web scraping and ML-based enrichment.

License

Notifications You must be signed in to change notification settings

frknaykc/DragonsEye-RansomwareTracker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

14 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Dragons Eye

πŸ‰ Dragons Eye - Ransomware Tracker

AI-Powered Threat Intelligence Platform for Ransomware Monitoring
Powered by Machine Learning & Real-time Dark Web Analysis

Features β€’ Installation β€’ Quick Start β€’ Monitoring β€’ API β€’ Frontend

AI Powered Groups Victims Parsers Auto Update


🐲 About Dragons Eye

Dragons Eye is the umbrella name for threat intelligence tools developed by Dragons Community. This Ransomware Tracker is a powerful, open-source platform designed to monitor, track, and analyze ransomware leak sites across the dark web.

Built for security researchers, threat analysts, and SOC teams, Dragons Eye provides:

  • πŸ”„ Automated scraping every 30 minutes
  • πŸ›‘οΈ Protection page bypass with retry logic
  • 🌐 Modern web dashboard for visualization
  • πŸ€– AI-powered enrichment for victim data
  • πŸ“Š Real-time statistics and analytics

⚠️ Disclaimer: This tool is for research and educational purposes only. Developed and maintained by Dragons Community members.


πŸ–₯️ CLI-Only Usage (No Frontend Required)

You can use Dragons Eye as a standalone CLI tool without the frontend. Perfect for:

  • πŸ”¬ Security researchers
  • πŸ€– Automated threat intel pipelines
  • πŸ“Š Data collection scripts
  • πŸ”— Integration with other tools

Quick Start (CLI Only)

# 1. Clone and setup
git clone https://github.com/dragons-community/DragonsEye-RansomwareTracker.git
cd DragonsEye-RansomwareTracker

# 2. Setup Python environment
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt

# 3. Install Playwright browsers
playwright install firefox

# 4. Configure environment
cp env.example .env
nano .env  # Add your settings

# 5. Start Tor (required for .onion sites)
# macOS: brew services start tor
# Linux: sudo systemctl start tor

CLI Commands

# πŸ” Scrape all groups
python3 bin/scrape.py --all

# πŸ” Scrape specific group
python3 bin/scrape.py --group lockbit3

# πŸ“Š Parse scraped data
python3 bin/parse.py --all

# πŸ“ˆ Check system status
python3 bin/status.py

# πŸ”„ Full update (scrape + parse)
python3 bin/scrape.py --all && python3 bin/parse.py --all

# πŸ“‹ Export data
cat db/victims.json | jq '.[] | select(.group_name=="lockbit3")'

API Server (Optional)

# Start API server for REST access
python3 api/main.py

# API endpoints:
# GET http://localhost:8000/api/v1/victims
# GET http://localhost:8000/api/v1/groups
# GET http://localhost:8000/api/v1/statistics

Data Files

File Description
db/victims.json All victim records
db/groups.json Group configurations
db/decryptors.json Available decryptors
db/ransom_notes.json Ransom notes collection

✨ Features

Feature Description
πŸ” Automated Scraping Scrape 300+ ransomware leak sites including .onion domains via Tor
πŸ”„ Auto-Update Scheduler Automatic scrape + parse every 30 minutes
πŸ›‘οΈ Protection Bypass Intelligent retry with DDoS/Captcha detection
πŸ“Š Modern Dashboard Next.js frontend with interactive world map
🌐 REST API FastAPI backend with comprehensive endpoints
πŸ“Έ Screenshot Capture Automatic screenshots with watermarking
πŸ€– AI Enrichment OpenAI/LM Studio integration for victim profiling
πŸ“ˆ HTTP Fingerprinting Server identification and security header analysis
πŸ“ Emoji Logging Clear, visual log output for easy monitoring

πŸ“‚ Project Structure

DragonsEye-RansomwareTracker/
β”‚
β”œβ”€β”€ api/                          # FastAPI Backend
β”‚   └── main.py                   # API server with auto-scheduler
β”‚
β”œβ”€β”€ bin/                          # Core Python Scripts
β”‚   β”œβ”€β”€ _parsers/                 # Individual group parsers (109)
β”‚   β”œβ”€β”€ scrape.py                 # Main scraping engine
β”‚   β”œβ”€β”€ parse.py                  # Data parsing orchestrator
β”‚   β”œβ”€β”€ status.py                 # πŸ“Š System status monitor
β”‚   β”œβ”€β”€ manage.py                 # CLI management tool
β”‚   β”œβ”€β”€ shared_utils.py           # Shared utilities
β”‚   β”œβ”€β”€ libcapture.py             # Screenshot utilities
β”‚   β”œβ”€β”€ enrich_existing.py        # AI enrichment script
β”‚   └── fetch_ransom_notes.py     # Ransom notes fetcher
β”‚
β”œβ”€β”€ db/                           # JSON Databases
β”‚   β”œβ”€β”€ victims.json              # Victim records (24,000+)
β”‚   β”œβ”€β”€ groups.json               # Group configurations (306)
β”‚   β”œβ”€β”€ decryptors.json           # Decryptor tools
β”‚   β”œβ”€β”€ ransom_notes.json         # Ransom notes collection
β”‚   └── negotiations_data.json    # Negotiation chats
β”‚
β”œβ”€β”€ images/                       # Static Assets
β”‚   β”œβ”€β”€ groups/                   # Group screenshots & logos
β”‚   └── victims/                  # Victim page screenshots
β”‚
β”œβ”€β”€ logs/                         # Log Files
β”‚   └── update_latest.log         # Latest update log
β”‚
β”œβ”€β”€ tmp/                          # Temporary/Cache Files
β”‚   β”œβ”€β”€ *.html                    # Scraped HTML files
β”‚   └── scheduler_status.json     # Scheduler status
β”‚
β”œβ”€β”€ env.example                   # Environment template (copy to .env)
└── requirements.txt              # Python dependencies

βš™οΈ Installation

Prerequisites

  • Python 3.9+
  • Node.js 18+ (for frontend)
  • Tor service running locally
  • Playwright browsers installed

Quick Setup

# 1. Clone the repository
git clone https://github.com/dragons-community/DragonsEye-RansomwareTracker.git
cd DragonsEye-RansomwareTracker

# 2. Create Python virtual environment
python3 -m venv venv
source venv/bin/activate

# 3. Install Python dependencies
pip install -r requirements.txt

# 4. Install Playwright browsers
playwright install firefox chromium

# 5. Install frontend dependencies
cd frontend
npm install
cd ..

# 6. Configure environment
cp env.example .env
nano .env  # Edit with your settings

Environment Variables

# Dragons Core Configuration
DRAGONS_HOME=/path/to/DragonsEye-RansomwareTracker
DB_DIR=/db
IMAGES_DIR=/images
TMP_DIR=/tmp

# Tor Configuration
TOR_PROXY_SERVER=socks5://127.0.0.1:9050

# AI Enrichment (Optional)
OPENAI_API_KEY=sk-your-openai-key
# Or for local LM Studio:
OPENAI_BASE_URL=http://localhost:1234/v1

πŸš€ Quick Start

Start Everything (Recommended)

# Terminal 1: Start API (includes auto-scheduler)
python3 api/main.py

# Terminal 2: Start Frontend
cd frontend && npm run dev

That's it!


πŸ“Š Monitoring

Check System Status

# Quick status
python3 bin/status.py

# Verbose status (with recent victims)
python3 bin/status.py -v

# Live monitoring (refreshes every 10s)
python3 bin/status.py --watch

Example Output:

======================================================================
πŸ‰ DRAGONS EYE - SYSTEM STATUS
======================================================================
⏰ Check time: 2026-01-09 02:56:44

πŸ“‘ API STATUS:
   βœ… API Running
   πŸ“Š Data Freshness: fresh
   πŸ“ Victims Age: 1h 1m
   πŸ• Scheduler: idle

πŸ“„ HTML FILES:
   πŸ“‹ Total: 176 files
   βœ… Real Data: 152 files
   πŸ›‘οΈ Protection Page: 24 files
   πŸ“ˆ Success Rate: 86.4%

πŸ‘₯ DATABASE:
   πŸ“Š Total Victims: 24,765
   πŸ†• Added Today: 10
   🏴 Total Groups: 306 (71 active)
======================================================================

Watch Logs

# Follow update logs
tail -f logs/update_latest.log

# Follow API logs
tail -f logs/api.log

πŸ”§ Manual Operations

Scraping

cd bin

# Scrape all groups (verbose)
python3 scrape.py -V

# Scrape specific group
python3 scrape.py -G qilin -V

# Force scrape (bypass enabled flag)
python3 scrape.py -B -V

Scrape Output with Emojis:

[02:56:44] πŸš€ [qilin] Scraping http://ijzn3si...
[02:57:30] βœ… [qilin] OK (78KB) - Qilin blog
[02:57:35] πŸ›‘οΈ [clop] DDoS Protection - bypass failed
[02:57:40] ⏰ [anubis] Timeout - http://om6q4a...
[02:57:45] πŸ”„ [lockbit5] Attempt 2 failed, retrying...

πŸ“Š SCRAPE RESULT SUMMARY
============================================================
  βœ… Success:      152
  πŸ›‘οΈ Protected:    24
  ⏰ Timeout:      8
  ❌ Error:        3
  ⏭️ Skipped:      45
============================================================

Parsing

cd bin

# Parse all groups
python3 parse.py

# Parse specific group
python3 parse.py -G lockbit3

# Force parse (remove lock)
python3 parse.py -F

AI Enrichment

cd bin

# Enrich existing victims (activity/sector only)
python3 enrich_activity_only.py --limit 100

# Full enrichment
python3 enrich_existing.py --limit 50

🌐 API Endpoints

Base URL: http://localhost:8000/api/v1

Endpoint Description
GET /victims List victims (paginated)
GET /victims/{id} Get victim by ID
GET /groups List all groups
GET /groups/{name} Get group details
GET /stats/summary Overall statistics
GET /stats/countries Country breakdown
GET /stats/sectors Sector breakdown
GET /stats/trend Attack trend (30 days)
GET /status System status
POST /update/trigger Trigger manual update
GET /decryptors List decryptors
GET /ransom-notes List ransom notes
GET /negotiations List negotiation chats

Example API Calls

# Get latest 10 victims
curl "http://localhost:8000/api/v1/victims?limit=10&sort=desc"

# Get statistics
curl "http://localhost:8000/api/v1/stats/summary"

# Trigger manual update
curl -X POST "http://localhost:8000/api/v1/update/trigger"

# Check status
curl "http://localhost:8000/api/v1/status"

🎨 Frontend Pages

Page Route Description
Dashboard / Overview with stats, map, latest victims
Victims /victims Searchable victim list
Victim Detail /victims/[id] Individual victim info
Groups /groups Ransomware group list
Group Detail /groups/[id] Group profile & victims
Countries /country Country analysis
Industries /industry Sector analysis
Statistics /statistics Charts & trends
Negotiations /negotiation Chat logs
Decryptors /decryptors Available tools
Ransom Notes /ransom-notes Note collection
About /about About Dragons Community

πŸ”„ Auto-Update System

The system automatically updates every 30 minutes:

  1. Scrape Phase: Fetch HTML from all enabled group sites
  2. Parse Phase: Extract victim data from HTML
  3. Cache Clear: Refresh API cache for new data
  4. Status Update: Update scheduler status file

Scheduler Configuration

In api/main.py:

UPDATE_INTERVAL_MINUTES = 30  # Update every 30 minutes
RUN_ON_STARTUP = True         # Run update immediately on startup

πŸ›‘οΈ Protection Page Handling

Dragons Eye includes intelligent protection page detection:

Protection Type Detection Handling
DDoS Protection βœ… Retry with longer wait
Captcha βœ… Retry 3x, then skip
Cloudflare βœ… JS render + wait
JS Challenge βœ… Extended wait time

Retry Logic:

  • Attempt 1: 60s wait
  • Attempt 2: 90s wait
  • Attempt 3: 120s wait
  • Then mark as blocked

πŸ“‹ Command Reference

Command Description
python3 api/main.py Start API + scheduler
npm run dev (frontend/) Start frontend
python3 bin/status.py Check status
python3 bin/status.py -v Verbose status
python3 bin/status.py --watch Live monitoring
python3 bin/scrape.py -V Manual scrape
python3 bin/scrape.py -G <name> Scrape single group
python3 bin/parse.py Manual parse
python3 bin/parse.py -F Force parse
tail -f logs/update_latest.log Watch update log

🀝 Contributing

Contributions are welcome! Areas of interest:

  • New Parsers: Add support for new ransomware groups
  • Protection Bypass: Improve captcha/DDoS handling
  • Frontend: UI/UX improvements
  • Documentation: Help improve docs

Adding a New Parser

Create bin/_parsers/newgroup.py:

from shared_utils import stdlog, errlog, appender
from bs4 import BeautifulSoup

def parse(html_content, group_name, location):
    soup = BeautifulSoup(html_content, 'html.parser')
    
    for victim in soup.find_all('div', class_='victim'):
        name = victim.find('h2').text.strip()
        appender(
            victim=name,
            group_name=group_name,
            description='',
            website='',
            post_url=location['slug']
        )

πŸ“œ License

This project is released under the Unlicense - see the LICENSE file.


⚠️ Legal Disclaimer

Dragons Eye is provided for research and educational purposes only.

  • Do NOT use for unauthorized access
  • Do NOT engage with ransomware operators
  • Do NOT pay ransoms
  • DO report findings to appropriate authorities

Developed by Dragons Community. The maintainers assume no liability for misuse.


πŸ“¬ Contact & Community



πŸ‰ Dragons Eye - Ransomware Tracker
Made with πŸ”₯ by Dragons Community for the cybersecurity community

πŸ‘¨β€πŸ’» Developers
I-Rem NaxoziwuS

About

AI-powered ransomware threat intelligence platform. Monitor 300+ leak sites, track 24,000+ victims, and analyze threat actors with real-time dark web scraping and ML-based enrichment.

Topics

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published