CIDR Probe is a Python script that allows you to scan a CIDR range for open ports and retrieve the HTTP status codes of the corresponding services.
-
Run the following command to quickly set up CIDR Probe:
wget https://raw.githubusercontent.com/brian404/CIDRProbe/main/install.sh && chmod +x install.sh && ./install.sh --venv
-
Clone the repository:
git clone https://github.com/brian404/CIDRProbe.git
-
Navigate to the project directory:
cd CIDRProbe
-
Install the required dependencies using pip:
pip install -r requirements.txt
# Set up a virtual environment:
python3 -m venv .venv
# Activate the virtual environment:
source .venv/bin/activate
# Install the required dependencies using pip:
python3 -m pip install -r requirements.txt
To use CIDR Probe, follow these steps:
-
Run the script and provide the CIDR range and port to scan when prompted:
python cidr.py
-
The script will scan the specified CIDR range for open ports and retrieve the corresponding HTTP status codes.
-
The results will be displayed in the console, showing the IP address, port, status (open/closed), and HTTP status code.
-
If an IP address has restrictions or is unreachable, the script will display an appropriate message.
You can also customize your scans using the following options:
-
Specify a different port to scan (default is 80):
python cidr.py -p 8080
-
Perform SSL/TLS checks (default is off):
python cidr.py -ssl
-
Save the scan results to a file:
python cidr.py > scan_results.txt
- Reverse lookup CIDR/ip address using hacker target
python cidr.py -ht
Contributions are welcome! If you encounter any issues or have suggestions for improvements, please feel free to open an issue or submit a pull request.
This project is licensed under the MIT License. See the LICENSE
file for more information.
#CIDRscanner #networking #security #Python #cidr