A network scanning tool, scanflare, designed to identify proxy IP addresses within a given CIDR range and generate CSV reports based on the gathered information.
Go to file
Líng Yì 38ba54ded0 Initial commit 2023-12-21 10:58:37 +07:00
.gitignore Initial commit 2023-12-21 10:58:37 +07:00
LICENSE Initial commit 2023-12-21 10:58:37 +07:00
README.md Initial commit 2023-12-21 10:58:37 +07:00
go.mod Initial commit 2023-12-21 10:58:37 +07:00
go.sum Initial commit 2023-12-21 10:58:37 +07:00
main.go Initial commit 2023-12-21 10:58:37 +07:00

README.md

Scanflare

Scanflare is a network scanning tool designed to identify proxy IPs within a specified CIDR range. It utilizes the cfip-check API and logs the results to a CSV file.

Features

  • CIDR Scanning: Specify a CIDR range to scan for proxy IPs.
  • Flexible Configuration: Customize target host, port, and TLS usage.
  • Concurrency Control: Set the maximum concurrency for scanning.
  • Error Logging: Enable error logging to a separate file for troubleshooting.
  • CSV Output: Results are logged to a CSV file for easy analysis.

Usage

$ ./scanflare -C <CIDR> [-H <host>] [-p <port>] [-t] [-o <output>] [-l] [-V] [-c <concurrency>]
  • -C, --cidr: CIDR range to scan (required).
  • -H, --host: Target host (default: speed.cloudflare.com).
  • -p, --port: Target port (default: 443).
  • -t, --tls: Use TLS (default: true).
  • -o, --output: Output file (default: results.csv).
  • -l, --log: Enable error logging.
  • -V, --version: Print version information.
  • -c, --concurrency: Max concurrency (default: 256).

Example

$ ./scanflare -C *.*.*.*/24

License

This project is licensed under the GNU AGPLv3.

Acknowledgments

  • Inspired by the need to identify proxy IPs efficiently.
  • Thanks to the cfip-check API for providing essential information.