Skip to content

Releases: Isusami/ipscaner

v1.0.3 — HTTP probe mode + auto scan

15 Apr 20:25

Choose a tag to compare

What's new

HTTP probe mode

  • New http scan mode: TCP connect to port 80 — no root needed, bypasses ICMP-blocking ISPs/firewalls
  • Cloudflare always serves port 80, so HTTP reliably finds CF IPs even when ICMP is filtered
  • Choose mode at startup: icmp (default) or http

Auto scan

  • New auto speed option: slow scan that loops forever until Ctrl+C
  • Results appended to output file — never overwritten between passes
  • Each pass timestamped in file: # --- scan #N YYYY-MM-DD HH:MM:SS ---

Updated CF ranges

  • 944 collapsed ranges covering 1,578,496 IPs (from ipv4.txt)

Bug fixes (v1.0.2)

  • Fixed: alive IPs not showing (ICMP reply receiver was checking wrong byte offset)
  • Fixed: Windows ICMP receiver, ping flags, ANSI colors

Downloads

File Platform
ipscaner.exe Windows (run as Administrator for ICMP; HTTP mode needs no admin)
ipscaner-linux-amd64 Linux x86_64 (sudo for ICMP; HTTP mode needs no sudo)

v1.0.2 — Fix live display (alive IPs now show correctly)

15 Apr 18:12

Choose a tag to compare

Bug fixes

Root cause found and fixed — alive IPs were silently discarded on all platforms.

The ICMP receiver was checking data[0] for Echo Reply type (0), but both SOCK_DGRAM (macOS) and SOCK_RAW (Windows/Linux) return the full IP packet including a 20-byte IP header. data[0] was always the IP version byte (0x45), never 0, so every reply was dropped.

All fixes in this release

  • Fixed: alive IPs not displayed — receiver now correctly skips the 20-byte IP header before checking ICMP type (data[20])
  • Fixed: Windows ICMP receiver — replaced select.select() (broken on Windows raw sockets) with sock.settimeout()
  • Fixed: subprocess ping fallback on Windows — now uses -n/-w (Windows) instead of -c/-W (Unix)
  • Fixed: ANSI colors on Windows — auto-enables VT100 mode in cmd.exe/PowerShell
  • Added test_scanner.py: 11 functional tests — all pass

Download

Download ipscaner.exe below — run as Administrator on Windows.

v1.0.1 — Updated Cloudflare IP ranges

15 Apr 16:42

Choose a tag to compare

What's new

  • Replaced old 148 CF CIDR ranges with comprehensive list from ipv4.txt
  • 944 collapsed ranges covering 1,578,496 IPs (6,166 /24s deduplicated and merged)
  • Covers 172.64–172.71, 104.16–104.31, 162.158–162.159, and many additional global CF ranges
  • Both ip.txt (flat /24 list) and the built-in CF preset are updated

Download

Download ipscaner.exe below — run as Administrator on Windows.

v1.0.0

15 Apr 16:33

Choose a tag to compare

ipscaner v1.0.0

Features

  • Raw ICMP scanning (no subprocess per host — fast)
  • cf preset: 148 Cloudflare ranges (~1.7M IPs) built-in, no internet needed
  • Live output: alive IPs written to output.txt immediately as found
  • Speed presets: fast / normal / slow
  • Random scan order per subnet (avoids sequential detection)
  • Deduplication across overlapping ranges
  • File mode: ipscaner.exe ranges.txt
  • Fallback to subprocess ping if raw sockets unavailable

Download

  • ipscaner.exe — Windows (run as Administrator)