Releases: Isusami/ipscaner
Releases · Isusami/ipscaner
v1.0.3 — HTTP probe mode + auto scan
What's new
HTTP probe mode
- New
httpscan mode: TCP connect to port 80 — no root needed, bypasses ICMP-blocking ISPs/firewalls - Cloudflare always serves port 80, so HTTP reliably finds CF IPs even when ICMP is filtered
- Choose mode at startup:
icmp(default) orhttp
Auto scan
- New
autospeed option: slow scan that loops forever until Ctrl+C - Results appended to output file — never overwritten between passes
- Each pass timestamped in file:
# --- scan #N YYYY-MM-DD HH:MM:SS ---
Updated CF ranges
- 944 collapsed ranges covering 1,578,496 IPs (from ipv4.txt)
Bug fixes (v1.0.2)
- Fixed: alive IPs not showing (ICMP reply receiver was checking wrong byte offset)
- Fixed: Windows ICMP receiver, ping flags, ANSI colors
Downloads
| File | Platform |
|---|---|
ipscaner.exe |
Windows (run as Administrator for ICMP; HTTP mode needs no admin) |
ipscaner-linux-amd64 |
Linux x86_64 (sudo for ICMP; HTTP mode needs no sudo) |
v1.0.2 — Fix live display (alive IPs now show correctly)
Bug fixes
Root cause found and fixed — alive IPs were silently discarded on all platforms.
The ICMP receiver was checking data[0] for Echo Reply type (0), but both SOCK_DGRAM (macOS) and SOCK_RAW (Windows/Linux) return the full IP packet including a 20-byte IP header. data[0] was always the IP version byte (0x45), never 0, so every reply was dropped.
All fixes in this release
- Fixed: alive IPs not displayed — receiver now correctly skips the 20-byte IP header before checking ICMP type (
data[20]) - Fixed: Windows ICMP receiver — replaced
select.select()(broken on Windows raw sockets) withsock.settimeout() - Fixed: subprocess ping fallback on Windows — now uses
-n/-w(Windows) instead of-c/-W(Unix) - Fixed: ANSI colors on Windows — auto-enables VT100 mode in cmd.exe/PowerShell
- Added
test_scanner.py: 11 functional tests — all pass
Download
Download ipscaner.exe below — run as Administrator on Windows.
v1.0.1 — Updated Cloudflare IP ranges
What's new
- Replaced old 148 CF CIDR ranges with comprehensive list from ipv4.txt
- 944 collapsed ranges covering 1,578,496 IPs (6,166 /24s deduplicated and merged)
- Covers 172.64–172.71, 104.16–104.31, 162.158–162.159, and many additional global CF ranges
- Both
ip.txt(flat /24 list) and the built-in CF preset are updated
Download
Download ipscaner.exe below — run as Administrator on Windows.
v1.0.0
ipscaner v1.0.0
Features
- Raw ICMP scanning (no subprocess per host — fast)
- cf preset: 148 Cloudflare ranges (~1.7M IPs) built-in, no internet needed
- Live output: alive IPs written to
output.txtimmediately as found - Speed presets: fast / normal / slow
- Random scan order per subnet (avoids sequential detection)
- Deduplication across overlapping ranges
- File mode:
ipscaner.exe ranges.txt - Fallback to subprocess ping if raw sockets unavailable
Download
- ipscaner.exe — Windows (run as Administrator)