TOpPLUG HUNTER🕷🐼
🐼🕷TOpPLUG🕷🐼 Hunter Multiscanner TOpPLUG using /TOpNetFraZer-ipv6_scanner and Python. Don't forget to upgrade
# ```Hunter Info```Below is the full IPv6-compatible scanner, including all original modes:
✅ Direct HTTP Scanner (direct
)
✅ Proxy Scanner (proxy
)
✅ SSL Scanner (ssl
)
✅ UDP Scanner (udp
)
✅ Ping Scanner (ping
)
✅ WebSocket Scanner (ws
)
- Supports IPv6 address formatting (
[IPv6]:port
) for HTTP/WebSocket requests. - Uses
socket.AF_INET6
for direct connections and UDP scanning. ping6
orping -6
is used for IPv6 pings.- Handles IPv6 proxies, SSL handshakes, and WebSockets.
python ipv6_scanner.py -c 2001:db8::/64 -m ws
python ipv6_scanner.py -f ipv6_hosts.txt -m direct -p 80,443
python ipv6_scanner.py -c 2607:f8b0::/32 -m ssl
python ipv6_scanner.py -c 2001:db8::/64 -m ping
Here’s a list of all possible scanning techniques you can use for this IPv6 host.
ping6 2606:4700:9a9a:263d:32c5:0:69e8:7997
import subprocess
ipv6_address = "2606:4700:9a9a:263d:32c5:0:69e8:7997"
command = ["ping6", "-c", "4", ipv6_address] # Use "ping -6" on Windows
result = subprocess.run(command, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
print(result.stdout.decode())
✅ Use case: Checks if the host is alive and responding.
nmap -6 -Pn -p- 2606:4700:9a9a:263d:32c5:0:69e8:7997
✅ Use case: Scans all TCP ports.
nmap -6 -Pn -F 2606:4700:9a9a:263d:32c5:0:69e8:7997
✅ Use case: Fast scan on the top 100 ports.
nmap -6 -sU -Pn -p- 2606:4700:9a9a:263d:32c5:0:69e8:7997
✅ Use case: Scans UDP ports (e.g., DNS 53
, NTP 123
).
nmap -6 -A -Pn 2606:4700:9a9a:263d:32c5:0:69e8:7997
✅ Use case:
- Detects running services
- Identifies OS and software versions
curl -6 -I http://[2606:4700:9a9a:263d:32c5:0:69e8:7997]
curl -6 -I https://[2606:4700:9a9a:263d:32c5:0:69e8:7997]
✅ Use case: Detects if a website is running.
nikto -h http://[2606:4700:9a9a:263d:32c5:0:69e8:7997]
✅ Use case: Scans for web security issues.
nmap -6 --script dns-brute -sn 2606:4700:9a9a:263d:32c5:0:69e8:7997
✅ Use case: Finds related subdomains.
openssl s_client -connect [2606:4700:9a9a:263d:32c5:0:69e8:7997]:443
✅ Use case: Checks if SSL/TLS is enabled.
import websocket
ipv6_host = "2606:4700:9a9a:263d:32c5:0:69e8:7997"
url = f"ws://[{ipv6_host}]"
try:
ws = websocket.create_connection(url)
ws.send("ping")
response = ws.recv()
print(f"WebSocket Response: {response}")
ws.close()
except Exception as e:
print(f"Failed: {e}")
✅ Use case: Checks if a WebSocket server is running.
nmap -6 -p 3128,8080,1080 --script http-open-proxy 2606:4700:9a9a:263d:32c5:0:69e8:7997
✅ Use case: Checks if the host is acting as an open proxy.
nmap -6 -p 445 --script smb-os-discovery 2606:4700:9a9a:263d:32c5:0:69e8:7997
✅ Use case: Checks for Windows SMB vulnerabilities.
nmap -6 -p 21 --script ftp-anon 2606:4700:9a9a:263d:32c5:0:69e8:7997
✅ Use case: Checks if anonymous FTP access is allowed.
nmap -6 -p 25,587,465 --script smtp-open-relay 2606:4700:9a9a:263d:32c5:0:69e8:7997
✅ Use case: Detects SMTP relay vulnerabilities.
nmap -6 -p 5060,5061 --script sip-methods 2606:4700:9a9a:263d:32c5:0:69e8:7997
✅ Use case: Checks if the host is running VoIP services.
nmap -6 --script ipv6-ra-flood 2606:4700:9a9a:263d:32c5:0:69e8:7997
✅ Use case: Tests if the host is vulnerable to IPv6 spoofing attacks.
Scan Type | Command |
---|---|
Ping | ping6 2606:4700:9a9a:263d:32c5:0:69e8:7997 |
Full TCP Scan | nmap -6 -p- 2606:4700:9a9a:263d:32c5:0:69e8:7997 |
Full UDP Scan | nmap -6 -sU -p- 2606:4700:9a9a:263d:32c5:0:69e8:7997 |
OS & Service Detection | nmap -6 -A -Pn 2606:4700:9a9a:263d:32c5:0:69e8:7997 |
Web Scan (Nikto) | nikto -h http://[2606:4700:9a9a:263d:32c5:0:69e8:7997] |
SSL Scan | openssl s_client -connect [2606:4700:9a9a:263d:32c5:0:69e8:7997]:443 |
Proxy Detection | nmap -6 -p 3128,8080,1080 --script http-open-proxy 2606:4700:9a9a:263d:32c5:0:69e8:7997 |
Now, let's scan the entire IPv6 block using the custom Python scanner I provided earlier.
Let's assume the IPv6 block is 2606:4700:9a9a:263d::/64
To scan all hosts in this block, use the following command:
python ipv6_scanner.py -c 2606:4700:9a9a:263d::/64 -m direct -p 80,443
python ipv6_scanner.py -c 2606:4700:9a9a:263d::/64 -m ping
✅ Finds which IPv6 addresses are responding.
python ipv6_scanner.py -c 2606:4700:9a9a:263d::/64 -m direct -p 80,443
✅ Finds active websites in the IPv6 subnet.
python ipv6_scanner.py -c 2606:4700:9a9a:263d::/64 -m udp -p 53,123
✅ Finds open UDP services like DNS (53
) and NTP (123
).
python ipv6_scanner.py -c 2606:4700:9a9a:263d::/64 -m ssl
✅ Finds IPv6 servers with SSL/TLS enabled.
python ipv6_scanner.py -c 2606:4700:9a9a:263d::/64 -m ws
✅ Detects WebSocket-enabled servers.
python ipv6_scanner.py -c 2606:4700:9a9a:263d::/64 -m proxy -P [PROXY_IPV6]:8080
✅ Scans IPv6 hosts using a proxy.
- The script generates all IPv6 hosts from the CIDR block.
- Each host is scanned based on the selected mode (
ping
,ssl
,udp
, etc.). - Results can be saved to a file using
-o output.txt
.
To save the scan results:
python ipv6_scanner.py -c 2606:4700:9a9a:263d::/64 -m direct -p 80,443 -o results.txt
✅ All results will be saved in results.txt
.
Got it! You provided this IPv6 address:
2606:4700:9a9a:263d:32c5:0:69e8:7997
Now, let's generate CIDR blocks from this address and show how to scan them using the IPv6 scanner.
Each CIDR block represents a range of addresses based on the prefix size.
- IPv6 Block:
2606:4700:9a9a::/48
- Range:
2606:4700:9a9a:0000:0000:0000:0000:0000
→2606:4700:9a9a:FFFF:FFFF:FFFF:FFFF:FFFF
- Command:
python ipv6_scanner.py -c 2606:4700:9a9a::/48 -m ping
✅ Finds all active devices in this block.
- IPv6 Block:
2606:4700:9a9a:2600::/56
- Range:
2606:4700:9a9a:2600:0000:0000:0000:0000
→2606:4700:9a9a:26FF:FFFF:FFFF:FFFF:FFFF
- Command:
python ipv6_scanner.py -c 2606:4700:9a9a:2600::/56 -m ping
✅ Finds devices in this subnet.
- IPv6 Block:
2606:4700:9a9a:263d::/64
- Range:
2606:4700:9a9a:263d:0000:0000:0000:0000
→2606:4700:9a9a:263d:FFFF:FFFF:FFFF:FFFF
- Command:
python ipv6_scanner.py -c 2606:4700:9a9a:263d::/64 -m ping
✅ Finds all live hosts in the /64
subnet.
- IPv6 Block:
2606:4700:9a9a:263d:32c5::/80
- Range:
2606:4700:9a9a:263d:32c5:0000:0000:0000
→2606:4700:9a9a:263d:32c5:FFFF:FFFF:FFFF
- Command:
python ipv6_scanner.py -c 2606:4700:9a9a:263d:32c5::/80 -m ping
✅ Finds devices in a more specific subnet.
- IPv6 Block:
2606:4700:9a9a:263d:32c5:0::/96
- Range:
2606:4700:9a9a:263d:32c5:0000:0000:0000
→2606:4700:9a9a:263d:32c5:0000:FFFF:FFFF
- Command:
python ipv6_scanner.py -c 2606:4700:9a9a:263d:32c5:0::/96 -m ping
✅ Useful for very specific network ranges.
- IPv6 Block:
2606:4700:9a9a:263d:32c5:0:69e8::/112
- Range:
2606:4700:9a9a:263d:32c5:0:69e8:0000
→2606:4700:9a9a:263d:32c5:0:69e8:FFFF
- Command:
python ipv6_scanner.py -c 2606:4700:9a9a:263d:32c5:0:69e8::/112 -m ping
✅ Great for scanning a small segment of devices.
- IPv6 Block:
2606:4700:9a9a:263d:32c5:0:69e8:7997/128
- Range: Only
2606:4700:9a9a:263d:32c5:0:69e8:7997
- Command:
python ipv6_scanner.py -c 2606:4700:9a9a:263d:32c5:0:69e8:7997/128 -m ping
✅ Tests if the single IPv6 address is alive.
CIDR Block | Range | Scan Command |
---|---|---|
/48 |
2606:4700:9a9a::/48 |
python ipv6_scanner.py -c 2606:4700:9a9a::/48 -m ping |
/56 |
2606:4700:9a9a:2600::/56 |
python ipv6_scanner.py -c 2606:4700:9a9a:2600::/56 -m ping |
/64 |
2606:4700:9a9a:263d::/64 |
python ipv6_scanner.py -c 2606:4700:9a9a:263d::/64 -m ping |
/80 |
2606:4700:9a9a:263d:32c5::/80 |
python ipv6_scanner.py -c 2606:4700:9a9a:263d:32c5::/80 -m ping |
/96 |
2606:4700:9a9a:263d:32c5:0::/96 |
python ipv6_scanner.py -c 2606:4700:9a9a:263d:32c5:0::/96 -m ping |
/112 |
2606:4700:9a9a:263d:32c5:0:69e8::/112 |
python ipv6_scanner.py -c 2606:4700:9a9a:263d:32c5:0:69e8::/112 -m ping |
/128 |
2606:4700:9a9a:263d:32c5:0:69e8:7997/128 |
python ipv6_scanner.py -c 2606:4700:9a9a:263d:32c5:0:69e8:7997/128 -m ping |
- /48 or /56: Large-scale scans (many devices).
- /64: The most common subnet size.
- /80 or /96: Targeted scans for small segments.
- /112: Very specific scan (only a few devices).
- /128: Single device check.
- Do you need automated IPv6 subnet scanning?
- Want to scan for open ports in the block instead of just pinging?
- Need a brute-force IPv6 scanner to find hidden devices?
Here’s therequirements.txt
file for the IPv6 scanner script.
websocket-client
ipaddress
argparse
multithreading
requests
Run this command in your terminal to install everything:
pip install -r requirements.txt
✅ Need more features? Let me know if you want additional libraries added! 🚀 Let me know, and I’ll help set it up! 🚀
This script is fully IPv6-compatible, supporting HTTP, Proxy, SSL, UDP, WebSockets, and Ping scanning. Let me know if you need any modifications!