/$$ /$$ /$$| /$$$$$$$$|
| $$$ | $$ | $$ | $$_____/
| $$$$| $$ /$$$$$$ /$$$$$$ | $$ /$$ /$$ /$$$$$$
| $$ $$ $$ /$$__ $$|_ $$_/ | $$$$$ | $$ | $$ /$$__ $$
| $$ $$$$| $$$$$$$$ | $$ | $$__/ | $$ | $$| $$$$$$$$
| $$\ $$$| $$_____/ | $$ /$$ | $$ | $$ | $$| $$_____/
| $$ \ $$| $$$$$$$ | $$$$/ | $$$$$$$$| $$$$$$$| $$$$$$$
|__/ \__/ \_______/ \___/ |________/ \____ $$ \_______/
/$$ | $$
| $$$$$$/
\______/
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣠⣤⢶⢲⢲⣿⢻⢻⡟⢻⡿⣷⣶⣶⣒⠒⠲⠤⠤⢤⣀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⣼⣯⣿⣷⣾⣼⣼⣼⣿⣿⣿⣷⣿⣿⣿⣿⣿⣿⣿⣿⣶⣶⣦⣀⣉⠙⠲⠦⣄⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⣤⣴⣿⣧⢸⣿⣿⣷⠿⠛⠋⠉⠀⠀⢀⡿⠀⠀⠀⠀⠙⢦⡈⠉⠉⠛⠛⠻⢿⣿⣿⣖⣿⣬⡉⠓⢦⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⢀⣀⣆⣾⣿⣿⣿⣿⠟⠋⠁⠀⠀⠀⠀⠀⠀⠀⢸⡇⠀⠀⠀⠀⢀⣼⣷⣶⣦⣄⠀⠀⠀⠀⠉⣟⠻⢿⣿⣧⡀⠈⠙⠒⠛⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⣾⣿⣷⣿⡿⠟⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡇⠲⠤⢤⣤⣿⣿⣿⣿⣿⣿⣷⣀⠀⠀⠀⣿⠀⠀⠈⠻⣿⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⢀⣿⣿⡍⠙⢷⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢷⠀⠀⠀⠀⠘⢿⣿⣿⣿⣿⡿⠉⢳⠀⢰⡏⠀⠀⠀⠀⠈⢻⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠈⢿⣿⣿⣦⠀⠈⢳⣄⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⢧⡀⠀⠀⠀⠀⠈⠉⠉⠳⣄⣀⣼⣷⡟⠀⠀⠀⠀⠀⠀⠀⢻⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⣀⠈⠹⢿⣿⣳⣦⡀⠈⠙⣦⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠳⢤⣀⠀⠀⠀⠀⠀⠀⢀⣩⡴⠋⠀⠀⠀⠀⠀⠀⠀⠀⢸⠻⣆⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠻⣦⡀⠀⠹⣿⣷⣿⣷⣤⡈⠙⠳⠶⣄⣀⣀⡀⠀⠀⠀⠀⠀⠀⠉⠙⠛⠶⠶⠶⠛⠛⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⡿⠀⠙⣧⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠘⠿⣦⣀⠀⠁⠻⢣⣿⣿⣷⣦⣜⢿⣶⡀⠙⠲⠶⠶⠶⣤⡀⠀⣠⣠⡀⠀⢀⣤⡴⢦⣤⣀⣠⣤⣀⠀⠀⠀⢀⡾⡃⠠⡀⠘⣦⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠈⠙⠷⣤⣄⠀⠙⠺⠿⢿⣿⣷⠀⠀⠀⠀⣀⡀⠀⠀⠉⠙⣁⣉⡉⠛⠋⢁⣀⠘⢳⢉⣀⣀⣙⠳⢦⣤⣛⠀⠛⠶⣝⠀⠘⣦⡀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠈⠙⠃⠀⠀⠀⠀⢀⡟⠀⢀⣴⠛⠉⠙⠛⠿⢿⡇⣺⡟⠛⠳⠤⠾⠛⠛⠛⠛⠁⠈⠉⠛⠿⠋⠉⠛⠛⠓⠾⠶⠦⣌⣳⡀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡾⠁⠀⣸⠁⠀⠀⠀⠀⠀⣾⢰⡟⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⠇⠀⠀⢿⠀⠀⠀⠀⠀⢸⡏⢹⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡄⠀⠀⢨⡇⠀⠀⠀⠀⠀⣧⢸⣷⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣀⣠⡾⠁⠀⠀⠀⠀⢠⡟⣼⠇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣾⢱⡏⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡿⣾⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡇⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣿⠇⠀⠀⠀
Net-Eye is a Python-based network reconnaissance tool designed to identify live hosts, resolve DNS, scan open ports, grab banners, perform GeoIP lookups, execute detailed Nmap scans, and check for vulnerabilities in discovered services.
- Live Host Discovery: Identify active hosts in a subnet using ICMP ping.
- DNS Resolution: Resolve IP addresses to hostnames and vice versa.
- Port Scanning: Identify open ports on the target.
- Banner Grabbing: Collect service banners from open ports for analysis.
- GeoIP Lookup: Retrieve geographical information for the target IP.
- Detailed Nmap Scans: Perform advanced scans to detect service versions and operating systems.
- Vulnerability Checks: Search for known vulnerabilities based on service name and version.
.
├── net-eye.py
├── requirements.txt
├── scan_report_104_21_46_149.json
└── scan_report_8_8_8_8.json
- Clone the repository:
git clone https://github.com/HTahir221486/NetEye
cd NetEye
- Install dependencies:
pip install -r requirements.txt
- Ensure Nmap is installed:
sudo snap install nmap
- Run the tool using Python:
python net-eye.py
- Input
Enter the target IP, hostname, or subnet (e.g., 192.168.1).
- Output
Live hosts in the subnet.
Open ports and their banners.
GeoIP information.
Detailed Nmap scan results.
Vulnerability checks for discovered services.
The scan report is saved as a JSON file in the current directory, named scan_report_<target>.json.
- Example
Input:
Enter target IP, hostname, or subnet (e.g., 192.168.1): 192.168.1
Output:
[INFO] Discovering live hosts...
[INFO] Resolving DNS...
[INFO] Scanning open ports...
[INFO] Performing GeoIP lookup...
[INFO] Performing detailed Nmap scan...
[INFO] Checking vulnerabilities...
[INFO] Scan completed. Report saved.
Generated report:
{
"target": "192.168.1",
"results": {
"live_hosts": ["192.168.1.1", "192.168.1.2"],
"dns_info": {"ip": "192.168.1.1", "hostname": "router.local"},
"open_ports": [{"port": 80, "banner": "Apache 2.4.41"}, {"port": 22, "banner": "OpenSSH 7.6"}],
"geoip": {"country_name": "United States", "latitude": 37.751, "longitude": -97.822},
"nmap": [...],
"vulnerabilities": ["CVE-2021-12345", "CVE-2020-67890"]
}
}
Dependencies
Python 3.x
Nmap
Required Python packages (in requirements.txt):
socket
nmap
requests
json
subprocess
termcolor