{"id":48623816,"url":"https://github.com/deer-hunt/ipsurv","last_synced_at":"2026-04-09T04:12:36.731Z","repository":{"id":264201798,"uuid":"886754410","full_name":"deer-hunt/ipsurv","owner":"deer-hunt","description":"IpSurv are investigation tools for surveying IP addresses, network investigation, test and debugging - \"ipsurv, ipscap, ipsend\". Those tools allow for packet capture, such as tcpdump, and packet sending tests. Each tools and internal program are extensible using Python.","archived":false,"fork":false,"pushed_at":"2025-03-24T14:47:12.000Z","size":2336,"stargazers_count":1,"open_issues_count":0,"forks_count":1,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-09-25T01:44:14.785Z","etag":null,"topics":["command-line-tool","debug","geolocation","http","ip","ip-address","ipv4","network","packet-capture","python","python-library","python3","raw-sockets","rdap","socket","tcp","tcp-protocol","tcpdump","udp","whois"],"latest_commit_sha":null,"homepage":"https://deer-hunt.github.io/ipsurv/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/deer-hunt.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE.md","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-11-11T14:44:32.000Z","updated_at":"2025-03-24T14:44:17.000Z","dependencies_parsed_at":null,"dependency_job_id":"f6aebc09-ccbb-4985-ad43-021b2c23f607","html_url":"https://github.com/deer-hunt/ipsurv","commit_stats":null,"previous_names":["deer-hunt/ipsurv"],"tags_count":18,"template":false,"template_full_name":null,"purl":"pkg:github/deer-hunt/ipsurv","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/deer-hunt%2Fipsurv","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/deer-hunt%2Fipsurv/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/deer-hunt%2Fipsurv/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/deer-hunt%2Fipsurv/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/deer-hunt","download_url":"https://codeload.github.com/deer-hunt/ipsurv/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/deer-hunt%2Fipsurv/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":31585079,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-08T14:31:17.711Z","status":"online","status_checked_at":"2026-04-09T02:00:06.848Z","response_time":112,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["command-line-tool","debug","geolocation","http","ip","ip-address","ipv4","network","packet-capture","python","python-library","python3","raw-sockets","rdap","socket","tcp","tcp-protocol","tcpdump","udp","whois"],"created_at":"2026-04-09T04:12:36.085Z","updated_at":"2026-04-09T04:12:36.717Z","avatar_url":"https://github.com/deer-hunt.png","language":"Python","readme":"# IpSurv\n\n\u003cdiv\u003e\n\n\u003ca href=\"https://github.com/deer-hunt/ipsurv/actions/workflows/unit-tests.yml\"\u003e\u003cimg alt=\"CI - Test\" src=\"https://github.com/deer-hunt/ipsurv/actions/workflows/unit-tests.yml/badge.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://github.com/deer-hunt/ipsurv/actions/workflows/unit-tests-windows.yml\"\u003e\u003cimg alt=\"CI - Test\" src=\"https://github.com/deer-hunt/ipsurv/actions/workflows/unit-tests-windows.yml/badge.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://github.com/deer-hunt/ipsurv/actions/workflows/unit-tests-macos.yml\"\u003e\u003cimg alt=\"CI - Test\" src=\"https://github.com/deer-hunt/ipsurv/actions/workflows/unit-tests-macos.yml/badge.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://github.com/deer-hunt/ipsurv/actions/workflows/lint.yml\"\u003e\u003cimg alt=\"GitHub Actions build status (Lint)\" src=\"https://github.com/deer-hunt/ipsurv/workflows/Lint/badge.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://anaconda.org/conda-forge/ipsurv\"\u003e \u003cimg src=\"https://anaconda.org/conda-forge/ipsurv/badges/platforms.svg\" /\u003e \u003c/a\u003e\n\u003ca href=\"https://codecov.io/gh/deer-hunt/ipsurv\"\u003e\u003cimg alt=\"Coverage\" src=\"https://codecov.io/github/deer-hunt/ipsurv/coverage.svg?branch=main\"\u003e\u003c/a\u003e\n\u003cimg alt=\"PyPI - Status\" src=\"https://img.shields.io/pypi/status/ipsurv\"\u003e\n\u003ca href=\"https://github.com/deer-hunt/ipsurv/blob/main/LICENSE.md\"\u003e\u003cimg alt=\"License - MIT\" src=\"https://img.shields.io/pypi/l/ipsurv.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://pypi.org/project/ipsurv/\"\u003e\u003cimg alt=\"Newest PyPI version\" src=\"https://img.shields.io/pypi/v/ipsurv.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://anaconda.org/conda-forge/ipsurv\"\u003e \u003cimg src=\"https://anaconda.org/conda-forge/ipsurv/badges/version.svg\" /\u003e\u003c/a\u003e\n\u003ca href=\"https://pypi.org/project/ipsurv/\"\u003e\u003cimg alt=\"Number of PyPI downloads\" src=\"https://img.shields.io/pypi/dm/ipsurv.svg\"\u003e\u003c/a\u003e\n\u003cimg alt=\"GitHub code size in bytes\" src=\"https://img.shields.io/github/languages/code-size/deer-hunt/ipsurv\"\u003e\n\u003ca href=\"https://pypi.org/project/ipsurv\"\u003e\u003cimg alt=\"Supported Versions\" src=\"https://img.shields.io/pypi/pyversions/ipsurv.svg\"\u003e\u003c/a\u003e\n\u003ca href=\"https://deer-hunt.github.io/ipsurv/\" alt=\"IpSurv's documentation site\"\u003e\u003cimg src=\"https://img.shields.io/badge/stable%20docs-github.io-brightgreen?style=flat\u0026color=%2373DC8C\u0026label=Docs\"/\u003e\u003c/a\u003e\n\u003ca href=\"https://app.fossa.com/projects/git%2Bgithub.com%2Fdeer-hunt%2Fipsurv?ref=badge_shield\" alt=\"FOSSA Status\"\u003e\u003cimg src=\"https://app.fossa.com/api/projects/git%2Bgithub.com%2Fdeer-hunt%2Fipsurv.svg?type=shield\"/\u003e\u003c/a\u003e\n\n\u003c/div\u003e\n\n\u003cdiv\u003e\n\u003cimg width=\"120\" height=\"120\" src=\"https://raw.githubusercontent.com/deer-hunt/ipsurv/main/docs/images/ipsurv-logo.png\" align=\"left\" /\u003e\n\n`IpSurv` are investigation tools for surveying IP addresses, network investigation, test and debugging - \"ipsurv, ipscap, ipsend\". Those tools allow for packet capture, such as tcpdump, and packet sending tests. Each tools and internal program are extensible using Python.\n\n\u003c/div\u003e\n\n\u003cp\u003e\u0026nbsp;\u003c/p\u003e\n\n\u003cimg src=\"https://raw.githubusercontent.com/deer-hunt/ipsurv/main/docs/images/ipsurv.gif\" alt=\"ipsurv visual image\" width=\"100%\" /\u003e\n\n## Installation\n\n**PyPI**\n\n```bash\n$ pip install ipsurv\nor\n$ pip3 install ipsurv\n```\n\n**Conda**\n\n```\n$ conda install conda-forge::ipsurv\n```\n\n\u003e `ipscap` is also installed with it.\n\n\n## Requirements\n\n- ```python``` and ```pip``` command\n- Python 3.0 or later version.\n\n\u003e If you use in Python 3.0 - 3.2, please run ```pip install ipaddress```.\n\n\u003e If you'd like to use in Python 2.7, you can refactor to Python 2.7 code easily. See \"development_debug.md\".\n\n\n## Commands\n\n| Command     | Description                                                                                             |\n|----------|---------------------------------------------------------------------------------------------------------|\n| `ipsurv` | `ipsurv` is surveying IP tool. You can conduct bulk surveys of specified IPs, URLs, and more. It also allows retrieving country codes for IP addresses, performing ping tests, and checking ports. |\n| `ipscap` | `ipscap` is packet capture tool like `tcpdump` which supports \"ICMP, TCP, UDP\" protocols. `ipscap` has various filtering options, displays IP-header and TCP-header, UDP-header, and dumping files functions. \u003cbr\u003e\u003cbr\u003e* `ipscap` must be executed as \"root\" user. And It support only Unix/Linux.   |\n| `ipsend` | `ipsend` is a network transmission tool that supports TCP, SSL, UDP, and Raw sockets, as well as interactive transmission.   |\n| `ipserver` | `ipserver` is simple server on \"TCP, UDP, SSL, HTTP, HTTPS\" for debugging or network investigation. [https://github.com/deer-hunt/ipserver](https://github.com/deer-hunt/ipserver) |\n\nIt’s best to refer to the help to recognize the functions.\n\n```\n$ ipsurv --help\n\n# ipscap --help\n\n$ ipsend --help\n```\n\n\n## Documentation site\n\nIpSurv's documentation site is [https://deer-hunt.github.io/ipsurv/](https://deer-hunt.github.io/ipsurv/).\n\n\n## \"ipsurv\" command\n\n`ipsurv` command reference is [here](https://deer-hunt.github.io/ipsurv/pages/ipsurv-cmd/README.html).\n\n### Features\n\n- Grouping by IP or Subnet.\n- Skip duplicate by the group.\n- Autodetect IP in line. Trying to resolve the name automatically.\n- Autodetect delimiter-char.\n- Customize output format. There are many format.\n- Output JSON format.\n- Show headers.\n- Check ICMP, TCP, UDP, HTTP.\n- Set timeout.\n- Load env variable. And changing arguments and internal configures.\n- Use GeoIP2 via IpSurv optionally.\n\n\u003e IPv6 is not supported.\n\n\n### Usage\n\n**Specify the target using Argument**\n\n```bash\n$ ipsurv 192.168.1.10\n$ ipsurv 192.168.1.10 192.168.1.11\n$ ipsurv test-example-sample-ipsurv.com --add_ip\n$ ipsurv x.x.x.x --format=geo\n```\n\n**Specify the target using PIPE**\n\n```bash\n$ cat ips.txt|ipsurv\n$ cat apache.log|ipsurv --add_ip\n```\n\n```bash\n$ cat ./example_data/government.txt|ipsurv --sequence --add_ip\n1,www.whitehouse.gov,192.0.66.168,OK,US,AUTOMATTIC,192.0.64.0,192.0.127.255\n2,www.state.gov,3.165.39.61,OK,US,AMAZON-CF,3.165.0.0,3.165.255.255\n3,www.treasury.gov,23.50.118.187,OK,US,AKAMAI,23.32.0.0,23.67.255.255\n4,www.gov.uk,151.101.192.144,OK,US,SKYCA-3,151.101.0.0,151.101.255.255\n```\n\n**Output by JSON**\n\n```\n$ ipsurv wikipedia.org --format=default --json=2 --add_ip\n{\n  \"original\": \"wikipedia.org\",\n  \"ip\": \"103.102.166.224\",\n  \"status\": \"OK\",\n  \"group\": \"\",\n  \"country\": \"US\",\n  \"name\": \"WIKIMEDIA-AP\",\n  \"network_start\": \"103.102.166.0\",\n  \"network_end\": \"103.102.166.255\"\n}\n```\n\n**Format profile/parameters**\n\nYou can customize \"Output Format\" by ```--format``` option as follows. There are ```parameter - {}``` and ```profile - \u003c\u003e``` in ```--format```.\nFor more information, please read [--format description](https://deer-hunt.github.io/ipsurv/pages/ipsurv-cmd/command_arguments.html#format), [Profiles](https://deer-hunt.github.io/ipsurv/pages/ipsurv-cmd/command_arguments.html#profiles), [Parameters](https://deer-hunt.github.io/ipsurv/pages/ipsurv-cmd/command_arguments.html#parameters).\n\n```\n$ ipsurv github.io --format=heavy            # Profile\n$ ipsurv github.io --format=simple           # Profile\n\n$ ipsurv 8.8.8.8 --format=\"{status},{ip},{country},{address}\"   # Parameters\n```\n\n**Check HTTP response**\n\n```\n$ ipsurv https://www.reddit.com --format=\"{ip},{http},{http_status},{http_size},{http_mime},{http_server},{http_h2},{http_time}\" --http=1\nhttps://www.reddit.com,151.101.129.140,HTTP_OK,200,707634,text/html,snooserv,N/A,130.2\n```\n\n**GeoIP**\n\n```\n$ ipsurv 8.8.8.8 --geoip_only\n8.8.8.8,NA,North America,US,United States,America/Chicago,AS15169,37.751;-97.822\n```\n\n\n### Command options\n\n```ipsurv``` have many options. Please read [Command arguments(.md) reference](https://github.com/deer-hunt/ipsurv/blob/main/docs/ipsurv-cmd/command_arguments.md).\n\n```\nusage: ipsurv [-h] [--verbose {0,1,2,3}] [--debug] [--log {string}]\n              [--disable_env] [--resolve {0,1}] [--identify_int]\n              [--autodetect] [--begin {number}] [--end {number}]\n              [--collect {string}] [--all_collect] [--timeout {string}]\n              [--group {string}] [--skip_duplicate {0,1,2}] [--range {string}]\n              [--format {string}] [--no_original] [--sequence] [--add_ip]\n              [--ident] [--enclose {string}] [--delimiter {string}]\n              [--alt_delimiter {string}] [--headers {0,1,2,3}]\n              [--json {0,1,2}] [--json_list] [--exhaustive] [--icmp {0,1}]\n              [--tcp {number}] [--udp {number}] [--http {0,1,2}] [--json_all]\n              [--geoip_only] [--host_only] [--version]\n              [target [target ...]]\n```\n\n\n## \"ipscap\" command\n\n`ipscap` command reference is [here](https://deer-hunt.github.io/ipsurv/pages/ipscap-cmd/README.html).\n\n### Features\n\n- Capture TCP, UDP, ICMP packets\n- Show IP-header values and protocol's header values.\n- Output the binary data of headers in HEX format.\n- Filter by strings or various criteria.\n- Allows tracking matched transfers.\n- Various output mode.\n- Dump to files.\n\n\u003e IPv6 is not supported.\n\n\n### Usage\n\n```bash\n# ipscap --exclude_ssh\n# ipscap --force\n  \n# ipscap --port=\"80;53\" --find=\"GET\"\n# ipscap --condition=\"port=80,443,53,-1\" --protocol=TCP,UDP,ICMP\n# ipscap --find=\"HTTP\" --tracking\n\n# ipscap --port=80,443 --stat_group=1\n```\n\n**Filterings**\n\n```\n# ipscap --find=\"HTTP/1.1 \\d01\"\n# ipscap --find=\"http\" --find_mode=MATCH\n# ipscap --find=\"00 99 f0 e0 78 4e 23 70 a1\" --find_mode=HEX\n# ipscap --find=\"Accept-Ranges: bytes\\r\\n\\r\\n\\x00\\x00\\x01\\x00\\x01\\x00\" --find_mode=BINARY\n# ipscap --find=\"HTTP\" --tracking\n# ipscap --condition=\"port!=22\"\n# ipscap --condition=\"src_port\u003e=80;src_port\u003c=500;flags=SYN,PSH\"\n# ipscap --condition=\"ttl\u003e=120\"\n```\n\n**Dump files**\n\n```bash\n# ipscap --port=80 --dumpfile=1\n```\n\n```bash\n\n# ipscap --output=HEADER # HEADER only\n# ipscap --output=BINARY --port=\"80\" # BINARY\n# ipscap --output=binary --port=\"80\" # BINARY\n# ipscap --output=BINARY_ALL --port=\"80\" # BINARY with headers\n# ipscap --output=LINE --port=\"80\" #LINE\n# ipscap --output=HEX --port=\"80\" # HEX\n# ipscap --output=hex --port=\"80\" # HEX\n# ipscap --output=BASE64 --port=\"80\" # BASE64\n```\n\n**Capture 80 port**\n\n```bash\n# ipscap --port=80\n\nTime:           2025-01-04 17:23:46.7809 / 1736011426.7809, Passage number: 1\nIP header:      Version: 4, IP header length: 20, Total length: 44, Checksum: 17625, TTL: 64, IP protocol: TCP[6]\nTCP header:     TCP header length: 24, Checksum: 36766, Sequence: 132160001, Acknowledgement: 57321677, Window: 65535, Flags: ['SYN', 'ACK']\nTCP options:    mss:1460\nSource:         IP: 151.101.129.140           Port: 80\nDestination:    IP: 10.0.2.15                 Port: 38158\nDirection:      RECEIVE [ \u003c\u003c\u003c ]\nData length:    2 byte\nIP-H data:      45 00 00 2c 10 f3 00 00 40 06 44 d9 97 65 81 8c 0a 00 02 0f \nTCP-H data:     00 50 95 0e 07 e0 9a 01 03 6a a8 cd 60 12 ff ff 8f 9e 00 00 02 04 05 b4 \n\nTime:           2025-01-04 17:23:46.7812 / 1736011426.7812, Passage number: 2\nIP header:      Version: 4, IP header length: 20, Total length: 40, Checksum: 31449, TTL: 64, IP protocol: TCP[6]\nTCP header:     TCP header length: 20, Checksum: 9499, Sequence: 57321677, Acknowledgement: 132160002, Window: 29200, Flags: ['ACK']\nTCP options:    -\nSource:         IP: 10.0.2.15                 Port: 38158\nDestination:    IP: 151.101.129.140           Port: 80\nDirection:      SEND [ \u003e\u003e\u003e ]\nData length:    0 byte\nIP-H data:      45 00 00 28 9a f6 40 00 40 06 7a d9 0a 00 02 0f 97 65 81 8c \nTCP-H data:     95 0e 00 50 03 6a a8 cd 07 e0 9a 02 50 10 72 10 25 1b 00 00 \n\nTime:           2025-01-04 17:23:46.7814 / 1736011426.781, Passage number: 3\nIP header:      Version: 4, IP header length: 20, Total length: 118, Checksum: 31370, TTL: 64, IP protocol: TCP[6]\nTCP header:     TCP header length: 20, Checksum: 9577, Sequence: 57321677, Acknowledgement: 132160002, Window: 29200, Flags: ['PSH', 'ACK']\nTCP options:    -\nSource:         IP: 10.0.2.15                 Port: 38158\nDestination:    IP: 151.101.129.140           Port: 80\nDirection:      SEND [ \u003e\u003e\u003e ]\nData length:    78 byte\nIP-H data:      45 00 00 76 9a f7 40 00 40 06 7a 8a 0a 00 02 0f 97 65 81 8c \nTCP-H data:     95 0e 00 50 03 6a a8 cd 07 e0 9a 02 50 18 72 10 25 69 00 00 \n\nGET / HTTP/1.1\nUser-Agent: curl/7.29.0\nHost: www.reddit.com\nAccept: */*\n```\n\n**Output line format**\n\n```bash\n# ipscap --port=80 --output=LINE\n2025-01-02 14:55:55.7247, 1,  4, 20, 64, 60,      TCP, 40, 1165755664, 0, 29200,          ['SYN'],              0,      10.0.2.15:57910,         151.101.129.140:80,      SEND,          mss:1460;sack;nop;wscale:7\n2025-01-02 14:55:55.7275, 1,  4, 20, 64, 44,      TCP, 24, 3072001, 1165755665, 65535,    ['SYN', 'ACK'],       2,      151.101.129.140:80,      10.0.2.15:57910,         RECEIVE,       mss:1460\n2025-01-02 14:55:55.7277, 2,  4, 20, 64, 40,      TCP, 20, 1165755665, 3072002, 29200,    ['ACK'],              0,      10.0.2.15:57910,         151.101.129.140:80,      SEND,          -\n2025-01-02 14:55:55.7278, 3,  4, 20, 64, 118,     TCP, 20, 1165755665, 3072002, 29200,    ['PSH', 'ACK'],       78,     10.0.2.15:57910,         151.101.129.140:80,      SEND,          -\n2025-01-02 14:55:55.7278, 2,  4, 20, 64, 40,      TCP, 20, 3072002, 1165755743, 65535,    ['ACK'],              6,      151.101.129.140:80,      10.0.2.15:57910,         RECEIVE,       -\n2025-01-02 14:55:55.7322, 3,  4, 20, 64, 982,     TCP, 20, 3072002, 1165755743, 65535,    ['PSH', 'ACK'],       942,    151.101.129.140:80,      10.0.2.15:57910,         RECEIVE,       -\n2025-01-02 14:55:55.7324, 4,  4, 20, 64, 40,      TCP, 20, 1165755743, 3072944, 30144,    ['ACK'],              0,      10.0.2.15:57910,         151.101.129.140:80,      SEND,          -\n2025-01-02 14:55:55.7325, 5,  4, 20, 64, 40,      TCP, 20, 1165755743, 3072944, 30144,    ['FIN', 'ACK'],       0,      10.0.2.15:57910,         151.101.129.140:80,      SEND,          -\n2025-01-02 14:55:55.7326, 4,  4, 20, 64, 40,      TCP, 20, 3072944, 1165755743, 65535,    ['FIN', 'ACK'],       6,      151.101.129.140:80,      10.0.2.15:57910,         RECEIVE,       -\n2025-01-02 14:55:55.7327, 6,  4, 20, 64, 40,      TCP, 20, 1165755744, 3072945, 30144,    ['ACK'],              0,      10.0.2.15:57910,         151.101.129.140:80,      SEND,          -\n2025-01-02 14:55:55.7327, 5,  4, 20, 64, 40,      TCP, 20, 3072944, 1165755744, 65535,    ['FIN', 'ACK'],       6,      151.101.129.140:80,      10.0.2.15:57910,         RECEIVE,       -\n```\n\n**Output HEX**\n\n```bash\n# ipscap --port=80 --output=HEX\n\nTime:           2025-01-02 22:29:48 / 1735787388.957, Passage number: 3\nIP header:      Version: 4, IP header length: 20, Total length: 978, Checksum: 18625, TTL: 64, IP protocol: TCP[6]\nTCP header:     TCP header length: 20, Checksum: 26766, Sequence: 67904002, Acknowledgement: 172468636, Window: 65535, Flags: ['PSH', 'ACK']\nTCP options:    -\nSource:         IP: 151.101.129.140           Port: 80\nDestination:    IP: 10.0.2.15                 Port: 52386\nDirection:      RECEIVE [ \u003c\u003c\u003c ]\nData length:    938 byte\nIP-H data:      45 00 03 d2 3e a6 00 00 40 06 13 80 97 65 81 8c 0a 00 02 0f \nTCP-H data:     00 50 cc a2 04 0c 22 02 0a 47 a9 9c 50 18 ff ff 06 2f 00 00 \n\n48 54 54 50 2f 31 2e 31 20 33 30 31 20 52 65 64 69 72 65 63 74 0d 0a 44 61 74 65 3a 20 53 61 74 2c 20 31 31 20 4a 61 6e 20 32 30 32 35 20 31 32 3a 34 35 3a 34 36 20 47 4d 54 0d 0a \n43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 6b 65 65 70 2d 61 6c 69 76 65 0d 0a 43 61 63 68 65 2d 43 6f 6e 74 72 6f 6c 3a 20 6e 6f 2d 73 74 6f 72 65 0d 0a 4c 6f 63 61 74 69 6f 6e 3a 20 68 74\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n4c 61 6e 67 75 61 67 65 3a 20 65 6e 0d 0a 41 63 63 65 70 74 2d 43 48 3a 20 53 65 63 2d 43 48 2d 55 41 2d 46 75 6c 6c 2d 56 65 72 73 69 6f 6e 2d 4c 69 73 74 2c 20 53 65 63 2d 43\n72 63 68 3d 2a 0d 0a 50 65 72 6d 69 73 73 69 6f 6e 73 2d 50 6f 6c 69 63 79 3a 20 75 6e 6c 6f 61 64 3d 28 29 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 31 0d 0a 0d 0a 20 \n```\n\n\n### Command options\n\n```\nusage: ipscap [-h] [--verbose {0,1,2,3}] [--debug] [--log {string}]\n              [--find {string}] [--find_mode [REGEX, MATCH, BINARY, HEX]]\n              [--port {int}] [--protocol [ICMP, TCP, UDP]] [--ip {string}]\n              [--condition {string}] [--tracking] [--stat_mode {0,1,2}]\n              [--stat_group {0,1,2}]\n              [--output [NONE, HEADER, TEXT, BINARY, BINARY_ALL, HEX, HEX_ALL, LINE]]\n              [--output_raw] [--dumpfile {0,1,2}] [--timeout {float}]\n              [--exclude_ssh] [--web_port] [--general_port] [--force]\n              [--version]\n```\n\n## \"ipsend\" command\n\n`ipsend` command reference is [here](https://deer-hunt.github.io/ipsurv/pages/ipsend-cmd/README.html).\n\n### Features\n\n- Transmit by TCP, UDP, SSL.\n- Transmit by Raw socket.\n- Support Instant transmission and Interactive transmission.\n- Specify Input and Output format - TEXT, HEX, BINARY, BASE64.\n- Set SSL context - SSLv3, TLS1.0, TLS1.1, TLS1.2, TLS1.3.\n\n\u003e IPv6 is not supported.\n\n\n### Usage\n\n```bash\n$ ipsend --dest=google.com --http -I\n$ ipsend --dest=google.com --port=80 --interactive=2\n\n$ ipsend \"GET /index.html HTTP/1.1\\\\n\" --dest=google.com --http\n$ ipsend \"GET / HTTP/1.1\\\\n\" --dest=google.com --https\n$ ipsend --dest=google.com --https -I --output=BASE64\n$ ipsend --mode=UDP --dest=8.8.8.8 --port=53\n$ ipsend --mode=TCP --dest=wikipedia.org --http -I --output=BINARY\n\n$ ipsend --mode=SSL --dest=google.com --port=443 -I\n$ ipsend --mode=SSL --dest=google.com --https -I --output=BINARY\n```\n\n```\n$ ipsend --dest=google.com --http -I\nMode: TCP\nInput: TEXT / Output: TEXT\nDestination: google.com\nPort: 80\n\n[INTERACTIVE] / Line-break to send\n\nPlease input send-data. Input a line break to send.\n```\n\n### Command options\n\n```\nusage: ipsend [-h] [--verbose {0,1,2,3}] [--debug] [--log {string}]\n                   [--mode {TCP,UDP,SSL,IP_HEADER,TCP_HEADER,UDP_HEADER,ICMP_HEADER,IP_PAYLOAD,TCP_PAYLOAD,UDP_PAYLOAD,ICMP_PAYLOAD}]\n                   [--input {TEXT,BINARY,HEX,BASE64}]\n                   [--output {NONE,TEXT,BINARY,HEX,BASE64}]\n                   [--interactive {int}]\n                   [--ssl_context {SSLV3,TLS1.0,TLS1.1,TLS1.2,TLS1.3}]\n                   [--output_send {int}] [--auto_nl {bool}] [--dest {string}]\n                   [--port {int}] [--timeout {float}] [--dumpfile]\n                   [--ip_flags {int}] [--ip_identification {int}]\n                   [--ip_ttl {int}] [--ip_protocol {int}] [--src_ip {int}]\n                   [--src_port {int}] [--dest_ip {int}] [--dest_port {int}]\n                   [--tcp_flags {str}] [--tcp_seq {int}] [--tcp_ack {int}]\n                   [--tcp_window {int}] [--icmp_type {int}]\n                   [--icmp_code {int}] [--icmp_id {int}] [--icmp_seq {int}]\n                   [-I] [--http] [--https] [--version]\n```\n\n\n## Path summary\n\n| Directory        | Description                                         |\n|-----------------------|-----------------------------------------------------|\n| `.github`            | GitHub Actions files          |\n| `docs`               | Documentation files                                 |\n| `example_data`       | Sample data files for testing                       |\n| `examples`           | Customizing program examples                 |\n| `ipsurv`             | Main package/Sources                            |\n| `ipscap`             | ipscap package/Sources                            |\n| `ipsend`             | ipsend package/Sources                            |\n| `tests`              | Test files                     |\n\n\n## Debugging\n\nIn verbose mode, outputting internal data and behaviors in detail.\n\n```bash\n$ ipsurv ***** --verbose=2    #INFO\n$ ipsurv ***** --verbose=3    #DEBUG\n\n$ ipsurv ***** --debug     #DEBUG  This option is equivalent to \"--verbose=3\"\n```\n\n```bash\n# ipscap ***** --verbose=2    #INFO\n# ipscap ***** --verbose=3    #DEBUG\n\n# ipscap ***** --debug     #DEBUG  This option is equivalent to \"--verbose=3\"\n```\n\n\n## Dependencies\n\n- [dnspython](https://github.com/rthalley/dnspython)\n- [geoip2](https://github.com/maxmind/GeoIP2-python) [Optional]\n\n\n## Related OSS\n\n- [IpServer](https://github.com/deer-hunt/ipserver/)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdeer-hunt%2Fipsurv","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdeer-hunt%2Fipsurv","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdeer-hunt%2Fipsurv/lists"}