A powerful Python-based cybersecurity recon tool for Kali Linux
Made with β€οΈ by Monish Paramasivam
URL IP Analyzer takes any URL and performs a full recon pipeline:
- π Parses the URL β extracts scheme, root domain, and subdomain
- π Resolves the domain to its IP address via DNS
- πΊοΈ Fetches IP intelligence from ipinfo.io β location, ISP, ASN
- π‘οΈ Optionally runs an nmap scan β detects open ports and services
- π Scores risk level β Low / Medium / High based on exposed ports
- π Explains findings in plain English β what each port means and security insights
- πΎ Saves results to
.jsonand.txtreport files
β TARGET INFO
Original URL : https://sub.example.com
Full Domain : sub.example.com
Root Domain : example.com
Subdomain : sub
β‘ IP DETAILS
IP Address : 93.184.216.34
Country : US
City : Norwell
ISP / Org : Edgecast Inc.
ASN : AS15133
β’ SCAN RESULTS
Risk Level : MEDIUM
ββββββββ¬βββββββββββ¬ββββββββ¬ββββββββββ¬βββββββββββββββββββ
β Port β Protocol β State β Service β Version β
ββββββββΌβββββββββββΌββββββββΌββββββββββΌβββββββββββββββββββ€
β 80 β tcp β open β http β Apache 2.4.41 β
β 443 β tcp β open β https β OpenSSL 1.1.1 β
β 22 β tcp β open β ssh β OpenSSH 8.2p1 β
ββββββββ΄βββββββββββ΄ββββββββ΄ββββββββββ΄βββββββββββββββββββ
β£ EXPLANATION
Plain-English breakdown of findings + security insights
git clone https://github.com/YOUR_USERNAME/url-ip-analyzer.git
cd url-ip-analyzerpip install requests richsudo apt install nmapPython 3.8 or higher is required.
python3 url_ip_analyzer.pypython3 url_ip_analyzer.py --url https://example.compython3 url_ip_analyzer.py --url https://example.com --nmappython3 url_ip_analyzer.py --url https://example.com --nmap --full --save| Flag | Short | Description |
|---|---|---|
--url |
-u |
Target URL to analyze |
--nmap |
-n |
Run an nmap scan on the resolved IP |
--full |
-f |
Full scan (top 1000 ports) instead of fast mode |
--save |
-s |
Save results to .json and .txt files |
When --save is used (or you choose yes when prompted), two files are created:
| File | Format | Contents |
|---|---|---|
url_ip_report_<domain>_<timestamp>.txt |
Plain text | Human-readable full report |
url_ip_report_<domain>_<timestamp>.json |
JSON | Machine-readable structured data |
| Level | Meaning |
|---|---|
| π’ LOW | No critical ports exposed |
| π‘ MEDIUM | Some notable ports open (SSH, HTTP, etc.) |
| π΄ HIGH | Critical ports exposed β RDP, Telnet, MySQL, Redis, MongoDB, FTP, SMB |
| Package | Purpose |
|---|---|
requests |
Fetch IP intelligence from ipinfo.io |
rich |
Colored CLI output, tables, panels |
socket |
DNS resolution (built-in) |
subprocess |
Run nmap (built-in) |
nmap (system) |
Port scanning β install separately |
URL Input
β
βΌ
Parse URL βββΊ Extract domain + subdomain
β
βΌ
DNS Resolution βββΊ socket.gethostbyname()
β
βΌ
IP Intelligence βββΊ ipinfo.io API (free)
β
βΌ
nmap Scan βββΊ subprocess β parse output
β
βΌ
Risk Scoring βββΊ Based on open port analysis
β
βΌ
Explanation βββΊ Plain-English security insights
β
βΌ
Display + Save Report
This tool is intended for ethical cybersecurity testing and educational purposes only.
- β Only scan systems you own or have explicit written permission to test.
- β Scanning systems without authorisation may be illegal in your country.
- The author takes no responsibility for misuse of this tool.
Monish Paramasivam
β If you found this useful, please star the repo! β