NetworkSherlock Powerful Port Scanner With Shodan


NetworkSherlock is a powerful and flexible port scanning tool designed for network security professionals and penetration testers. With its advanced capabilities, NetworkSherlock can efficiently scan IP ranges, CIDR blocks, and multiple targets.

It stands out with its detailed banner grabbing capabilities across various protocols and integration with Shodan, the world’s premier service for scanning and analyzing internet-connected devices. This Shodan integration enables NetworkSherlock to provide enhanced scanning capabilities, giving users deeper insights into network vulnerabilities and potential threats.

By combining local port scanning with Shodan’s extensive database, NetworkSherlock offers a comprehensive tool for identifying and analyzing network security issues.


  • Scans multiple IPs, IP ranges, and CIDR blocks.
  • Supports port scanning over TCP and UDP protocols.
  • Detailed banner grabbing feature.
  • Ping check for identifying reachable targets.
  • Multi-threading support for fast scanning operations.
  • Option to save scan results to a file.
  • Provides detailed version information.
  • Colorful console output for better readability.
  • Shodan integration for enhanced scanning capabilities.
  • Configuration file support for Shodan API key.


NetworkSherlock requires Python 3.6 or later.

  1. Clone the repository:
    git clone
  2. Install the required packages:
    pip install -r requirements.txt


Update the networksherlock.cfg file with your Shodan API key:



python3 --help
usage: [-h] [-p PORTS] [-t THREADS] [-P {tcp,udp}] [-V] [-s SAVE_RESULTS] [-c] target
NetworkSherlock Dashboard
NetworkSherlock Framework

NetworkSherlock: Port Scan Tool

positional arguments:
target Target IP address(es), range, or CIDR (e.g.,,,


-h, --help show this help message and exit
-p PORTS, --ports PORTS
Ports to scan (e.g. 1-1024, 21,22,80, or 80)
-t THREADS, --threads THREADS
Number of threads to use
-P {tcp,udp}, --protocol {tcp,udp}
Protocol to use for scanning
-V, --version-info Used to get version information
-s SAVE_RESULTS, --save-results SAVE_RESULTS
File to save scan results
-c, --ping-check Perform ping check before scanning
-ad, --arp-discover: Perform ARP discovery on the specified network.
--use-shodan Enable Shodan integration for additional information

Basic Parameters

target: The target IP address(es), IP range, or CIDR block to scan.
-p, --ports: Ports to scan (e.g., 1-1000, 22,80,443).
-t, --threads: Number of threads to use.
-P, --protocol: Protocol to use for scanning (tcp or udp).
-V, --version-info: Obtain version information during banner grabbing.
-s, --save-results: Save results to the specified file.
-c, --ping-check: Perform a ping check before scanning.
--use-shodan: Enable Shodan integration.

Also See – Karma V2 Passive Open Source Intelligence OSINT Automated Framework

Example Usage

Basic Port Scan

Scan a single IP address on default ports:


Custom Port Range

Scan an IP address with a custom range of ports:

python -p 1-1024

Multiple IPs and Port Specification

Scan multiple IP addresses on specific ports:

python, -p 22,80,443

CIDR Block Scan

Scan an entire subnet using CIDR notation:

python -p 80

Using Multi-Threading

Perform a scan using multiple threads for faster execution:

python -p 1-1024 -t 20

Scanning with Protocol Selection

Scan using a specific protocol (TCP or UDP):

python -p 53 -P udp

Scan with Shodan

python --use-shodan

Scan Multiple Targets with Shodan

python, -p 22,80,443 -V --use-shodan

Perform a detailed scan with banner grabbing and save results to a file:

python -p 1-1000 -V -s results.txt

Ping Check Before Scanning

Scan an IP range after performing a ping check:

python -c


$ python3 -t 25 -V -p 21-6000 -t 25

Scanning target:
Scanning IP :
Ports : 21-6000
Threads : 25

Protocol : tcp

Port   Status Service   VERSION
22 /tcp open  ssh  SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
21 /tcp open  telnet 220 (vsFTPd 2.3.4)
80 /tcp open  http HTTP/1.1 200 OK
139 /tcp open netbios-ssn %SMBr
25 /tcp  open smtp 220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
23 /tcp  open smtp #' #'
445 /tcp open microsoft-ds %SMBr
514 /tcp open shell
512 /tcp open exec Where are you?
1524/tcp open ingreslock root@metasploitable:/#
2121/tcp open iprop 220 ProFTPD 1.3.1 Server (Debian) [::ffff:]
3306/tcp open mysql >
5900/tcp open unknown RFB 003.003

53 /tcp open domain

OutPut Example

$ python3 -t 10 -V -p 21-1000

Scanning target:
Scanning IP :
Ports : 21-1000
Threads : 10

Protocol : tcp

Port Status Service VERSION
53 /tcp open domain

Scanning target:
Scanning IP :
Ports : 21-1000
Threads : 10

Protocol : tcp

Port Status Service VERSION
445 /tcp open microsoft-ds
135 /tcp open epmap

Scanning target:
Scanning IP :
Ports : 21-1000
Threads : 10

Protocol : tcp

Port Status Service VERSION
21 /tcp open ftp 220 (vsFTPd 2.3.4)
22 /tcp open ssh SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
23 /tcp open telnet #'
80 /tcp open http HTTP/1.1 200 OK
53 /tcp open kpasswd 464/udpcp
445 /tcp open domain %SMBr
3306/tcp open mysql >

Scanning target:
Scanning IP :
Ports : 21-1000
Threads : 10

Protocol : tcp

Port Status Service VERSION
22 /tcp open ssh SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.9


Contributions are welcome! To contribute to NetworkSherlock, follow these steps:

Fork the repository.

  • Create a new branch for your feature or bug fix.
  • Make your changes and commit them.
  • Push your changes to your forked repository.
  • Open a pull request in the main repository.

Download Network Sherlock

Join Our Club

Enter your Email address to receive notifications | Join over Million Followers

Previous Article
Wolverine Game Hacked

Insomniac Game Wolverine Hits Ransomware Attack

Next Article
Rapid Apple Devices Update

Rapid Bug Fixes For iPhone and Mac Users

Related Posts