Xmap
XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning.
Install / Use
/learn @idealeer/XmapREADME
XMap: The Internet Scanner
XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning.
XMap is reimplemented and improved thoroughly from ZMap and is fully compatible with ZMap, armed with the "5 minutes" probing speed and novel scanning techniques. XMap is capable of scanning the 32-bits address space in under 45 minutes. With a 10 gigE connection and PF_RING, XMap can scan the 32-bits address space in under 5 minutes. Moreover, leveraging the novel IPv6 scanning approach, XMap can discover the IPv6 Network Periphery fast. Furthermore, XMap can scan the network space randomly with any length and at any position, such as 2001:db8::/32-64 and 192.168.0.1/16-20. Besides, XMap can probe multiple ports simultaneously.
XMap operates on GNU/Linux, macOS, and BSD. XMap currently has implemented probe modules for ICMP Echo scans, TCP SYN scans, UDP probes, and DNS scans (stateless, stateful, address-spoofing, and EDNS).
With banner grab and TLS handshake tool, ZGrab2, more involved scans could be performed.
Installation
The latest stable release of XMap is version 2.0.5 and supports Linux, macOS, and BSD. We recommend installing XMap from HEAD rather than using a distro package manager (not supported yet).
Instructions on building XMap from source can be found in INSTALL.
Installing from docker: docker pull liii/xmap:latest
Installing from ArchLinux Package
Usage
A guide to using XMap can be found in our GitHub Wiki.
Simple commands and options to using XMap can be found in USAGE.
Check how to use DNS probing modules in Issue #11.
Watch the description video at Pentester Academy TV.
Star History
Presentation & Impact
-
Presented in 2021 West Lake Cybersecurity Conference: Cyberspace Security Tools Presentation
-
Presented in Pentester Academy TV
-
Referenced by 10+ top-tier security conference papers
-
Supporting one patent CN202110502369.2
-
The 2nd Place of 2025 ACSAC Cybersecurity Artifacts Impact Award (First Chinese institution to receive this award)
Paper
-
[DSN '21] Xiang Li, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Qi Li, Youjun Huang. Fast IPv6 Network Periphery Discovery and Security Implications. In Proceedings of the 2021 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '21). Taipei, Taiwan, June 21-24, 2021 (Virtually). [PDF] [Slides] [Video].
(Acceptance rate: 48/279=17.2%)
-
[NDSS '23] Xiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, and Qi Li. Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation. In Proceedings of the 30th Annual Network and Distributed System Security Symposium (NDSS '23). San Diego, California, 27 February – 3 March, 2023. [PDF] [Slides] [Video]
(Acceptance rate: 94/581=16.2%, Acceptance rate in summer: 36/183=19.7%), Acceptance rate in fall: 58/398=14.6%)
- Presented in OARC 39
- Presented in ICANN DNS Symposium 2022
- Presented in Black Hat Asia 2023
- Referenced by RFC Draft: Delegation Revalidation by DNS Resolvers
-
[USENIX Security '23] Xiang Li, Chaoyi Lu, Baojun Liu, Qifan Zhang, Zhou Li, Haixin Duan, and Qi Li. The Maginot Line: Attacking the Boundary of DNS Caching Protection. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security '23). Anaheim, California, August 9–11, 2023. [PDF] [Slides] [Video]
(Acceptance rate: 422/1,444=29.2%, Acceptance rate in summer: 91/388=23.5%, Acceptance rate in fall: 155/531=29.2%), Acceptance rate in winter: 176/525=33.5%)
- Presented in Black Hat USA 2023
- 60+ news coverage by media such as BleepingComputer and APNIC
- An Austria government CERT daily report
- A Sweden government CERT weekly news
- A Bournemouth University (BU) CERT news
- Presented in SHUZIHUANYU Talk
- Presented in KANXUE 2023 SDC
- Presented in Black Hat Webinar
-
[CCS '23] Wei Xuⓘ, Xiang Liⓘ, Chaoyi Lu, Baojun Liu, Jia Zhang, Jianjun Chen, Tao Wan, and Haixin Duan. TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS '23). Copenhagen, Denmark, November 26–30, 2023. [PDF] [Slides] [Video]
(Acceptance rate: 158/795=19.9%, Acceptance rate in first round: ??%, Acceptance rate in second round: ??%. ⓘ: Both authors contributed equally to the paper)
- Presented in OARC 41
- Presented in Black Hat Europe 2023
-
[CCS '23] Zhenrui Zhangⓘ, Geng Hongⓘ, Xiang Li, Zhuoqun Fu, Jia Zhang, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, and Min Yang. Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communication
