Awesome Open Source
Awesome Open Source

Python Version GitHub release License Issues Twitter Follow

HostHunter v1.5

A tool to efficiently discover and extract hostnames providing a large set of target IP addresses. HostHunter utilises simple OSINT techniques to map IP addresses with virtual hostnames. It generates a CSV or TXT file containing the results of the reconnaissance.

Latest version of HostHunter also takes screenshots of the targets, it is currently a beta functionality.



Click on the thumbnail above to view the demo.


  • Tested with Python 3.7.2.

Linux / Mac OS

  • Install python dependencies.
$ pip3 install -r requirements.txt

The next few steps are only required if you would like to use the Screen Capture feature.

  • Download and install the latest version of Google Chrome.

Mac OS:

$ brew cask install google-chrome


$ wget

$ dpkg -i ./google-chrome-stable_current_amd64.deb

$ sudo apt-get install -f
  • Download and install the latest ChromeDriver.

Mac OS:

wget -O /tmp/ && sudo unzip /tmp/ chromedriver -d /usr/local/bin/;


wget -O /tmp/ && sudo unzip /tmp/ chromedriver -d /usr/local/bin/;

Simple Usage Example

$ python3 <targets.txt>
$ cat vhosts.csv

More Examples

HostHunter Help Page

$ python3 -h
usage: [-h] [-b] [-f FORMAT] [-o OUTPUT] [-sc] [-t TARGET] [-V]

|<--- HostHunter v1.5 - Help Page --->|

positional arguments:
  targets               Sets the path of the target IPs file.

optional arguments:
  -h, --help            show this help message and exit
  -b, --bing            Use search engine to discover more hostnames
                        associated with the target IP addresses.
  -f FORMAT, --format FORMAT
                        Choose between CSV and TXT output file formats.
  -o OUTPUT, --output OUTPUT
                        Sets the path of the output file.
  -sc, --screen-capture
                        Capture a screen shot of any associated Web
  -t TARGET, --target TARGET
                        Scan a Single IP.
  -V, --version         Displays the current version.

Run HostHunter with Bing and Screen Capture modules enabled

$ python3 <targets.txt> --bing -sc -f csv -o hosts.csv

Display Results

$ cat hosts.csv

View Screenshots

$ open ./screen_captures/


[X] Works with Python3
[X] Extracts information from SSL/TLS certificates.
[X] Supports Free HackerTarget API requests.
[X] Takes Screenshots of the target applications.
[X] Validates the targets IPv4 address.
[X] Supports .txt and .csv output file formats
[X] Gathers information from HTTP headers. [X] Verifies Internet access. [X] Finds hostnames in 80/TCP, 443/TCP and 21/TCP ports.

Coming Next

[_] Support for Nessus target format.
[_] Improve output (IPs, HostNames, FQDNs)
[_] Pause and Resume Execution
[_] Support for a Premium HackerTarget API key
[_] Support for IPv6
[_] Gather information from additional APIs
[_] Actively pull SSL certificates from other TCP ports


  • Free APIs throttle the amount of requests per day per source IP address.


This project is licensed under the MIT License.


  • Andreas Georgiou - follow me on twitter - @superhedgy


Thank you for all the support & feedback! Stargazers

Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
python (53,503
python3 (1,606
open-source (769
hacking (550
tool (413
security-tools (403
pentesting (373
penetration-testing (244
osint (214
bugbounty (178
hacking-tool (153
reconnaissance (92
recon (91
ip (67
network-security (37