<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: tuncay kebeli</title>
    <description>The latest articles on Forem by tuncay kebeli (@tuncay_kebeli_45e1ada02cf).</description>
    <link>https://forem.com/tuncay_kebeli_45e1ada02cf</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3638886%2F8c6497ec-cfd2-48f6-b11e-f8757256d86d.png</url>
      <title>Forem: tuncay kebeli</title>
      <link>https://forem.com/tuncay_kebeli_45e1ada02cf</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/tuncay_kebeli_45e1ada02cf"/>
    <language>en</language>
    <item>
      <title>Building a Free Port Scanner with Python, Flask, and Nmap 🛡️</title>
      <dc:creator>tuncay kebeli</dc:creator>
      <pubDate>Mon, 01 Dec 2025 10:43:37 +0000</pubDate>
      <link>https://forem.com/tuncay_kebeli_45e1ada02cf/building-a-free-port-scanner-with-python-flask-and-nmap-2l42</link>
      <guid>https://forem.com/tuncay_kebeli_45e1ada02cf/building-a-free-port-scanner-with-python-flask-and-nmap-2l42</guid>
      <description>&lt;p&gt;Hello devs! 👋&lt;/p&gt;

&lt;p&gt;I recently built a comprehensive security tool suite called &lt;strong&gt;&lt;a href="https://www.trwebs.com/" rel="noopener noreferrer"&gt;CyberScanTool&lt;/a&gt;&lt;/strong&gt;, and I wanted to share the technical journey of building the &lt;strong&gt;Port Scanner&lt;/strong&gt; module.&lt;/p&gt;

&lt;p&gt;If you're interested in cybersecurity or backend development with Python, this guide is for you.&lt;/p&gt;

&lt;h2&gt;
  
  
  🚀 The Goal
&lt;/h2&gt;

&lt;p&gt;I wanted to create a fast, web-based port scanner that:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Is completely &lt;strong&gt;free&lt;/strong&gt; (no login required).&lt;/li&gt;
&lt;li&gt;Runs on a lightweight &lt;strong&gt;Flask&lt;/strong&gt; backend.&lt;/li&gt;
&lt;li&gt;Uses &lt;strong&gt;Nmap&lt;/strong&gt; for reliable scanning.&lt;/li&gt;
&lt;li&gt;Returns results instantly via AJAX.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;You can try the live demo here: 👉 &lt;strong&gt;&lt;a href="https://www.trwebs.com/port-scanner" rel="noopener noreferrer"&gt;Free Port Scanner Tool&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  🛠️ The Tech Stack
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Backend:&lt;/strong&gt; Python 3.13 + Flask 3.1&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Scanner Engine:&lt;/strong&gt; Nmap (Network Mapper)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Frontend:&lt;/strong&gt; Vanilla JS + CSS3 (No heavy frameworks)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Server:&lt;/strong&gt; Nginx + Gunicorn on DigitalOcean&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  💻 The Code Logic
&lt;/h2&gt;

&lt;p&gt;Here is the simplified core logic of how the scanner works.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. The Route Handler
&lt;/h3&gt;

&lt;p&gt;We use Flask to handle the POST request. It's crucial to validate the input to prevent command injection.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;subprocess&lt;/span&gt;
&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;flask&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;Flask&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;request&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;jsonify&lt;/span&gt;

&lt;span class="n"&gt;app&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;Flask&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;__name__&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="nd"&gt;@app.route&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;/scan&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;methods&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;POST&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;])&lt;/span&gt;
&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;scan_ports&lt;/span&gt;&lt;span class="p"&gt;():&lt;/span&gt;
    &lt;span class="n"&gt;target&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;request&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;form&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;target&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

    &lt;span class="c1"&gt;# 1. Input Validation (Crucial!)
&lt;/span&gt;    &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="ow"&gt;not&lt;/span&gt; &lt;span class="nf"&gt;is_valid_domain&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;target&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
        &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="nf"&gt;jsonify&lt;/span&gt;&lt;span class="p"&gt;({&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;error&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;Invalid domain&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;}),&lt;/span&gt; &lt;span class="mi"&gt;400&lt;/span&gt;

    &lt;span class="c1"&gt;# 2. Run Nmap
&lt;/span&gt;    &lt;span class="k"&gt;try&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="c1"&gt;# -Pn: Treat host as online (skip ping)
&lt;/span&gt;        &lt;span class="c1"&gt;# -T4: Aggressive timing (faster)
&lt;/span&gt;        &lt;span class="c1"&gt;# --top-ports 20: Scan only most common ports
&lt;/span&gt;        &lt;span class="n"&gt;cmd&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;nmap&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;-Pn&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;-T4&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;--top-ports&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;20&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;target&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;

        &lt;span class="n"&gt;result&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;subprocess&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;run&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
            &lt;span class="n"&gt;cmd&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; 
            &lt;span class="n"&gt;capture_output&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="bp"&gt;True&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; 
            &lt;span class="n"&gt;text&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="bp"&gt;True&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; 
            &lt;span class="n"&gt;timeout&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;30&lt;/span&gt;
        &lt;span class="p"&gt;)&lt;/span&gt;

        &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="nf"&gt;jsonify&lt;/span&gt;&lt;span class="p"&gt;({&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;output&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="n"&gt;result&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;stdout&lt;/span&gt;&lt;span class="p"&gt;})&lt;/span&gt;

    &lt;span class="k"&gt;except&lt;/span&gt; &lt;span class="n"&gt;subprocess&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;TimeoutExpired&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="nf"&gt;jsonify&lt;/span&gt;&lt;span class="p"&gt;({&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;error&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;Scan timed out&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;}),&lt;/span&gt; &lt;span class="mi"&gt;504&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  2. Optimizing Performance ⚡
&lt;/h3&gt;

&lt;p&gt;One of the biggest challenges was speed. Nmap can be slow if not configured correctly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tips for speed:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Skip DNS Resolution (&lt;code&gt;-n&lt;/code&gt;):&lt;/strong&gt; If you already have the IP, skip the reverse DNS lookup.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Limit Ports:&lt;/strong&gt; Scanning all 65k ports takes forever. I limited the free tool to the &lt;strong&gt;top 20 critical ports&lt;/strong&gt; (HTTP, HTTPS, SSH, FTP, etc.) for the fast scan mode.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Async Processing:&lt;/strong&gt; For a production app, you should use a task queue like &lt;strong&gt;Celery&lt;/strong&gt;. For this MVP, I used Gunicorn with gevent workers to handle concurrent requests without blocking.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  🔒 Security Considerations
&lt;/h2&gt;

&lt;p&gt;Allowing users to run Nmap on your server is risky. Here is how I secured it:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Input Sanitization:&lt;/strong&gt; I wrote a strict regex to allow only valid domain names and IPs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rate Limiting:&lt;/strong&gt; I used &lt;code&gt;Flask-Limiter&lt;/code&gt; to prevent abuse (e.g., 5 scans per minute per session).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Private Network Blocking:&lt;/strong&gt; The scanner is configured to &lt;strong&gt;block&lt;/strong&gt; scanning of local IPs (127.0.0.1, 192.168.x.x) to prevent SSRF (Server-Side Request Forgery) attacks.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  🌟 The Result
&lt;/h2&gt;

&lt;p&gt;The final result is a snappy, responsive tool that helps developers and sysadmins quickly check their external exposure.&lt;/p&gt;

&lt;p&gt;You can check out the full suite of tools, including &lt;strong&gt;SSL Checker&lt;/strong&gt;, &lt;strong&gt;DNS Enumeration&lt;/strong&gt;, and &lt;strong&gt;Whois Lookup&lt;/strong&gt; here:&lt;/p&gt;

&lt;p&gt;👉 &lt;strong&gt;&lt;a href="https://www.trwebs.com" rel="noopener noreferrer"&gt;https://www.trwebs.com&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Let me know if you have any questions about the implementation! Happy coding. 🐍&lt;/p&gt;

&lt;h1&gt;
  
  
  python #security #flask #webdevelopment #showdev
&lt;/h1&gt;

</description>
      <category>cybersecurity</category>
      <category>python</category>
      <category>networking</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
