Scanner IP CDNs, also called Powercodes Advanced IP and Domain Scanner, is a Python command line tool written in Persian. Its job is to take a list of IP addresses, domains, or network ranges and find the ones that are actually reachable on TCP, then sort them by which content delivery network they belong to. The README explains that many addresses still answer regular ping but block the TCP ports you need for real connections, so a normal ping sweep produces a misleading list of working hosts. The tool works at the transport layer. It opens TCP connections in parallel using Python threads and keeps the addresses that actually accept the connection. The README claims this gives you a list of clean addresses you can use for tunnels and other connections. Input goes into a targets.txt file next to the script. The format it understands includes single IPs like 1.1.1.1, full domains like example.com, and CIDR ranges like 172.67.0.0/16 or 104.16.0.0/12, all mixed in the same file. It also tries to identify which CDN each working IP belongs to. The README lists detection for Cloudflare, Akamai, Fastly, Netlify, Vercel, Gcore, AWS CloudFront, BunnyCDN, and the Iranian provider ArvanCloud. Results are written into separate output files by CDN. Installation is straightforward. On Windows or Linux you clone the repo, install dependencies with pip install -r requirements.txt, then run python scanner.py. The README also documents Termux on Android: it asks the user to switch on a VPN before installing dependencies, which suggests the typical audience is in a region where pip mirrors are blocked. Dependencies are requests and flask, the latter for a status panel. The tool is MIT licensed and the README points to a Telegram channel and YouTube tutorial run by the author.
Generated 2026-05-21 · Model: sonnet-4-6 · Verify against the repo before relying on details.