Authorisation first
- Only scan ranges you own or where written consent has been granted.
- Review applicable laws, ISP terms, cloud provider policies, and school/company rules.
- Document approvals so you can demonstrate compliance later.
The maintainers accept no liability for misuse. This page condenses the legal and ethical guidance from README.md
so you can stay compliant.
These principles are non-negotiable whenever you run scans, whether locally or in distributed infrastructure.
Treat the scanner like any penetration-testing or network-auditing tool.
If your question is not covered here, open a discussion or issue on GitHub.
The default port list targets Java (25565). Add Bedrock ports such as 19132 to the GUI or console configuration to generate leads, but treat them as provisional until you confirm via Bedrock-specific tooling.
Yes. Stop the GUI scan at any point; StorageManager
persists results so you can restart later without losing confirmed hosts.
Install the appropriate package for your distribution (python3-tk
on Debian/Ubuntu, tk
on Arch/Fedora). Alternatively run python app.py --nogui
for console mode.
Ensure SOCKS endpoints are reachable and authenticated. The Proxy Pool panel highlights unhealthy nodes; remove failing endpoints or allow cooldowns to expire before reintroducing them.
These points are lifted directly from the project’s troubleshooting section.
Pick an output directory you control from the GUI settings or run the process under an account with write access.
Confirm VPN connectivity and reachability of the SOCKS5 list. Remove failing entries until the pool stabilises.
Install mcstatus
for richer handshake parsing and python-nmap
to corroborate banners before you classify a host as active.
Review README.md
and commit history for updates to ethical guidance. Document your scan settings and approvals for internal audits.
Nothing on this page replaces legal advice. Consult counsel if you are unsure whether a scan is authorised in your jurisdiction.