IVRE vs Nmap
GitHub Stats
About IVRE
IVRE (Instrument de Veille sur les Réseaux Extérieurs) is a self-hosted network reconnaissance framework that functions as a private Shodan/Censys alternative. It integrates three data collection approaches: active scanning (wrapping Nmap, Masscan, and ZGrab2), passive network traffic analysis (using Zeek/Bro, p0f, and Argus), and flow analysis. All data is stored in MongoDB and searchable through a web interface, Python API, or CLI. IVRE enables organizations to build and maintain their own internet-wide scan datasets, correlate active and passive intelligence, and track infrastructure changes over time.
About Nmap
Nmap (Network Mapper) is a free and open-source utility for network discovery and security auditing. It uses raw IP packets to determine available hosts, services, operating systems, packet filters/firewalls, and dozens of other characteristics. It was designed to rapidly scan large networks but works fine against single hosts. Nmap's scripting engine (NSE) allows users to write and share scripts to automate networking tasks, from vulnerability detection to backdoor discovery. It's used by security professionals, system administrators, and researchers worldwide.
Platform Support
Tags
IVRE only
Nmap only