Open-source local network security auditing

SunsetScan

Find unsupported devices, exposed services, weak configurations, and fixable security risks across your local network.

SunsetScan is published on GitHub as an MIT-licensed scanner for local, read-only network auditing.

License
MIT scanner
Scans
Read-only
Runtime
Offline capable
Version
2.0.0

Built for home networks and small IT teams

Nmap depth without making people learn nmap syntax.

SunsetScan discovers active devices, fingerprints services and hardware, checks software and product lifecycle status, and produces a plain-English report that explains what was found and what to fix next.

The scanner is local, read-only, and designed for practical network hygiene: routers, switches, cameras, NAS devices, printers, access points, web interfaces, SSH, SMB, SNMP, FTP, TLS, DNS, UPnP, and mDNS.

What it checks

Security findings that map to real maintenance work.

Discovery

Know what is online

Fast host discovery, flexible target input, MAC vendor lookup, hostname resolution, service detection, and optional passive evidence from mDNS, SSDP, and DHCP.

Exposure

Find weak services

Checks for insecure protocols, anonymous FTP, SMBv1, missing web headers, exposed admin panels, UPnP exposure, and risky TLS or SSH configurations.

Intelligence

Connect versions to risk

Correlates detected service versions with CVE data, software EOL records, and hardware lifecycle data without calling external APIs during the scan.

Reporting

Explain the next step

Generates self-contained HTML and JSON reports with risk scores, severity groups, evidence, plain-English explanations, and prioritized recommendations.

End-of-life intelligence

A lifecycle database focused on the devices people actually keep running.

SunsetScan uses software EOL data from endoflife.date and a dedicated hardware lifecycle database for network gear, cameras, printers, NAS devices, security appliances, access points, and related modules.

The hardware database is continuously maintained and packaged into the scanner update cycle. The public plan is a monthly scanner and database refresh, so users can update the tool and the lifecycle data together.

59,969 hardware lifecycle records
47,341 model summaries
35,786 records not receiving security updates
5 compressed record shards

Cautious by design

Ambiguous vendor EOL or discontinued signals are treated as lifecycle review items unless the source confirms that support or security updates have stopped.

Offline during scans

Setup and update commands refresh local caches. Actual scans read local data, which keeps assessments predictable and usable without internet access.

Separate database license

The scanner code is MIT licensed. The hardware EOL database artifacts are distributed under CC BY-NC 4.0.

How it works

From discovery to a prioritized action list.

  1. 01

    Scan the local network

    Run a quick inventory, an IoT-focused pass, or a full assessment against a subnet or host list.

  2. 02

    Fuse device identity

    Combine MAC OUI, banners, HTTP fingerprints, TLS certificates, SSH, UPnP, SNMP, Wappalyzer, mDNS, JA3S, and port heuristics.

  3. 03

    Check CVE and EOL data

    Map detected versions and models against local CVE, software lifecycle, and hardware lifecycle caches.

  4. 04

    Produce the report

    Review severity, risk scores, evidence, and numbered remediation steps in a self-contained HTML file.

Reports people can act on

A scanner is only useful when the output is understandable.

SunsetScan reports group findings by severity and host, show per-device risk scores, and explain each item in direct language: what was found, why it matters, and what to do next.

  • Self-contained HTML report with no external dependencies.
  • JSON export for automation, archival, or follow-up tooling.
  • Scan history and diffing to identify new hosts, closed ports, and resolved findings.
Preview of a SunsetScan network assessment report with severity counts, EOL status, and prioritized findings
Product-style report preview based on SunsetScan 2.0.0 capabilities.

Install today

Install SunsetScan from the current GitHub repository.

The code is open source and available now. Linux is the best supported platform, and WSL2 is the recommended route for Windows users.

Recommended bootstrap
curl -fsSL https://raw.githubusercontent.com/NoCoderRandom/sunsetscan/main/bootstrap.sh | bash
First assessment
sudo ./sunsetscan --setup
sudo ./sunsetscan --full-assessment --target 192.168.1.0/24

Open source

Transparent scanner, practical defaults, monthly maintenance.

SunsetScan is developed in the public GitHub repository. The site links directly to the source, release history, issue tracker, and installation instructions so users can inspect the tool before running it.