The Self-Hosted Internet Intelligence Engine
Unprecedented visibility into internet-connected devices. Discover services, aggregate banners, and match vulnerabilities at scale—all from your own infrastructure.
NexusEye is an open-source, high-performance reconnaissance platform designed to be your private alternative to tools like Shodan, Censys, or ZoomEye.
Built for penetration testers, security researchers, and network administrators, it combines an asynchronous network scanning engine with an Elasticsearch-powered analytical backend and a cinematic, cyber-luxury frontend interface.
Public search engines rate-limit your queries, obscure data behind enterprise paywalls, and force you to share your reconnaissance targets with a third party. NexusEye brings that capability in-house. You define the targets, you control the data, and you search without limits.
|
|
NexusEye employs a scalable microservices architecture orchestrated via Docker Compose.
graph TD
%% Styling
classDef frontend fill:#0a0a0a,stroke:#00f0ff,stroke-width:2px,color:#fff;
classDef api fill:#0a0a0a,stroke:#8b5cf6,stroke-width:2px,color:#fff;
classDef worker fill:#0a0a0a,stroke:#ff2a5f,stroke-width:2px,color:#fff;
classDef db fill:#0a0a0a,stroke:#00e676,stroke-width:2px,color:#fff;
%% Nodes
UI[Frontend<br/>React / Vite / Framer]:::frontend
API[Backend API<br/>FastAPI / Uvicorn]:::api
Worker[Celery Workers<br/>Async Scanner]:::worker
PG[(PostgreSQL<br/>Users & Scans)]:::db
ES[(Elasticsearch<br/>Devices & Banners)]:::db
Redis[(Redis<br/>Queue & PubSub)]:::db
%% Connections
UI <-->|REST / WebSockets| API
API -->|Read/Write| PG
API -->|Search/Index| ES
API -->|Enqueue Tasks| Redis
Redis -->|Dequeue Tasks| Worker
Worker -->|Index Results| ES
Worker -->|Update Status| PG
Worker -->|Progress Events| Redis
Deploy the entire stack—database, search engine, task queue, backend, and frontend—in minutes using Docker.
- Docker
- Docker Compose (v2.0+)
# 1. Clone the repository
git clone https://github.com/mrceha/NexusEye.git
cd NexusEye
# 2. Copy the environment template
cp .env.example .env
# 3. Launch the entire stack in detached mode
docker compose up -d| Service | Local URL | Description |
|---|---|---|
| Frontend UI | http://localhost:5173 | The primary user interface. |
| API Docs | http://localhost:8000/api/docs | Interactive Swagger documentation. |
The NexusEye search bar supports a powerful, composable query language designed for precision targeting.
| Filter | Example | Description |
|---|---|---|
| Free Text | apache | Search across all banners, products, and hostnames. |
| Port | port:443 | Filter by a specific open TCP/UDP port. |
| Service | service:ssh | Filter by the detected protocol/service signature. |
| Product | product:nginx | Filter by the identified software product name. |
| Location | country:DE | Filter by ISO 3166-1 alpha-2 country code. |
| Network | asn:13335 | Filter by Autonomous System Number. |
| Threats | has_vuln:true | Restrict results to devices with known CVEs. |
| Chained | nginx country:US port:443 has_vuln:true | Combine any number of filters for extreme granularity. |
⚠️ WARNING: NexusEye is a powerful network reconnaissance tool. It is intended strictly for authorized security testing, penetration testing engagements, and network administration.
- You must obtain explicit, written authorization before scanning any network or device you do not own.
- Unauthorized scanning may constitute a criminal offense under laws such as the CFAA (US) or Computer Misuse Act (UK).
- The developers and maintainers assume zero liability for any misuse, damage, or legal consequences resulting from the use of this software.
This project is licensed under the GNU Affero General Public License v3.0 (AGPL-3.0).
See the LICENSE file for the full text.
IMPORTANT: Use of this software requires strict compliance with the NOTICE file, which mandates clear, unmodified attribution to the original author in all source code, documentation, and user interfaces.
Designed, Architected, and Engineered by
@mrceha