@webframp/network
v2026.04.22.1
DNS and network probing model that generates diverse diagnostic events.
Tools Required
dig(DNS lookups)whois(domain registration info)traceroute(network path tracing)openssl(TLS certificate inspection)
Usage
# Create the network probe model
swamp model create @webframp/network net-probe
# DNS lookup
swamp model method run net-probe dns_lookup --input domain=example.com
swamp model method run net-probe dns_lookup --input domain=example.com --input recordType=MX
# HTTP check
swamp model method run net-probe http_check --input url=https://example.com
# WHOIS lookup
swamp model method run net-probe whois_lookup --input domain=example.com
# TLS certificate check
swamp model method run net-probe cert_check --input host=example.com
# Traceroute
swamp model method run net-probe traceroute --input host=example.com
# Port scan
swamp model method run net-probe port_check --input host=example.com --input ports=[80,443,8080]Methods
- dns_lookup - Run dig to resolve DNS records for a domain
- http_check - Fetch a URL and record status, headers, timing, and redirects
- whois_lookup - Query WHOIS for domain registration details
- cert_check - Inspect TLS certificate subject, issuer, and validity dates
- traceroute - Trace network path to a host
- port_check - Test TCP connectivity on specific ports
Repository
https://github.com/webframp/swamp-extensions
Labels
Contents
Quality score
How well-documented and verifiable this extension is.
Grade A
- Has README or module doc2/2earned
- README has a code example1/1earned
- README is substantive1/1earned
- Most symbols documented1/1earned
- No slow types1/1earned
- Has description1/1earned
- At least one platform tag (or universal)1/1earned
- Two or more platform tags (or universal)1/1earned
- License declared1/1earned
- Verified public repository2/2earned
Install
$ swamp extension pull @webframp/network| Argument | Type | Description |
|---|---|---|
| domain | string | Domain name to look up |
| Argument | Type | Description |
|---|---|---|
| url | string | URL to check |
| Argument | Type | Description |
|---|---|---|
| domain | string | Domain name to look up |
| Argument | Type | Description |
|---|---|---|
| host | string | Hostname to check |
| port | number | TLS port to connect to |
| Argument | Type | Description |
|---|---|---|
| host | string | Target host to trace |
| Argument | Type | Description |
|---|---|---|
| host | string | Target host to scan |
Resources
DNS and network probing model that generates diverse diagnostic events. ## Tools Required - `dig` (DNS lookups) - `whois` (domain registration info) - `traceroute` (network path tracing) - `openssl` (TLS certificate inspection) ## Usage ```bash # Create the network probe model swamp model create @webframp/network net-probe # DNS lookup swamp model method run net-probe dns_lookup --input domain=example.com swamp model method run net-probe dns_lookup --input domain=example.com --input recordType=MX # HTTP check swamp model method run net-probe http_check --input url=https://example.com # WHOIS lookup swamp model method run net-probe whois_lookup --input domain=example.com # TLS certificate check swamp model method run net-probe cert_check --input host=example.com # Traceroute swamp model method run net-probe traceroute --input host=example.com # Port scan swamp model method run net-probe port_check --input host=example.com --input ports=[80,443,8080] ``` ## Methods - **dns_lookup** - Run dig to resolve DNS records for a domain - **http_check** - Fetch a URL and record status, headers, timing, and redirects - **whois_lookup** - Query WHOIS for domain registration details - **cert_check** - Inspect TLS certificate subject, issuer, and validity dates - **traceroute** - Trace network path to a host - **port_check** - Test TCP connectivity on specific ports
DNS and network probing model that generates diverse diagnostic events. ## Tools Required - `dig` (DNS lookups) - `whois` (domain registration info) - `traceroute` (network path tracing) - `openssl` (TLS certificate inspection) ## Usage ```bash # Create the network probe model swamp model create @webframp/network net-probe # DNS lookup swamp model method run net-probe dns_lookup --input domain=example.com swamp model method run net-probe dns_lookup --input domain=example.com --input recordType=MX # HTTP check swamp model method run net-probe http_check --input url=https://example.com # WHOIS lookup swamp model method run net-probe whois_lookup --input domain=example.com # TLS certificate check swamp model method run net-probe cert_check --input host=example.com # Traceroute swamp model method run net-probe traceroute --input host=example.com # Port scan swamp model method run net-probe port_check --input host=example.com --input ports=[80,443,8080] ``` ## Methods - **dns_lookup** - Run dig to resolve DNS records for a domain - **http_check** - Fetch a URL and record status, headers, timing, and redirects - **whois_lookup** - Query WHOIS for domain registration details - **cert_check** - Inspect TLS certificate subject, issuer, and validity dates - **traceroute** - Trace network path to a host - **port_check** - Test TCP connectivity on specific ports
DNS and network probing model that generates diverse diagnostic events. ## Tools Required - `dig` (DNS lookups) - `whois` (domain registration info) - `traceroute` (network path tracing) - `openssl` (TLS certificate inspection) ## Usage ```bash # Create the network probe model swamp model create @webframp/network net-probe # DNS lookup swamp model method run net-probe dns_lookup --input domain=example.com swamp model method run net-probe dns_lookup --input domain=example.com --input recordType=MX # HTTP check swamp model method run net-probe http_check --input url=https://example.com # WHOIS lookup swamp model method run net-probe whois_lookup --input domain=example.com # TLS certificate check swamp model method run net-probe cert_check --input host=example.com # Traceroute swamp model method run net-probe traceroute --input host=example.com # Port scan swamp model method run net-probe port_check --input host=example.com --input ports=[80,443,8080] ``` ## Methods - **dns_lookup** - Run dig to resolve DNS records for a domain - **http_check** - Fetch a URL and record status, headers, timing, and redirects - **whois_lookup** - Query WHOIS for domain registration details - **cert_check** - Inspect TLS certificate subject, issuer, and validity dates - **traceroute** - Trace network path to a host - **port_check** - Test TCP connectivity on specific ports