Analyze web attack surface from IP/FQDN list, auditing common ports:

sudo httpx -l ips_client.txt -ports 80,443,8009,8080,8081,8090,8180,9443 -follow-host-redirects -max-redirects 2 -t 10 -rl 5 -v -o httpx_result.txt

<aside> ℹ️

It’s possible to interrupt the scan with CTRL+C and resume it adding this flag: -resume resume.cfg

</aside>