Aquatone is a tool for visual inspection of websites across a large number of hosts. It takes screenshots of web pages and creates an HTML report for easy browsing and analysis.
Basic Usage
- cat hosts.txt | aquatone - Screenshot hosts from file
- echo "example.com" | aquatone - Screenshot single host
Input Methods
- Pipe hostnames/URLs via stdin
- One target per line
- Accepts hostnames, IPs, or full URLs
Options
- -out <dir> - Output directory (default: ./aquatone)
- -ports <ports> - Ports to scan (see below)
- -threads <num> - Concurrent threads (default: 8)
- -timeout <ms> - Screenshot timeout in ms (default: 30000)
- -http-timeout <ms> - HTTP request timeout (default: 10000)
- -scan-timeout <ms> - Port scan timeout (default: 3000)
- -screenshot-timeout <ms> - Screenshot timeout (default: 30000)
- -silent - Suppress output
- -nmap - Parse nmap XML file
- -chrome-path <path> - Path to Chrome/Chromium
- -proxy <url> - HTTP proxy
Port Presets
- -ports small - 80, 443
- -ports medium - 80, 443, 8000, 8080, 8443
- -ports large - 80, 81, 443, 591, 2082, 2087, 2095, 2096, 3000, 8000, 8001, 8008, 8080, 8083, 8443, 8834, 8888
- -ports xlarge - Extended list of common web ports
- -ports <custom> - Comma-separated list (e.g., 80,443,8080)
Output Files
- aquatone_report.html - Main HTML report
- aquatone_urls.txt - Discovered URLs
- aquatone_session.json - Session data
- headers/ - Response headers
- html/ - Response bodies
- screenshots/ - Screenshot images
Common Examples
Basic Screenshot
cat subdomains.txt | aquatone
Screenshot all subdomains.
Custom Output Directory
cat hosts.txt | aquatone -out ./results
Save to specific directory.
Extended Port Scan
cat hosts.txt | aquatone -ports large
Check more common web ports.
Custom Ports
cat hosts.txt | aquatone -ports 80,443,8080,8443
Specify exact ports to check.
Faster Scanning
cat hosts.txt | aquatone -threads 20
Increase concurrent threads.
With Nmap Results
cat nmap_scan.xml | aquatone -nmap
Parse nmap XML output for targets.
Pipeline with Subfinder
subfinder -d example.com -silent | aquatone
Combine with subdomain discovery.
Full Pipeline
subfinder -d example.com -silent | httpx -silent | aquatone
Discover, probe, and screenshot.
Through Proxy
cat hosts.txt | aquatone -proxy http://127.0.0.1:8080
Route through Burp Suite.
Tips
- Use httpx first to filter live hosts
- Increase threads for large target lists
- Use -ports large for thorough scanning
- Check the HTML report for visual analysis
- Screenshots help identify interesting targets
- Headers can reveal server info and security configs
- Requires Chrome/Chromium for screenshots
- Consider gowitness as an alternative
- Always get authorization before scanning