[Release] VLAN Hunter - Find your ISP VLAN IDs instantly

Messages
3
Location
India
ISP
All
If you’ve tried ditching your ISP’s router and running your own, you’ve probably run into VLAN issues. Bridge mode is the easy route, but going fully custom means figuring out the right VLAN ID - and it’s not always something obvious like 100.

Since ISPs rarely document this properly, I made a small tool to simplify the process.

VLAN Hunter scans 802.1Q VLANs to identify active PPPoE and IPoE services. It uses packet injection and sniffing to show which VLANs are actually in use and what they’re for (internet, IPTV, etc).

It’s fully open source, so you can inspect the code yourself before running anything.

Quick run:
Code:
Using curl:
curl -sSL https://raw.githubusercontent.com/sussyflow/VLAN-X/main/VLAN_Hunter.sh | sudo bash

Using wget:
wget -qO- https://raw.githubusercontent.com/sussyflow/VLAN-X/main/VLAN_Hunter.sh | sudo bash

Using fetch:
fetch -o - https://raw.githubusercontent.com/sussyflow/VLAN-X/main/VLAN_Hunter.sh | sudo bash

No install needed. It runs, scans, and cleans up after itself.

Useful for:
  • Finding correct VLAN IDs
  • Setting up your own router without ISP hardware
  • Troubleshooting fiber/ONT setups
Use only on networks you’re authorized to test.

Visit the GitHub Repository here.
 
General Advice

Don't pipe arbitrary scripts from internet directly into root shell i.e. curl abc.xyz | bash.
You never know if the original script was changed either by author or some threat actor.

Always copy the script by going to the url in browser, do some basic sanity checks either by yourself or just paste it into any AI chatbot and ask if the intent of script is right and it doesn't have any hidden payloads.
Then paste that script into a file, make it executable and then run.

These few minutes can save you from being pwned.
 
Hi @f0r3he4d. The script requires root privileges, and the sudo command in the original instructions is intended for standard Linux distros where users aren't root by default.

Since you are on OpenWrt, the sudo package is usually missing. You can simply remove the word sudo from the command:

Code:
curl -sSL https://raw.githubusercontent.com/sussyflow/VLAN-X/main/VLAN_Hunter.sh | bash

Note: OpenWrt is very lightweight, so if you get a 'command not found' error for bash or python3-venv, you may need to install them first via opkg update && opkg install bash python3-venv. Let me know if that gets it running!
 
Verified, the source code looks good. There seems to be some bits and hints of AI work, but overall it does exactly what it says.
I won't recommend running this on a large carrier, as they have systems that will easily detect this as abuse.
 
Back