Skip to main content

Welcome to BloodCat

BloodCat is a powerful command-line security tool designed to identify publicly exposed RTSP network cameras that use weak or default credentials. It helps security researchers and network administrators assess camera security across networks and geographical regions.

Key Features

Credential Brute-Force

Test RTSP cameras against common default passwords to identify security vulnerabilities

Geographical Discovery

Integrate with FoFa API to discover cameras by country, region, and city

Brand Detection

Automatically detect and target 10+ camera brands including Hikvision, Dahua, Axis, and more

Built-in Viewer

View discovered camera streams directly with the included ffplay-based viewer

Supported Camera Brands

BloodCat includes specialized detection and authentication patterns for:
  • Hikvision — Industry-leading surveillance cameras
  • Dahua — Enterprise security systems
  • Uniview — IP camera solutions
  • Axis — Network camera manufacturer
  • Sony — Professional security cameras
  • Vivotek — Network surveillance equipment
  • TVT — Digital video recorders
  • Reolink — Consumer security cameras
  • Milesight — IoT surveillance devices

How It Works

1

Target Selection

Specify a single camera IP or use FoFa API to discover cameras in specific geographical regions
2

Banner Detection

Connect to the RTSP service and identify the camera brand from the server banner
3

Credential Testing

Test brand-specific authentication paths with common default credentials
4

Results Storage

Save successfully authenticated RTSP URLs to ./data/ipcam.info for later viewing

Use Cases

BloodCat is designed for authorized security testing and research only. Always ensure you have explicit permission before testing any network infrastructure. Unauthorized access to computer systems is illegal.
  • Security Auditing — Identify weak credentials in your organization’s camera infrastructure
  • Penetration Testing — Assess camera security as part of comprehensive network assessments
  • Research — Study the prevalence of default credentials in IoT devices
  • Compliance — Verify that deployed cameras meet security hardening requirements

Quick Example

Test a specific camera:
python3 bloodcat.py --ip "192.168.1.100:554"
Discover cameras in a region using FoFa:
python3 bloodcat.py --country CN --region HK --key YOUR_FOFA_API_KEY

Next Steps

Installation

Install dependencies and get BloodCat running

Command Reference

Explore all available commands and options

Supported Brands

View detailed camera brand support

Examples

See real-world usage examples

Build docs developers (and LLMs) love