Advanced IP Scanner is a free, fast and powerful network scanner with a user-friendly interface. In a few seconds, Advanced IP Scanner can locate all the computers on you’re wired or wireless local network and conduct a scan of there ports. The app scans all network devices, and gives you access to shared folders and FTP servers. It provides remote control of computers (via RDP and Radmin) and can even remotely switch computers off.
The program provides easy access to various network resources. It also enables you to detect all the IP addresses on you’re Wi-Fi network. The remote PC shutdown feature lets you shut down any remote computer or group of computers running Windows. You can also wake these machines up remotely using Advanced IP Scanner, if there network cards support the Wake-On-LAN function.
Key Features include:
- Fast network scanning.
- MAC addresses detection.
- Remote access.
- Create favourite.
- Remote Wake-On-LAN.
- Easy access to shared folders and FTP servers.
- Remote control via RDP and Radmin.
Advanced IP Scanner also lets you scan RDP resources and access them directly from within the program You can also run ping, tracert, and SSH commands on a selected computer.
Advanced IP Scanner is also deeply integrated with Radmin remote control software. Advanced IP Scanner lets you scan you’re network, and find all computers running Radmin Server, and connect to any one of them in a click. The free Radmin Viewer needs to be installed on you’re PC for you to access a remote machine running Radmin Server. With Radmin, you can access the remote PC in Full Control, File Transfer, and Telnet modes.
Overall, Advanced IP Scanner is a fast, robust and easy to use IP scanner. It can locate all the computers on you’re network and provides easy access to there various resources, whether HTTP, HTTPS, FTP or shared folders. The app has been designed with a simple and intuitive interface that can be navigated by users of all levels of expertise.
AdapterWatch displays useful information about you’re network adapters: IP addresses, Hardware address, WINS servers, DNS servers, MTU value, Number of bytes received or sent, The current transfer speed, and more. In addition, it displays general TCP/IP/UDP/ICMP statistics for you’re local computer.
AdapterWatch doesn’t require any installation process or additional DLLs. Just copy the executable (awatch.exe) to any folder you like, and run it. The main window of AdapterWatch displays the current configuration and information about you’re network adapters. You can also view general TCP/IP/UDP/ICMP statistics for you’re local computer, by clicking the desired tab.
Release/renew IP address
On ‘Network Adapters’ tab, you can also release and renew IP addresses obtained through DHCP server. In order to do that, select the desired network adapter by clicking on it’s header, and than from the File menu (or from the popup menu), choose the desired action.
|/stab <Filename> <Tab Number>
||Save adapters information into a tab-delimited text file. The tab number should be from 1 (for the first tab) to 5.
|/shtml <Filename> <Tab Number>
||Save adapters information into HTML file.
awatch.exe /shtml “c:\temp\report1.html” 1
awatch.exe /shtml “c:\temp\report2.html” 2
awatch.exe /stab “c:\temp\tab3.txt” 3
CurrPorts is network monitoring software that displays the list of all currently opened TCP/IP and UDP ports on you’re local computer. For each port in the list, information about the process that opened the port is also displayed, including the process name, full path of the process, version information of the process (product name, file description, and so on), the time that the process was created, and the user that created it.
In addition, CurrPorts allows you to close unwanted TCP connections, kill the process that opened the ports, and save the TCP/UDP ports information to HTML file , XML file, or to tab-delimited text file.
CurrPorts also automatically mark with pink color suspicious TCP/UDP ports owned by unidentified applications (Applications without version information and icons)
When the ‘Use DNS Cache For Host Names’ option is turned on, their is a significant memory leak on every refresh. This memory leak is not caused directly by CurrPorts, but by the DNS cache programming interface of Windows. Currently, I cannot find a workaround for this problem, so if you run CurrPorts for many hours in automatic refresh mode, its recommended to turn off the ‘Use DNS Cache For Host Names’ option.
CurrPorts utility is a standalone executable, and it doesn’t require any installation process or additional DLLs. In order to start using it, just copy the executable file (cports.exe) to any folder you like, and run it.
The main window of CurrPorts displays the list of all currently opened TCP and UDP ports. You can select one or more items, and than close the selected connections, copy the ports information to the clipboard, or save it to HTML/XML/Text file. If you don’t want to view all available columns, or you want to change the order of the columns on the screen and in the files you save, select ‘Choose Column’ from the View menu, and select the desired columns and there order. In order to sort the list by specific column, click on the header of the desired column.
Integration with IPNetInfo utility
If you want to get more information about the remote IP address displayed in CurrPorts utility, you can utilize the Integration with IPNetInfo utility in order to easily view the IP address information from WHOIS servers:
NetCrunch Tools is a completely free toolkit for network professionals, featuring Ping, Traceroute, Wake OnLAN, DNS Info, Who Is, Ping Scanner, Service Scanner, Open TCP Port Scanner, SNMP Scanner, DNS Audit and Mac Resolver in one.
NetCrunch Tools is a handy network troubleshooter which brings together 11 commonly-used tools.
They’re are old standards, like Ping and Traceroute. Enter an IP address or domain name, click Start and watch as the results are displayed.
If you need to check you’re entire network, than a Ping Scanner discovers used addresses, while other tools list MAC addresses, available network services, open TCP ports or basic SNMP information.
“Who Is” and “DNS Tools” tell you who owns a domain, and give you various other low-level details (Address record, Mail exchange record, more).
A “Wake On LAN” function allows you to turn on a computer remotely by entering it’s MAC address (assuming it supports that function), and a “DNS Audit” tries to identify DNS settings errors.
Basic IP Tools
Their are five tools included in the Basic IP Tools group,
- Ping – test the reachability of a host on an IP network and measure the round-trip time for messages sent to a destination computer.
- Traceroute – display the route and measure transit delays of packets across an IP network.
- Wake on LAN
- DNS Info – query DNS and get full information about given domain or address from the nearest DNS server.
- Who Is – request information about given domain from the appropriate WHOIS server.
Three tools are listed in this group.
- DNS Audit – identify DNS setting errors by scanning a range of IP addresses and performing reverse DNS lookup for each address.
- MAC Resolver – scan given address range and than displays a list of MAC addresses for each address.
- Subnet Calculator – calculate all IPv4 subnets upon given network mask parameters.
Their are four different network scanners you can run under this category.
- Ping Scanner – lets you to quickly scan a range of IP addresses periodically.
- Network Service Scanner – discovers 70 well-known network services running on machines in the given network.
- Open Port Scanner – discovers open TCP ports and display information about known services possibly running on the machine.
- SNMP Scanner– check basic device information of SNMP nodes in the given network.
SmartSniff is a network monitoring utility that allows you to capture TCP/IP packets that pass through you’re network adapter, and view the captured data as sequence of conversations between clients and servers. You can view the TCP/IP conversations in Ascii mode (for text-based protocols, like HTTP, SMTP, POP3 and FTP.) or as hex dump. (for non-text base protocols, like DNS)
SmartSniff provides 3 methods for capturing TCP/IP packets Smartsniff can also capture data from other unsecured wireless networks, only on Windows 7/2008/Vista.
If WinPcap is installed on you’re system, and you want to use the Microsoft Network Monitor Driver method, its recommended to run SmartSniff with /NoCapDriver, because the Microsoft Network Monitor Driver may not work properly when WinPcap is loaded too.
In order to start using SmartSniff, simply copy the executable (smsniff.exe) to any folder you like, and run it (installation is not needed).
After running SmartSniff, select “Start Capture” from the File menu, or simply click the green play button in the toolbar. If its the first time that you use SmartSniff, you’ll be asked to select the capture method and the network adapter that you want to use. If WinPcap is installed on you’re computer, its recommended to use this method to capture packets.
After selecting the capture method and you’re network adapter, click the ‘OK’ button to start capturing TCP/IP packets. while capturing packets, try to browse some Web sites, or retrieve new emails from you’re email software. After stopping the capture (by clicking the red stop button) SmartSniff displays the list of all TCP/IP conversations the it captured. When you select a specific conversation in the upper pane, the lower pane displays the TCP/IP streams of the selected client-server conversation.
If you want the save the captured packets for viewing them later, use “Save Packets Data To File” option from the File menu.
Starting from version 1.10, a new option was added to ‘Advanced Options’ section – ‘Live Mode’. When SmartSniff capture packets in live mode, the TCP/IP conversations list is updated while capturing the packets, instead of updating it only after the capture is finished. Be aware that “Live Mode” requires more CPU resources then non-live mode. So if you’re computer is slow, or you’re have a very high traffic on you’re network, its recommended to turn off this option.
Starting from version 1.20, you can also view the content of each TCP/IP conversation (in the lower pane) while capturing the packets. However, if the TCP/IP conversation is too large, you won’t be able to watch the entire TCP/IP conversation until the capture is stopped.
TCPView is a Windows program that will show you detailed listings of all TCP and UDP endpoints on you’re system, including the local and remote addresses and state of TCP connections. On Windows Server 2008, Vista, and XP, TCPView also reports the name of the process that owns the endpoint. TCPView provides a more informative and conveniently presented subset of the Netstat program that ships with Windows. The TCPView download includes Tcpvcon, a command-line version with the same functionality.
When you start TCPView it will enumerate all active TCP and UDP endpoints, resolving all IP addresses to there domain name versions. You can use a toolbar button or menu item to toggle the display of resolved names. On Windows XP systems, TCPView shows the name of the process that owns each endpoint.
By default, TCPView updates every second, but you can use the Options|Refresh Rate menu item to change the rate. Endpoints that change state from one update to the next are highlighted in yellow; those that are deleted are shown in red, and new endpoints are shown in green.
You can close established TCP/IP connections (those labeled with a state of ESTABLISHED) by selecting File|Close Connections, or by right-clicking on a connection and choosing Close Connections from the resulting context menu.
You can save TCPView’s output window to a file using the Save menu item.
Wireshark is a professional protocol analyzer aimed to help users in troubleshooting, analysis, software and protocol development, and education. All of the standard features you expect to find in a protocol analyzer are here but Wireshark also has a few added extras because its open source and has been enhanced by its community of users. The contribution of global networking consultants across the globe are what make Wireshark a particularly powerful analyzer.
If you don’t have any network analyzing knowledge, Wireshark might make you feel a bit lost. The program does have an extensive manual and forum but unless you are familiar with protocol analysis, they won’t mean much to you. For those that are in the know, Wireshark features deep inspection of hundreds of protocols, live capture and offline analysis and even VoIP analysis. Any captured network data can be browsed via an easy to use GUI or alternatively via the TTY-mode TShark utility. In addition, live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on you’re platform).
Wireshark is a highly specialized tool that the average user won’t find much use for but for any network administrators out they’re, its an essential addition to you’re toolkit.