📡

Network Scanner Tool

âš™ī¸ Scan Configuration

—
Hosts Up
—
Hosts Down
—
Open Ports
—
Warnings
đŸ–Ĩī¸ Discovered Hosts
🔌 Port Details
âš ī¸ Security Alerts
📖 Reference
StatusIP AddressHostnameMAC AddressVendorOS (Guess)LatencyOpen Ports
Run a scan to discover hosts on the network.
IP AddressPortProtocolServiceStateDetails
Run a Port Scan or Full Scan to see open ports.
No alerts — run a scan first.

📖 Common Ports Reference

${[ [21,"TCP","FTP","File transfer — unencrypted, disable if unused"], [22,"TCP","SSH","Secure remote shell — ensure key-based auth"], [23,"TCP","Telnet","Unencrypted remote access — should be disabled"], [25,"TCP","SMTP","Email sending — may indicate mail server"], [53,"TCP/UDP","DNS","Domain Name System — should only be on DNS servers"], [80,"TCP","HTTP","Web server — unencrypted"], [110,"TCP","POP3","Email retrieval — unencrypted"], [135,"TCP","RPC","Windows RPC — attack surface, restrict externally"], [139,"TCP","NetBIOS","Windows file sharing — restrict to LAN only"], [143,"TCP","IMAP","Email — unencrypted version"], [443,"TCP","HTTPS","Secure web — encrypted"], [445,"TCP","SMB","Windows file sharing — patch for EternalBlue"], [3306,"TCP","MySQL","Database — should not be internet-facing"], [3389,"TCP","RDP","Remote Desktop — common brute-force target, restrict access"], [5900,"TCP","VNC","Remote desktop — unencrypted, restrict to VPN"], [8080,"TCP","HTTP Alt","Alternate web port — often dev/proxy servers"], ].map(r=>``).join("")}
PortProtocolServiceNotes
${r[0]}${r[1]}${r[2]}${r[3]}