,

Perform Host Discovery using Angry IP Scanner

Perform Host Discovery using Angry IP Scanner

Angry IP Scanner is an open-source and cross-platform network scanner designed to scan IP addresses as well as ports. It simply pings each IP address to check if it is alive; then, optionally by resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended with plugins.

Here, we will use the Angry IP Scanner tool to discover the active hosts in the target network

Download Angry IP Scanner Install & Launch It

The IP Range – Angry IP Scanner window appears, as shown in the screenshot.

In the IP Range fields, type the IP range as 10.10.1.0 to 10.10.1.255 and click the Preferences icon beside the IP Range menu, as shown in the screenshot.

The Preferences window appears. In the Scanning tab, under the Pinging section, select the Pinging method as Combined UDP+TCP from the drop-down list.

Now, switch to the Display tab. Under the Display in the results list section, select the Alive hosts (responding to pings) only radio button and click OK.

In the IP Range – Angry IP Scanner window, click the Start button to start scanning the IP range that you entered.

Angry IP Scanner starts scanning the IP range and begins to list out the alive hosts found along with their hostnames. Check the progress bar on the bottom- right corner to see the progress of the scanning.

The results of the scan appear in the IP Range – Angry IP Scanner window. You can see all active IP addresses with their hostnames listed in the main window.

This concludes the demonstration of discovering alive hosts in the target range of IP addresses using Angry IP Scanner.

You can also use other ping sweep tools such as SolarWinds Engineerโ€™s Toolset (https://www.solarwinds.com), NetScanTools Pro (https:// www.netscantools.com), Colasoft Ping Tool (https://www.colasoft.com), Visual Ping Tester (http://www.pingtester.net), and OpUtils (https:// www.manageengine.com) to discover active hosts in the target network.

Leave a Reply

Your email address will not be published. Required fields are marked *