Skip to content

2108vijay/Network-Scanner

Repository files navigation

🔍 Advanced Network Scanner

Quick Start - 3 Easy Ways to Run:

Method 1: Double-Click to Run (Easiest!)

  1. Double-click START_SCANNER.bat
  2. Wait for it to start
  3. Your browser will open automatically at http://127.0.0.1:5000

Method 2: Python Launcher

  1. Double-click run_scanner.py
  2. Browser opens automatically
  3. Start scanning your network!

Method 3: Manual Command Line

Then open: http://127.0.0.1:5000

What This Scanner Does:

Discovers devices on your local network (phones, tablets, computers, IoT)
Identifies services running on each device
Analyzes security risks with color-coded warnings
Provides specific recommendations to improve security
Generates reports you can export
Modern web interface with dark/light themes
Mobile device detection finds secured phones & tablets
ARP table analysis for accurate device discovery

🚨 Why Network Scanning is Critical:

Cybersecurity Threats:

  • Unknown devices connecting to your network without permission
  • Vulnerable services exposed with default passwords
  • Outdated software with known security exploits
  • Open databases accessible without authentication
  • IoT devices with weak security broadcasting your data
  • Rogue access points mimicking your legitimate network

What Hackers Look For:

  1. Open ports - Entry points into your devices
  2. Default credentials - Admin/admin, root/password combinations
  3. Unpatched services - Telnet, FTP, SMB with vulnerabilities
  4. Database servers - MySQL, PostgreSQL exposed to network
  5. Web interfaces - Router admin panels, IP cameras, smart devices
  6. File shares - Network drives accessible without passwords

Stay Aware & Protected:

🔍 Regular Monitoring:

  • Weekly scans to detect new or suspicious devices
  • Check after guests visit and use your WiFi
  • Monitor IoT devices - smart TVs, cameras, thermostats
  • Audit work-from-home setups for corporate security

📊 Red Flags to Watch For:

  • Unknown IP addresses not belonging to your devices
  • High risk scores (60+ out of 100) indicating serious vulnerabilities
  • Database ports open (MySQL 3306, PostgreSQL 5432)
  • Legacy protocols (Telnet 23, FTP 21) that transmit passwords in plain text
  • Multiple web services on unusual ports indicating compromised devices

🛡️ Immediate Actions:

  • Change default passwords on all network devices
  • Disable unused services found during scans
  • Update firmware on routers, cameras, smart devices
  • Enable network segmentation to isolate IoT devices
  • Set up guest networks to protect main devices

How to Use:

  1. Choose scan mode: Auto-detect or Manual network entry
  2. Select ports to scan (or use presets)
  3. Click "Start Scan" - takes 10-30 seconds for accurate results
  4. Review results and security recommendations carefully
  5. Take immediate action on critical and high-priority warnings
  6. Export reports for documentation and IT security teams

Security Features:

  • 🚨 Critical alerts for dangerous services (Telnet, SMB, etc.)
  • 🔒 Database security warnings and recommendations
  • 🛡️ Network segmentation suggestions
  • 📊 Risk scoring for each device (0-100 scale)
  • 💡 Actionable advice with copy-paste commands
  • 📱 Mobile device identification (iPhones, Android, tablets)
  • 🏠 Smart home security analysis for IoT devices
  • Real-time threat assessment with immediate recommendations

🎯 Detection Capabilities:

Device Types Identified:

  • 📱 Mobile Devices: iPhones, iPads, Android phones/tablets
  • 🖥️ Computers: Windows, Mac, Linux workstations
  • 📡 Network Equipment: Routers, switches, access points
  • 🎮 Gaming Consoles: PlayStation, Xbox, Nintendo Switch
  • 📺 Smart TVs & Media: Chromecast, Apple TV, streaming devices
  • 🖨️ Printers: Network printers and multifunction devices
  • 🏠 IoT Devices: Smart cameras, thermostats, lights, locks
  • 💾 Servers: Database servers, file servers, web applications

Advanced Detection Methods:

  • ARP Table Analysis: Most reliable method for active device discovery
  • Service Fingerprinting: Identifies specific software and versions
  • Port Pattern Recognition: Detects device types by open service patterns
  • MAC Address Vendor Lookup: Identifies manufacturer (Apple, Samsung, etc.)
  • Alternative Discovery: Finds secured devices that block ping/scanning

Requirements:

  • Windows 10/11
  • Python 3.7+ (usually pre-installed)
  • Network access to scan local devices

Troubleshooting:

If the scanner won't start:

  1. Make sure you have Python installed
  2. Run as Administrator if needed
  3. Check Windows Firewall isn't blocking it

If no devices are found:

  1. Make sure you're connected to a network
  2. Try manual mode with your network range (e.g., 192.168.1.0/24)
  3. Some networks block scanning - this is normal

🔔 Stay Vigilant - Network Security Awareness:

Daily Habits for Network Safety:

  • Check connected devices monthly using this scanner
  • Monitor unusual network activity or slow internet speeds
  • Update router firmware quarterly and change admin passwords
  • Review device permissions for smart home products
  • Educate family members about connecting unknown devices

Warning Signs Your Network May Be Compromised:

  • Unexpected devices appearing in scan results
  • Services running you didn't install or enable
  • High bandwidth usage when devices should be idle
  • Slow network performance indicating possible malware
  • Router settings changed without your knowledge
  • New wireless networks with names similar to yours

Emergency Response Plan:

  1. Disconnect suspicious devices immediately from network
  2. Change router admin password and WiFi password
  3. Run this scanner to document all connected devices
  4. Check router logs for unauthorized access attempts
  5. Update all device passwords especially cameras and smart devices
  6. Contact ISP if you suspect external intrusion

Support:

For issues or questions, the scanner includes:

  • Built-in help tooltips and security explanations
  • Color-coded risk assessment with severity levels
  • Export capabilities for sharing with IT professionals
  • Detailed recommendations with step-by-step fixes

⚠️ Legal Notice: Only scan networks you own or have explicit permission to test. Unauthorized network scanning may violate local laws and regulations.

🔒 Privacy Guarantee: All scanning is performed locally on your computer. No data is transmitted to external servers or third parties. Your network information remains completely private.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors