Skip to main content

View Detailed Info Of All Devices On Your Network

Whether at home or In a work environment, If you're running a network of devices and/or workstations, It's very Important to know the details of each and every connection. To do this, you'd need a tool that will automatically scan your local area network for IP-based devices, and return the results thereafter. In this tutorial, I will Introduce you to a tool that allows you to view detailed Information of every device on your network.

Depending on your environment and overall usability, there are many reasons why you should be kept up-to-date with what's going on within your local area network. Perhaps you wish to Implement MAC address filtering, or (If you're running a wireless network) make sure that an attacker hasn't cracked your wireless encryption key and gained unauthorized access. Whatever the reason may be, having the Information at your disposal Is paramount.

As such, I will show you how to monitor your network, by using a neat little tool named Slitheris Network Discovery, that can be downloaded from the official website or via this reputable source. If you have 25 devices or less, It's totally free to use. For the purpose of this article, I will be demonstrating my wireless home network. So without further delay, let's get this tutorial started.

Step One:

Once you've downloaded Slitheris Network Discovery, It must be Installed on your system. Then execute the tool, and hit the Scan All IP Ranges button as shown below. It will now begin to scan for every connected device on your network.

Step Two:

When finished, It will display an array of Information. To begin with, all my Device Names and their associated IP addresses have been returned, with the first entry being my Router/Access Point. Let's click on that IP address and see the result.

Step Three:

As you can see, It's redirected to my Microsoft Edge browser and prompting to authenticate via a username & password. Obviously I've changed It from It's default state, such as admin:admin, hence only I have access to my Router's gateway.

Step Four:

I've now scrolled a little further, and the operating systems of every computer has been Identified. The Linux entry Is my Router.

Step Five:

If I want to Implement MAC address filtering, by only allowing authorized devices that're connected to my network, the Information for every computer Is readily available as outlined In red.

Step Six:

And here's the Brand of every device. This comes In handy If I want to update the firmware, or perhaps replace the device with the same manufacturer.

Final Thoughts:

Unlike many other tools of similar nature, the good thing about Slitheris Network Discovery, Is that It's very user-friendly thus can be used by all types of computational users. It's also very light on system resources, and performs It's task In a very efficient and effective manner. Be sure to give It a try, you will not be disappointed.


Popular posts from this blog

How To Decode The Windows 10 Product Key

Every Windows 10 operating system that's Installed and activated on the computer, has what's called a Product Key , that Is either pre-Installed by the manufacturer, or added by the end user when formatting their PC. In order to have a fully-functional OS, It must contain a valid Product Key. Whilst there are many tools that can extract It from the operating system, In this tutorial, I will show you how to manually decode the Product Key.

How To Check Faulty Drivers In Windows 10

For hardware devices to function properly, they must have device drivers  Installed, thus allow them to perform at their optimal state. It's all well and good when they're running without error, but they do tend to fail at the best of times, which can cause system Instability and/or loss of functionality. It can be a difficult task pinpointing the problematic driver(s), so In this tutorial, I will show you how to check faulty drivers , without the aid of third-party tools.

How To Create A Fake File Of Any File Size

Depending on your business environment or Individual requirements, sometimes there Is the need to test files of a given capacity. Such tests can Include Identifying how well your hard disks perform under heavy read/write operations, or to establish whether files can be securely deleted beyond recovery. Whatever the reason may be, In this tutorial, I will show you how to create a fake file of any file size.