Search  Search Site Become a Facebook Fan Follow us on Twitter NetScanTools Blog NetScanTools YouTube Channel
Promiscuous Mode Scanner
Home Products Download Social Media Support Contact us About us Search SiteMap
  NetScanToolsŪ Pro
NetScanToolsŪ LE
NetScanToolsŪ Basic
NetScanToolsŪ Std
Switch Port Mapping Tool
Product Pricing
How to Buy
Press Resources
Get the NetScanTools Pro demo here.


NEVER scan a computer you do not own or have the owner's permission to scan.

- Last Review: June 13, 2012

Home > NetScanTools Pro > Technical Details > Promiscuous Mode Scanner Tool

Promiscuous Mode Scanner Tool Description

This tool actively scans your subnet with modified ARP packets and shows the devices responding to each type of ARP packets.

The devices that respond to nearly every packet are most likely listening in Promiscuous Mode (ie. the ethernet interface is capturing IP packets not intended for that IP address). All IPv4 devices MUST respond to ARP even if they are running a firewall and invisible to normal ICMP Ping. Note that ARP is not routed so you are limited to your subnet.

The image below shows a DSL router in the first row listening in Promiscuous Mode which would be expected from this type of device.

Note that the scanner requires the use of WinPcap. We install WinPcap as part of the installation package. WinPcap is designed for wired ethernet cards, not modems and it usually works with 802.11x wireless interfaces.

VIDEO >> See the Promiscuous Scanner Tool in action!

Screenshot of Promiscuous Scanner Results


Home | About us | Contact us | Privacy Policy | Search | Site Map

Copyright 1995-2014 Northwest Performance Software, Inc.