Purpose of the Promiscuous Mode Scanner tool

The Promiscuous Mode Scanner Tool scans your subnet for network interfaces listening for all ethernet packets in Promiscuous Mode.

About the Promiscuous Mode Scanner Tool

The Promiscuous Mode Scanner Tool scans your subnet and shows network interfaces listening in Promiscuous Mode. Interfaces operating in that mode are listening for all packets, not just packets destined for that specific interface.


Related Tool Links

Promiscuous Mode Screenshot

Promiscuous Mode Screenshot

Try the DEMO Now!

How the Promiscuous Mode Scanner Tool works


This tool actively scans your subnet with modified ARP packets and shows the devices responding to each type of ARP packets.


The devices that respond to nearly every packet are most likely listening in Promiscuous Mode (ie. the ethernet interface is capturing IP packets not intended for that IP address). All IPv4 devices MUST respond to ARP even if they are running a firewall and invisible to normal ICMP Ping. Note that ARP is not routed so you are limited to your subnet.


The image below shows a DSL router in the first row listening in Promiscuous Mode which would be expected from this type of device.


Note that the scanner requires the use of WinPcap. We install WinPcap as part of the installation package. WinPcap is designed for wired ethernet cards, not cellular modems and it usually works well with 802.11x wireless interfaces.

A video of the Promiscuous Mode Scanner Tool in action!

Try the NetScanTools Pro demo free for 30 days

Try the DEMO Now!


ARP (Address Resolution Protocol) is a protocol which associates an IPv4 address with a MAC (Media Access Control) address (xx-xx-xx-xx-xx-xx) over an ethernet network segment. ARP is normally not routed beyond a network segment.