Skip to content

Network Scan

The Network Scan feature performs comprehensive device discovery on your local network using an advanced 11-phase scanning process. Results appear in the table at the bottom of the main window, showing all discovered devices with detailed information.

Network Scan Overview

Starting a Scan

There are three ways to initiate a network scan:

  1. Toolbar Button - Click the green play button (▶) in the toolbar
  2. Menu Bar - Select Tools → Scan
  3. Keyboard Shortcut - Press ⌘S

Scan Button

Before Scanning

Verify these settings in the toolbar:

  • Interface - Select the network interface to scan
  • IP Range Start - Starting IP address (auto-populated)
  • IP Range End - Ending IP address (auto-populated)
  • Host Count - Number of IPs that will be scanned

Example: Scanning 192.168.1.1 to 192.168.1.254 will scan 254 hosts

During Scan

While scanning:

  • Scan button shows a spinner/progress indicator
  • Status updates appear in the footer
  • Results appear in real-time as devices are discovered
  • Current scan phase is displayed
  • Scan button is disabled (cannot start multiple simultaneous scans)

The Scanning Process

PingStalker uses a sophisticated multi-phase approach to discover and identify devices:

ARP Table Scan

Purpose: Quick initial discovery from existing ARP cache

Discovers: Devices your Mac has recently communicated with

Speed: Very fast (< 1 second)

DNS Lookups for Discovered Hosts

Purpose: Resolve hostnames for devices found in Phase 1

Method: Reverse DNS lookups (PTR records)

Adds: Human-readable hostnames

Example: 192.168.1.1 → router.local

Ping Scan

Purpose: Discover devices not in ARP cache

Method: ICMP echo requests to all IPs in range

Discovers: Active hosts responding to ping

Note: Some devices have firewalls that block ping

Port Scanning

Purpose: Identify services running on discovered devices

Method: TCP connection attempts to common ports

Ports Scanned: - 22 - SSH (Secure Shell) - 80 - HTTP (Web Server) - 443 - HTTPS (Secure Web Server) - 445 - SMB (Windows File Sharing) - 554 - RTSP (Streaming Media) - 3389 - RDP (Remote Desktop Protocol)

Parallel Scanning: Up to as many simultaneous connections your Mac can handle for speed

Targeted Lookups

Purpose: Gather additional device information

Methods: - NetBIOS lookups for Windows devices - SNMP queries for network equipment

Adds: Device names, Windows computer names, SNMP system descriptions

mDNS Device Identification

Purpose: Identify Apple devices with specific model information

Discovers: iPhone, iPad, Mac, Apple TV, HomePod models

Example: "iPhone 15 Pro", "MacBook Air (M2)", "iPad Pro 12.9-inch"

Advantage: More specific than just "Apple, Inc." from OUI lookup

Scan Results Table

Results display in a comprehensive table with columns:

Results Table

IP Address

The IPv4 address of the discovered device.

Color: Often highlighted or linked for emphasis

Sorting: Click column header to sort by IP address

MAC Address

The hardware address of the device.

Format: 00:11:22:33:44:55

Privacy: Can be obfuscated in Settings → Privacy

Note: Devices not on local subnet (beyond router) won't have MAC addresses

Vendor

The manufacturer identified from the OUI (first 6 characters of MAC).

Database: 6MB+ vendor database with thousands of manufacturers

Examples: - Apple, Inc. - Cisco Systems - Netgear - Raspberry Pi Foundation - Intel Corporate - Samsung Electronics

Vendor Logos: Displayed when available (loaded asynchronously from Clearbit API)

Hostname

The DNS name or NetBIOS name of the device.

Examples: - router.local - DESKTOP-ABC123 - Johns-MacBook-Pro.local - nas.home.arpa

When Empty: Device has no resolvable hostname (no DNS PTR record)

Device Model

Specific model information for Apple devices.

Examples: - iPhone 15 Pro - MacBook Air (M2, 2024) - iPad Pro 12.9-inch (6th generation) - Apple TV 4K (3rd generation) - HomePod mini

When Empty: Not an Apple device, or model couldn't be determined

Open Ports

List of open/accessible ports discovered during port scanning.

Display: Comma-separated list: 22, 80, 443

Service Identification: Common ports show service names in tooltips

Interactive: Click to connect (see Connecting to Services below)

Actions

Right-click menu and action buttons for each device.

Available Actions: - Add to Ping Monitor - Copy IP Address - Copy MAC Address - Copy Row Data - Connect to Service (if open ports exist)

Working with Results

Connecting to Services

When a device has open ports, you can click to connect:

Connect to Service

Port 22 (SSH): - Opens Terminal with ssh command - Format: ssh user@192.168.1.50

Port 80 (HTTP): - Opens web browser to http://192.168.1.50

Port 443 (HTTPS): - Opens web browser to https://192.168.1.50

Port 445 (SMB): - Opens Finder to smb://192.168.1.50 - For Windows file sharing

Port 554 (RTSP): - Attempts to open stream URL - For IP cameras and streaming devices

Port 3389 (RDP): - Opens Microsoft Remote Desktop (if installed) - For Windows remote desktop

Method: 1. Click the port number in the Open Ports column 2. Or right-click the device → Connect to → [Service]

Adding to Ping Monitor

To continuously monitor a discovered device:

  1. Right-click the device in results table
  2. Select Add to Ping Monitor
  3. Device immediately appears in Ping Monitor pane

Add to Ping Monitor

Benefit: Track the device's availability continuously without rescanning

See: Ping Monitor for details on continuous monitoring

Copying Information

Right-click any device to copy:

  • Copy IP Address - Copy just the IP (e.g., 192.168.1.50)
  • Copy MAC Address - Copy just the MAC (e.g., 00:11:22:33:44:55)
  • Copy Row Data - Copy all columns (tab-separated, for pasting into spreadsheets)

Copy Options

Use Cases: - Documentation - Sharing with colleagues - Pasting into network diagrams - Importing into other tools

Sorting Results

Click any column header to sort:

  • First click: Sort ascending
  • Second click: Sort descending
  • Third click: Return to original order

Common Sorting: - IP Address: Organize by network order - Vendor: Group devices by manufacturer - Hostname: Alphabetical device listing - Open Ports: Find devices with specific services

Filtering Results

Use the search box (if available) or visually scan sorted results.

Tips: - Sort by Vendor to find all Apple devices - Sort by Open Ports to find all web servers - Search hostnames for specific devices

Exporting Results

PingStalker can export all scan results and interface information to CSV format.

Export Process

  1. Click Export to CSV button (typically in footer or results area)
  2. Choose save location
  3. Name your file (auto-suggests timestamped filename)
  4. Click Save

Export Button

CSV Contents

The exported CSV includes:

Interface Information Section: - Interface name and type - IP address, MAC address, subnet - Gateway, DNS servers - Internet details (public IPv4/IPv6, ASN, ISP, country) - DHCP information

Scan Results Section: - All columns from results table - IP Address - MAC Address - Vendor - Hostname - Device Model - Open Ports (comma-separated)

File Format: Standard CSV, opens in Excel, Numbers, Google Sheets, etc.

Filename Example: PingStalker_Scan_2025-10-31_14-30-15.csv

Use Cases for Export

  • Documentation: Record network inventory
  • Comparison: Compare scans over time to detect changes
  • Reporting: Share network audit results
  • Analysis: Import into database or analytics tools
  • Compliance: Maintain records of network devices

Performance Considerations

Incomplete Information

Missing Hostnames: - Devices may not have DNS PTR records - Not a problem—IP addresses still identify devices

Missing MAC Addresses: - Devices beyond local router won't show MAC addresses - Only local subnet devices provide MAC addresses

No Open Ports: - Devices may have firewalls blocking ports - PingStalker currently only scans common ports (22, 80, 443, 445, 554, 3389)

Unknown Vendor: - MAC address OUI not in database (rare) - Randomized MAC addresses show as "Unknown" or "Randomized"

Scan Hangs or Takes Very Long

Security Auditing

Use scans to:

  • Identify unknown/rogue devices
  • Find devices with unexpected open ports
  • Detect MAC address changes (spoofing)
  • Monitor for new devices (intrusion detection)

Network Mapping

Combine scan results with:


The Network Scan feature provides comprehensive device discovery and inventory capabilities. Use it regularly to maintain visibility into your network, and export results for documentation and compliance purposes.