Angry IP Scanner
Angry IP Scanner: Comprehensive Guide & Cheat Sheet
Angry IP Scanner is a fast, open-source, cross-platform network scanner popular among IT professionals, network administrators, and security enthusiasts. This guide provides a detailed overview, installation instructions, feature breakdown, usage tips, and a handy cheat sheet for quick reference.
1. Background & Overview
Angry IP Scanner is designed to scan IP addresses and ports, helping users discover devices and services on a network. Its key strengths are speed, simplicity, and extensibility through plugins. It is available for Windows, macOS, and Linux, and does not require installation on most platforms, making it highly portable .
2. Installation & Setup
General Installation Steps
Download: Visit the official Angry IP Scanner website and download the appropriate version for your operating system.
No Installation Required: On most platforms, Angry IP Scanner is a standalone executable (portable). Simply extract and run.
Java Requirement: Angry IP Scanner requires Java Runtime Environment (JRE). Ensure Java is installed on your system.
Platform-Specific Notes
Windows: Download the
.exe
file. Double-click to run. For advanced use, add the executable to your PATH for command-line access.macOS: Download the
.dmg
or.jar
file. For.dmg
, drag to Applications. For.jar
, run withjava -jar
.Linux: Download the
.deb
,.rpm
, or.jar
file. Install using your package manager or run the.jar
directly.
Tip: Always use the latest version for new features and security patches .
3. User Interface & Configuration
Main UI Elements
IP Range Fields: Enter the starting and ending IP addresses for your scan.
Ports Field: Specify which ports to scan (e.g., 80, 443, 1-1024).
Start/Stop Buttons: Begin or halt a scan.
Results Table: Displays discovered hosts, open ports, hostnames, MAC addresses, and more.
Menu Bar: Access preferences, plugins, export options, and help.
Configuration Settings
Preferences: Set default IP ranges, ports, thread count, and appearance (dark/light mode).
Data Fetchers: Choose which information to collect (e.g., hostname, MAC address, NetBIOS info).
Plugins: Manage and install plugins to extend functionality .
4. Basic Scanning Options
IP Range: Scan a single IP, a range (e.g., 192.168.1.1-254), or a list from a file.
Port Range: Scan specific ports (e.g., 22, 80, 443) or a range (e.g., 1-1024).
Ping Method: Choose between ICMP, TCP, or UDP ping to detect live hosts.
Threads: Adjust the number of concurrent threads for faster scanning (default: 100).
5. Advanced Features
Multithreaded Scanning: Scans multiple IPs/ports in parallel for speed .
Custom Data Fetchers: Add or remove columns to collect specific data.
Plugin Support: Extend with community or custom plugins.
Command-Line Interface (CLI): Automate scans and integrate with scripts .
Export Results: Save results as CSV, TXT, XML, or IP-Port list for further analysis .
6. Command-Line Usage
Angry IP Scanner can be run from the command line for automation:
ipscan [options]
Common Options:
-r <range>
: Specify IP range (e.g.,-r 192.168.1.1-254
)-p <ports>
: Specify ports (e.g.,-p 80,443,8080
)-o <file>
: Output results to a file (CSV, TXT, XML)-t <threads>
: Set number of threads-f <fetchers>
: Specify data fetchers (e.g., hostname, mac)
Example:
ipscan -r 192.168.1.1-254 -p 22,80,443 -o results.csv -t 200
This scans the specified IP range for ports 22, 80, and 443, using 200 threads, and saves results to results.csv
.
7. Exporting & Reporting
Export Formats: CSV, TXT, XML, IP-Port list.
Customizable Fields: Choose which columns to include in exports.
Integration: Exported data can be imported into spreadsheets, SIEMs, or other network management tools .
8. Performance Optimization
Increase Threads: Raise thread count for faster scans, but beware of network/device limits.
Limit Scan Range: Scan only necessary IPs/ports to reduce load.
Optimize Fetchers: Disable unnecessary data fetchers to speed up scans.
Batch Scanning: Use CLI for scheduled or automated scans .
9. Security Considerations
Use Responsibly: Scanning can trigger security alerts or violate policies. Always have authorization.
Avoid Overloading Networks: High thread counts can cause network congestion or device instability.
Data Privacy: Be cautious with exported data; it may contain sensitive network information.
Update Regularly: Keep Angry IP Scanner and Java updated to mitigate vulnerabilities .
10. Common Use Cases
Network Inventory: Discover all devices on a subnet.
Security Audits: Identify unauthorized or rogue devices.
Port Auditing: Check for open or vulnerable ports on network devices.
Troubleshooting: Diagnose connectivity issues by verifying device presence .
11. Troubleshooting & Best Practices
If No Results: Check firewall settings, network connectivity, and Java installation.
Slow Scans: Increase thread count or reduce scan range.
Permission Issues: Run as administrator/root if needed for certain ping methods.
Community Support: Use forums and community guides for help and plugin recommendations .
Regular Updates: Always use the latest version for bug fixes and new features.
12. Cheat Sheet
Scan local subnet
Enter 192.168.1.1-254
in IP range, click Start
Scan specific ports
Enter ports (e.g., 22,80,443
) in Ports field
Export results
File > Export > Choose format (CSV, TXT, XML)
Increase scan speed
Edit > Preferences > Performance > Increase thread count
Command-line scan
ipscan -r 10.0.0.1-10.0.0.254 -p 80,443 -o scan.csv
Add data fetcher
Tools > Fetchers > Add/Remove columns
Use plugin
Tools > Plugins > Manage
Troubleshoot connectivity
Check firewall, run as admin/root, verify Java installation
13. Additional Resources
14. Summary
Angry IP Scanner is a powerful, flexible, and user-friendly tool for network discovery and security auditing. Its cross-platform nature, plugin support, and automation capabilities make it suitable for a wide range of network management tasks. By following best practices and leveraging its advanced features, users can efficiently manage and secure their networks .
Use Angry IP Scanner responsibly and always ensure you have permission to scan the networks you target.
Last updated
Was this helpful?