The nmap
command (Network Mapper) is a free and open-source tool for network discovery, available for Linux, macOS, and Windows.
- To install on Linux, install the
nmap
package e.g.apt-get install nmap
. - To install on macOS or Windows, see the nmap.org download page.
To use nmap
to scan the devices on your network, you need to know the subnet you are connected to. First find your own IP address, in other words the one of the computer you’re using to find your MSRTK Moduls IP-address:
- On Linux, type
hostname -I
into a terminal window - On macOS, go to
System Preferences
thenNetwork
and select your active network connection to view the IP address - On Windows, go to the Control Panel, then under
Network and Sharing Center
, clickView network connections
, select your active network connection and clickView status of this connection
to view the IP address
Now you have the IP address of your computer, you will scan the whole subnet for other devices. For example, if your IP address is 192.168.1.5
, other devices will be at addresses like 192.168.1.2
, 192.168.1.3
, 192.168.1.4
, etc. The notation of this subnet range is 192.168.1.0/24
(this covers 192.168.1.0
to 192.168.1.255
).
Now use the nmap
command with the -sn
flag (ping scan) on the whole subnet range. This may take a few seconds:
nmap -sn 192.168.1.0/24
Ping scan just pings all the IP addresses to see if they respond. For each device that responds to the ping, the output shows the hostname and IP address like so:
Starting Nmap 6.40 ( http://nmap.org ) at 2014-03-10 12:46 GMT
Nmap scan report for hpprinter (192.168.1.2)
Host is up (0.0010s latency).
Nmap scan report for ubuntu (192.168.1.5)
Host is up (0.0010s latency).
Nmap scan report for MSRTK (192.168.1.8)
Host is up (0.0030s latency).
Nmap done: 256 IP addresses (4 hosts up) scanned in 2.41 seconds
Here you can see a device with hostname MSRTK
has IP address 192.168.1.8
.