

Just so you know, here's what the other nmap options I specified mean: -sn (No port scan)Īs the "no port scan" option may hint at, you can do all sorts of very funky things with nmap, such as checking to see what ports are open on a machine (to tell what services they are probably running) and it can even guess which OS the target machine is running with a pretty decent degree of accuracy.
#Ping tool mac full#
I don't actually know how many pings per second nmap can send, but if you try a full scan, you may have to leave it overnight, or at least have a long coffee. Assuming 0.25 pings per second, that would take 4 hours to complete. N.N addresses, you would specify 192.168.0.0/16 - but that will have to ping 65536 machines. 24 will search 256 address, /23 will search 512 address, /22 will search 1024.Įvery time you decrease the number by 1, twice as many addresses are searched - this is why decreasing it too much can make the search take a very very long time.

So to search more addresses decrease the number after the slash. N as the exact part, as each group is 8 bits). That means nmap will use the first 24 bits of the IP address you've specified and automatically generate the other numbers (in the first example nmap uses 192.168. In the three commands above, I've specified /24.

If you want to expand your search to include more machines, you have to adjust the number after the slash in the address section for the command. N.N.N, use this, again filling in the N sections with your own reported numbers: sudo nmap -sn -PE 10.N.N.0/24Īnd finally, if it looks like 172. Fill in the N sections with the matching number in your inet address: sudo nmap -sn -PE .0/24įor example, if your inet address was reported as 192.168.1.100, you should type: sudo nmap -sn -PE 192.168.1.0/24 N.255 on your network, and report any machines which respond (you need to use sudo so that nmap can use ICMP pings). N.N (where each N is a number between 0-255) then the following command will try to ping addresses 192.168. In the following examples, I'll assume you have less than 256 devices on your network and that they are all in the same subnet - likely to be the case if this is a home network. NOTE: depending on how many machines you have on your network, pinging them all could take a very very long time. On my network, my machine has the address 192.168.0.6 on interface en1. Here is an example output from my machine: $ ifconfig -a inet It's the IP address next to that you're interested in. When you type that in, either your en0 or en1 network interface should have an inet entry (ignore the inet address for lo0). The easiest way to find that out is to run ifconfig -a inet from a terminal. Once you have downloaded and installed nmap, you need one other piece of information about your LAN - what block of IP address are used for machines on it.
#Ping tool mac install#
Alternatively, if you have Homebrew installed, you can use that to install nmap from a terminal by typing brew install nmap

#Ping tool mac download#
You can download the binaries from the main site. Probably the easiest way to do this is to use a command line utility called nmap.
