Don't miss an insight. Subscribe to Techopedia for free.


How does network scanning work?

By Justin Stoltzfus | Last updated: July 2, 2020

In a general sense, network administrators use network scanning to identify active hosts on a network by evaluating IP addresses and more. The same types of principles can also be used in cyberattacks to find weaknesses in a system.

In a practical sense, there are different tools and techniques for network scanning. Administrators may conduct ping sweeps, where they find a range of IP addresses that map to live hosts in the network. This may require using tools like Nmap to look at how these IP addresses are mapped.

Administrators can also use port scans, which send messages to each port in a network, to look at where that network is strong or weak. Different types of port scans include a regular or "vanilla" port scan where the scanner sends out communications to all of the ports in a system. Where this is not practical, administrators can use more specific types of scans like a strobe scan, stealth scan or other technique.

Share this Q&A

  • Facebook
  • LinkedIn
  • Twitter


Cybersecurity Networking Network Management

Written by Justin Stoltzfus | Contributor, Reviewer

Profile Picture of Justin Stoltzfus

Justin Stoltzfus is a freelance writer for various Web and print publications. His work has appeared in online magazines including Preservation Online, a project of the National Historic Trust, and many other venues.

More Q&As from our experts

Related Terms

Related Articles

Term of the Day

Canary Test

A canary test, also known as a canary deployment or canary release, is a form of A/B testing used in Agile software...
Read Full Term

Tech moves fast! Stay ahead of the curve with Techopedia!

Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.

Go back to top