Todd Caughey wrote:
http://insecure.org/
You can do a scan like:
nmap -O 192.168.0.0/24
And it will tell you everything on your network, what O/S it's running, what ports are open, and (usually) how long it's been booted.
EG:
# nmap hp4100
Starting Nmap 4.20 ( http://insecure.org ) at 2008-02-15 17:07 EST
Interesting ports on hp4100.xxiii.com (172.23.23.21):
Not shown: 1690 closed ports
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
280/tcp open http-mgmt
443/tcp open https
515/tcp open printer
631/tcp open ipp
9100/tcp open jetdirect
MAC Address: 00:11:0A:C3:43:99 (Hewlett Packard)
-Wayne
> Another other tricks for figuring out what it might be? Even just what type of device (printer, PC, switch, etc..) would help a lot. For the future I think I will see if I can manually make DNS entries and add descriptions for the odd devices....when I can find them.You need nmap
http://insecure.org/
You can do a scan like:
nmap -O 192.168.0.0/24
And it will tell you everything on your network, what O/S it's running, what ports are open, and (usually) how long it's been booted.
EG:
# nmap hp4100
Starting Nmap 4.20 ( http://insecure.org ) at 2008-02-15 17:07 EST
Interesting ports on hp4100.xxiii.com (172.23.23.21):
Not shown: 1690 closed ports
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
280/tcp open http-mgmt
443/tcp open https
515/tcp open printer
631/tcp open ipp
9100/tcp open jetdirect
MAC Address: 00:11:0A:C3:43:99 (Hewlett Packard)
-Wayne