A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


Man page of netdiscover


Section: User Commands (8)
Updated: February 2006
Index of this MAN page

Back To MAN Pages From BackTrack 5 R1 Master List  


netdiscover - an active/passive arp reconnaissance tool.  


netdiscover [-i device] [-r range | -l file | -p] [-s time] [-n node] [-c count] [-f] [-d] [-S] [-P] [-L]  


netdiscover is an active/passive arp reconnaissance tool, initialy developed to gain information about wireless networks without dhcp servers in wardriving scenarios. It can also be used on switched networks. Built on top of libnet and libpcap, it can passively detect online hosts or search for them by sending arp requests.

Furthermore, it can be used to inspect your network's arp traffic, or find network addresses using auto scan mode, which will scan for common local networks.  


-i device
The network interface to sniff and inject packets. If no interface is specified, first available will be used.

-r range
Scan a given range instead of auto scan. Valid range values area for example:, or

-l file
Scan ranges contained on the given file, it must contain one range per line.

Enable passive mode. In passive mode, netdiscover does not send anything, but does only sniff.

-s time
Sleep given time in milliseconds between each arp request injection. (default 1)

-c count
Number of times to send each arp request. Useful for networks with packet loss, so it will scan given times for each host.

-n node
Last ip octet of the source ip used for scanning. You can change it if the default host is already used. (allowed range: 2 to 253, default 66)

Enable sleep time suppression between each request. If set, netdiscover will sleep after having scanned 255 hosts instead of sleeping after each one. This mode was used in netdiscover 0.3 beta4 and before. Avoid this option in networks with packet loss, or in wireless networks with low signal level. (also called hardcore mode)

Enable fast mode scan. This will only scan for .1, .100 and .254 on each network. This mode is usefull while searching for ranges being used. After you found such range you can make a specific range scan to find online boxes.

Ignore configuration files at home dir, this will use defaults ranges and ips for autoscan and fast mode. See below for information about configuration files.

Produces output suitable to be redirected into a file or be parsed by another program, instead of using interactive mode. Enabling this option, netdiscover will stop after scanning given ranges.

When using -P, continue program execution after the active scan phase to capture ARP packets passively.



If passive mode (-p), scan list (-l) or scan range (-r) options arent enabled, netdiscover will scan for common lan addresses.

Screen control keys

Show help screen

Scroll down (or down arrow)

Scroll up (or up arrow)

Show arp replys list

Show arp requests list

Close help screen or end application



There are 2 configuration files that netdiscover will look for, each time it is executed, if file doesnt exist it will use default values. You can use the -d switch to disable reading and loading configuration files.

This file contains a list of ranges (one per line) used for auto scan mode instead of default ranges. By default netdiscover will use a list of common ranges used on local networks.


List contaning the last octect of the ips to be scanned on each subnet, when using fast mode, by default (1,100,154).




netdiscover was written by Jaime Penalba Estebanez.

This manual page was originaly written by Nicolas Weyland, for the Debian project. This man page has been merged into netdiscover project, and modified from the original.




This document was created by man2html, using the manual pages.
Time: 07:34:21 GMT, September 13, 2011

Printable version of this article

15 most recent posts on Irongeek.com:

If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast