Best Angry IP Scanner Alternatives in 2024

Find the top alternatives to Angry IP Scanner currently available. Compare ratings, reviews, pricing, and features of Angry IP Scanner alternatives in 2024. Slashdot lists the best Angry IP Scanner alternatives on the market that offer competing products that are similar to Angry IP Scanner. Sort through Angry IP Scanner alternatives below to make the best choice for your needs

  • 1
    Paessler PRTG Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Paessler PRTG is an all-inclusive monitoring solution with an intuitive, user-friendly interface powered by a cutting-edge monitoring engine. It optimizes connections and workloads, reduces operational costs, and prevents outages. It also saves time and controls service level agreements (SLAs). This solution includes specialized monitoring features such as flexible alerting, cluster failover, distributed monitoring, maps, dashboards, and in-depth reporting.
  • 2
    Acunetix Reviews
    Acunetix is the market leader for automated web application security testing and is the preferred tool for many Fortune 500 customers. Acunetix can detect and report on a wide range of web application vulnerabilities. Acunetix's industry-leading crawler fully supports HTML5/JavaScript and Single-page applications. This allows auditing of complex, authenticated apps. Acunetix is the only technology that can automatically detect out of-band vulnerabilities. It is available online as well as on-premise. Acunetix includes integrated vulnerability management capabilities to help enterprises manage, prioritize and control all types of vulnerability threats. These features are based on business criticality. Acunetix is compatible with popular Issue Trackers, WAFs, and is available online on Windows, Linux, and Online
  • 3
    Site24x7 Reviews
    Top Pick
    Site24x7 provides unified cloud monitoring to support IT operations and DevOps within small and large organizations. The solution monitors real users' experiences on websites and apps from both desktop and mobile devices. DevOps teams can monitor and troubleshoot applications and servers, as well as network infrastructure, including private clouds and public clouds, with in-depth monitoring capabilities. Monitoring the end-user experience is done from more 100 locations around the globe and via various wireless carriers.
  • 4
    Bopup Scanner Reviews

    Bopup Scanner

    Bopup

    $460 one-time payment|
    This freeware network scanner displays active computers and logs user names (NetBIOS), IP addresses, and MAC addresses. Bopup Scanner can also identify and show HTTP (Web) servers on remote computers (TCP port 80, 8080). It quickly detects online computers and allows you to browse shared resources and save the results to a text file. Advanced users can enter IP ranges to scan, modify a timeout to resolve remote hosts, and run the program via a command-line interface. Bopup scanner is portable. It does not require any setup or installation on a destination PC. The program can also be copied to a USB flash disk to be transferred to another computer. You can run the program with the command line parameters. This allows you to specify predefined options such as IP range (start and end IP addresses), path to the file, and where to save results. The scanner can also be used in batch files to automate monitoring.
  • 5
    Free IP Scanner Reviews
    A free IP scanner is a fast IP scanner and port scanner. It can be used by system administrators as well as general users to monitor and manage networks. This program is powered by multi-thread scanning technology and can scan hundreds of computers per second. It simply pings each address to verify that it is alive. If it is, it can optionally resolve its hostname, scan ports, and so on. A free IP scanner can display NetBIOS information, including the host name, workgroup, current logged user, and MAC addresses. The information can be exported as plain text files. Administrators will appreciate the fact that the Free IP Scanner scans hundreds of computers per second. It can be configured to scan at different priority levels, limit the number of threads, and so forth. To enter the first and last IP addresses, you can use two fields in IP Range. You can enter a lower number than the first IP address. It is okay to translate your input.
  • 6
    LizardSystems Network Scanner Reviews

    LizardSystems Network Scanner

    LizardSystems

    $79.95 one-time payment
    Network Scanner is an IP scanner. It can scan large corporate networks with hundreds of thousands of computers as well as small home networks with many computers. The program can scan a variety of IP addresses, computers, and ranges of addresses. However, the number and subnets that it can scan is unlimited. Network Scanner will display all shared resources, including hidden NetBIOS (Samba), shared resources as well as FTP and web resources. Network Scanner is available to both network administrators as well as regular users. It can be used to audit network computers and search for available resources. Network Scanner can not only locate network computers and shared resources but also check access rights. Users can mount the network drive, or open them in Explorer. The program allows you to easily export the network scan results to an XML or HTML file, or save them in the program.
  • 7
    Spiceworks IP Scanner Reviews
    Spiceworks IP Scanner automatically detects devices in your network. Basic information such as OS and MAC address can be retrieved with the scanner. You can also get detailed information about your servers and workstations, including storage, memory, serial number, CPU, and other software information. You can get the information you need with minimal setup. IP Scanner, a cloud tool, scans your network and returns a list of devices it finds. You can filter, search, and export devices to CSV. It will scan a local subnet by default. However, you can define your own IP range. The IP Scanner lists every device's hostname and IP address, as well as its vendor, OS, MAC addresses, description, open ports, and whether it's up/down. The type of device being scanned will determine the type of data that is returned.
  • 8
    Lansweeper Reviews
    Lansweeper can help you discover your IT and build your central IT Asset System of Record. You can easily audit all assets within your company's network using the Lansweeper Deepscan IP scanner engine. You can create a network inventory that includes all hardware, software, and users. Scan Windows, Linux, or Mac devices. Keep track of all your licenses, serial numbers, and warranties from major brands such as Dell, IBM and HP. Detect Unauthorized Local Admins and unify Office 365/AD User Data. Get the netbios domain, check for Windows Updates and more. You can discover all assets in your IT environment you didn't know about and take full control over your network. Get your free trial to get started with IT asset management.
  • 9
    MyLanViewer Reviews
    MyLanViewer Network/IP scanner is a powerful IP address scanner that can be used to scan local area networks (LANs). This program will allow you to find all IP addresses,MAC addresses, and shared folders on your Wi-Fi or wired network. The program scans your network and displays the information in a buddy-list-style window. It also provides the computer name and IP address. It can monitor your external IP address, send email notifications when it changes, and can also send emails to notify you. MyLanViewer Network/IP Scanner is able to turn on remote computers, view and manage shared folders, terminate user session, show netstat information and detect rogue DHCP server.
  • 10
    Nmap Reviews
    Nmap is an open-source software project that aims to dispel the stereotype of poorly documented open-source software. It provides a comprehensive set documentation for installing and using Nmap. This page links to Insecure.Org documentation as well as generous contributions by other parties. Nmap Network Scanning, the official guide to Nmap Security Scanner is a free and open source utility that millions of people use for network discovery, administration and security auditing. This book is suitable for all levels of security and networking professionals, from beginners to advanced hackers to explaining basic port scanning techniques. The 42-page reference guide explains each Nmap option and feature, while the rest of this book shows how to use those features to solve real-world problems. Diagrams and examples show real communication over the wire.
  • 11
    ManageEngine OpUtils Reviews

    ManageEngine OpUtils

    ManageEngine

    $345.00/one-time/user
    OpUtils is an IP address and switch port management tool that engineers can use to efficiently monitor, diagnose and troubleshoot IT resources. OpUtils is a complement to existing management tools, providing real-time monitoring and troubleshooting capabilities. It makes it easy for network engineers to manage their switches and IP addresses. This switch port management tool includes over 20 tools that can be used to monitor network performance, such as monitoring bandwidth usage, monitoring the availability of critical devices, and backing up Cisco configuration files. Advanced IP scanning of IPv4 or IPv6 subnets within your network is possible to identify available and used IP addresses. You can scan all switches in your network, map ports, run port scans, and view details such user, physical location, and more. Block access to rogue devices and identify rogue device intrusions.
  • 12
    Advanced IP Scanner Reviews
    Advanced IP Scanner has been proven reliable over the years to be a useful tool for managing LANs and performing a wide variety of networking tasks. Famatech and beta-testers from all over the world rigorously test each new version. To ensure the best possible solution for customers, Famatech takes into consideration all suggestions for product improvement. Radmin, Famatech’s popular remote tech support product, is integrated with Advanced IP Scanner. This allows Advanced IP Scanner to expand its capabilities and simplifies the job of the system administrator. Famatech software can be used by many technology leaders, including IBM, Sony and Nokia, HP and Siemens, as well as major telecommunications operators and government organizations and financial institutions.
  • 13
    SolarWinds IP Address Tracker Reviews

    SolarWinds IP Address Tracker

    SolarWinds

    $1,288 one-time payment
    SolarWinds®, IPAM IP address tracker software automatically detects your network's IPv4 IP addresses and allows you create IPv6 subnets with a step-by–step wizard. IPAM records and keeps track of changes in MAC addresses, hostnames and status (reserved or transient, in use, in use and available) by regularly scanning managed subnets with ICMP, SNMP and neighborhood scanning. This automated IP address tracking feature records all IP addresses for a specific time period. Administrators can also use the timestamp provided by the tracker to help them troubleshoot network problems. Administrators can quickly access detailed device information to help them diagnose and resolve problems. SolarWinds IP Address Tracker can be used to identify conflicts and determine which device had the IP address in the first place. You can also change the IP address of the device in conflict.
  • 14
    WiFi Scanner Reviews

    WiFi Scanner

    WiFi Scanner

    $29.99 one-time payment
    WiFi Scanner scans nearby networks and provides vital WiFi information for troubleshooting purposes. Filtering and sorting options can narrow down the results in high-occupancy areas. Channel graphs at 2.4 GHz or 5 GHz allow you to see overbearing and overlapping signal interferences that can affect network performance. The IP Scanner scans for devices connected to your network. Overcrowding can lead to speed and bandwidth issues. The Speed Test allows you to keep track of network speeds and performance. To test upload and download speeds, you can use a laptop to walk to different areas in your network. The IP Scanner Who's On My Network searches your network for connected devices. Too many devices can slow down your network, which can cause connection and speed problems. It can also be used for detecting intruders on your network.
  • 15
    Slitheris Network Discovery Reviews

    Slitheris Network Discovery

    Komodo Laboratories

    $195 per 256 devices
    Most network scanning software packages require credentialed access to remote devices in order to detect operating system. Slitheris Network Discovery uses TCP/IP stack fingerprinting, other technologies, and can identify many operating systems without authentication or credentials, including Windows (and its Edition), Linux and iOS. Slitheris can also scan for details about the operating system, such as Windows Uptime and Cold Boot Time, Time of Day, and Domain/Workgroup names. It distinguishes between Domain types and Workgroup types without requiring authentication or credentialed accessibility. This saves time and frustration when trying to find usernames and passwords, or visiting servers and PCs in person. This unique feature will be especially appreciated by IT Providers and Managed Service Providers.
  • 16
    SolarWinds IP Address Manager Reviews
    Use IPAM's capacity reporting feature to track subnet usage and aid in capacity planning. Use the customizable subnet capacity template to get fast, flexible, and central reporting. The Subnet Allocation Wizard is an IPAM tool that allows you to divide your IP address space into subnets that are perfectly sized for your network. IPAM's drag and drop interface allows you to create groups that contain any number of subnets, supernets, or groups. You can also create custom fields and use them. vRealize Orchestrator can be used by vRealize Automation and vCenter to automate the management of IP addresses. Reserve unique IP addresses and have them released automatically during the appropriate machine lifecycle. IPAM can be used to locate abandoned addresses from both static or DHCP systems. Just use IPAM's autoupdated logs for easy identification and reclaim.
  • 17
    Intruder Reviews
    Intruder, an international cyber security company, helps organisations reduce cyber exposure by providing an easy vulnerability scanning solution. The cloud-based vulnerability scanner from Intruder finds security holes in your digital estate. Intruder protects businesses of all sizes with industry-leading security checks and continuous monitoring.
  • 18
    SoftPerfect Network Scanner Reviews

    SoftPerfect Network Scanner

    SoftPerfect

    $29.11 one-time payment
    This highly configurable IPv4/IPv6 scanner will streamline many of your network support processes. SoftPerfect Network scanner is a versatile tool that offers a user-friendly interface, portability, and a wide range of advanced options. It is ideal for anyone who needs to monitor and maintain a network, as well as system administrators and users who are interested in computer security. SoftPerfect Network Scanner allows you to ping computers, scan ports and discover shared folders. It can also retrieve virtually any information about network devices via SNMP, HTTP and SSH. It can also scan for remote services, files, performance counters, and registry. It offers flexible filtering options and exports NetScan results in a variety formats, from XML and JSON.
  • 19
    SecurityTrails Reviews
    Data for security companies, researchers, and teams. Access to historical and current data via a fast, always-up API. The API is available at a simple price structure that allows you embed our data in your applications. All the data is available, fully-indexed, historical and current, and can be accessed immediately. Search over 3 billion historical and modern WHOIS data, and WHOIS changes. Our daily-updating database is over 203,000,000 deep and growing. Find out what tech sites are currently online and search for over a thousand technologies. Monthly access to more than 1 billion passive DNS data sets. You will have access to the most up-to-date information about IPs, domains and hostnames in real time. With tagged and index intel, searching is quick and easy. Access a treasure trove of cyber security information and find the information you need. Our API is able to provide security analysts and developers with the most up-to-date DNS and domain information.
  • 20
    Infiltrator Reviews

    Infiltrator

    Infiltration Systems

    Infiltrator, a free, intuitive, and easy-to-use network security scanner, can quickly scan your network computers for vulnerabilities, exploits, or information enumerations. Infiltrator allows you to catalog a wide range of information about scanned computers, including installed software, shared files, users, drives and hotfixes. It also provides information on NetBios, SNMP information, open ports, and other information. Infiltrator will audit each computer's security policies and passwords, and alert you when necessary changes should be made. The report generator can generate a clean, easy-to-read report from all results. Infiltrator includes over 15 powerful network utilities that allow you to scan, scan, enumerate, and gain access to machines. You will also find utilities such as ping sweep, whois searchups, email trace, brute force cracking tools and share scanning. Network enumerating is also included.
  • 21
    NetScanTools Pro Reviews
    NetScanTools Pro combines a collection of tools for gathering internet information and troubleshooting networks. You can use manual or automatic tools to research IPv4 and IPv6 addresses. It is designed to run on the Windows GUI. Interactively, the user can start automated tools. Join the thousands who use NetScanTools Pro to solve their network problems every day. You get a powerful collection of network tools. Use them wherever you need to. Saves time by gathering information on Internet or local LAN devices, IP addresses and domains, device ports and other network specifics. Automating the use many network tools simplifies and speeds up information gathering. Enter an IP address and press a button to use multiple tools.
  • 22
    Essential NetTools Reviews
    Essential NetTools is a collection of network scanning, security and administrator tools that can be used to diagnose networks and monitor your computer's network connections. It's a great tool for anyone looking for a powerful network toolkit for everyday use. It displays a list of your computer’s inbound and outbound connections, along with information on open TCP/UDP ports, IP addresses, and connection states. It can map open ports to the ownering application, which makes it stand out from other NetStat utilities. You can also configure alerts for both incoming and outgoing connections. Advanced TCP port scanner allows you to scan your network looking for active ports. This scanner supports both stealth (half open) and conventional (full connect).
  • 23
    Network Analyzer Master Reviews
    Master Network Analyzer provides all the information you need. Find Wi-Fi information (SSIDs, BSSIDs, IP addresses, subnet masks, vendor and vendor) as well as Cell Information (your country, provider, IP address and MCC, and VoIP support). You can easily detect channels and their use and assess the strength of yourWiFi. This tool will quickly and reliably detect all network devices, and reveal their IP address and vendor names. You can easily test the availability of a server and the reachability to a host. Round-trip delay, including IP address and hostname of each network node, and geolocation data. You can diagnose your network by tracing the route and measuring the delay of packets through the network. Network Analyzer will provide a traceroute visualization. You can quickly scan the most popular ports or specific ranges of ports quickly and efficiently. Network Analyzer can detect closed, firewalled and open ports.
  • 24
    ChronoScan Reviews

    ChronoScan

    Digital File

    €245 one-time payment
    With the many features of ChronoScan, you can virtually improve any data capture requirement. ChronoScan Enterprise is a server-client application that can process a wide variety of documents and automate your workflow. The windows service architecture provides the flexibility and power for the system administrator. The thin client interface is accessible from any web browser, from anywhere and at any time. It provides all the functionality of ChronoScan, without the need to install additional software. You can choose the email notifications you want for each Job and keep everyone informed. ChronoScan Enterprise comes with a scanner plugin. This plugin allows any client machine to scan directly into ChronoScan Enterprise using a local scanner.
  • 25
    SolarWinds Engineer's Toolset Reviews
    Network software that includes more than 60 must-have features. Automated network discovery. Alerting and monitoring in real time. Powerful diagnostic capabilities. Network security enhanced Configuration & log management. Monitoring IP address and DHCP scope. The right toolset for managing and troubleshooting your network. Your entire network including equipment, MAC-to-IP address relationships, Switch Port mapping, etc. Receive real-time alerts about network health and availability. For faster troubleshooting and quicker resolution of complex network problems, perform robust network diagnostics. Simulate attacks on your network in order to identify security holes. You can configure devices and troubleshoot config issues using specialized network engineer tools. You can deploy a variety of network discovery tools including Port Scanner and Switch Port Mapper, SNMP sweep IP Network Browser, MAC Address Discovery and Ping Sweep.
  • 26
    DNS Lookup Reviews
    Enter your domain or IP address to get started. Entering your domain or IP can quickly check the name servers and network information of your website. DNS Lookup offers a number of essential tools to webmasters and website owners. These include ASN Lookup, Port scanner, SSL Checker and subnet calculator. DNS Lookup has been designed to be simple to use. The platform's user interface makes it simple for users to navigate the platform and perform various tasks. DNS Lookup is a great way to save time and money for webmasters, site owners and domain administrators.
  • 27
    FIRMM Reviews
    FIRMM is a real-time monitoring system and biofeedback technology that addresses patient motion during brain MR. FIRMM software supports workflows, reduces motion, and improves scanning efficiency. FIRMM tablet features a touch screen and an intuitive GUI that makes it easy for scanner operators to use. FIRMM automatically saves session log files, so you don't have to worry about saving sessions. FIRMM doesn't require a camera or any other complex sensing hardware to work in your current MRI scanner. FIRMM patient biofeedback works seamlessly with your existing A/V system and is compatible with a variety of video display configurations.
  • 28
    Zoho Doc Scanner Reviews
    Sign your documents with Doc Scanner using e-sign. You can add your name, initials, email address and signature to the scanned copy of the document. Doc Scanner's text recognition option allows you to extract text from scanned documents and edit it. You can also share the extracted content to your peers via email or messaging apps. Your scanned documents can be organized using folders, reminders and tags. Doc Scanner automatically suggests tags based upon content to assist you. You can create folders and put your documents inside them using the Create Folder option. You can add tags to your documents to help you organize them and find them quickly. You can also add reminders to your documents to help you stay on top.
  • 29
    Network Analyzer Reviews

    Network Analyzer

    Techet

    $3.99 one-time payment
    Network Analyzer Lite is a version of Network Analyzer Pro, which is an advanced tool for network diagnosis, LAN scanning, and problem detection. The tools that Network Analyzer provides can help you diagnose many problems with your WiFi network setup and Internet connectivity. It comes with a quick wifi device discovery tool that includes all the names and addresses of all LAN devices. The provided ping tool can also be used to test the reachability of any device. It also displays useful information about your wifi/cell connection. Round trip delay testing, including the IP address and hostname of the server. Information about Wifi networks such as SSID and BSSID, IP address (v4 or v6), and subnet Mask. Information about cell networks such as IP address and network provider.
  • 30
    Mining Pool Hub Reviews
    Check the port number of any coin you select. Start mining immediately with the appropriate miner. Each algo has an auto switching port. These ports can switch coins from time to time in order to mine the most profitable coin. Best for ASIC, FPGA, and Rental miners. You can mine different algo currencies using the Hub feature or third-party mining helper programs. This is a great option for GPU miners, but you will need to have some knowledge to set it up and optimize it. It is important to verify that the correct miner name matches the content of the mine. Each algorithm has its own miners. However, you can use the same miners with multiple algorithms. You must provide a port number for mining. It starts at 20XXX. Each coin has a different pot number, which you can see on the pool news page. Multiple coins can be mined using the same algorithm. Simply set the port number to 17xxx. When the coin pool has accumulated a certain number of coins, auto-exchanged coins will be credited to a pool.
  • 31
    TapScanner Reviews
    Scan, Print and Share any document to PDF. You can now scan, import, and share any document right from the best portable scanner app. TapScanner allows you to access everything you have scanned previously. With your mobile device, scan any document and convert it to PDF. TapScanner's pdf maker has you covered. You can instantly convert any image into a pdf. Your documents can be auto-cropped and sorted the way you want them. To attach an E-signature using the pdf sign tools, use the best document scanner. These powerful filters will make your scanned documents look professional. To enhance your scans, remove shadows and artifacts. Port to black or white, adjust contrast and brightness.
  • 32
    SimplShip Reviews

    SimplShip

    SimplShip

    3¢ per request
    Make sure your packages reach the correct address. SimplShip makes sure that every package you send your customer arrives at the right address. Every address that you send us is checked against the U.S. Postal services database. We ensure that all mail sent to your customer goes to the right place. We are here to make sure every customer receives their package in the right place. No more worrying about their packages missing. Why make it difficult for your customers to add their shipping and billing addresses when they use mobile phones? Instead, use our Autocomplete API to make it easier for your customer to enter the wrong letter. Our address information is straight from the U.S. Postal service. So you can be sure you get the correct address every time. Your customers shouldn't have to enter their address on the phone. You can find out their address in real-time.
  • 33
    Eudora Internet Mail Server Reviews

    Eudora Internet Mail Server

    Eudora Internet Mail Server

    Free
    Relay restrictions have been completely rewritten with an easier-to-use interface that allows for finer control of relay security. EIMS has its own domain name resolver, which fixes bugs in the Open Transport DNR as well as performance issues with the OS X DNR. The new DNR currently does not support non-recursive domain names. SMTP Submit Port, this is a secondary SMTP port that runs on TCP port 587. It currently functions exactly the same way as the standard SMTP. This is useful for clients who are behind an ISP which blocks port 25 access. Sending Setup option to set maximum recipients per message. You can now turn off the Expand SMTP addresses option. This was always on in EIMS 3.1. The SMTP (both port 25 or 587) server now reports Telnet and connections that appear to be port scans (connections with no data sent and where it doesn't stop timer).
  • 34
    Cardiris 5 Reviews
    You need to scan your business cards in order to convert them into digital contacts in Outlook, Microsoft CRM or Salesforce. Cardiris™, Corporate 5 is the perfect solution. Cardiris™, Corporate 5 makes it easy to scan business cards you've been collecting for years. The software extracts and converts the most important data from your business cards (names, company, phone number, etc.). These digital contacts can be exported to any platform you choose, including Outlook, Salesforce, Lotus Notes and ACT !.... Cardiris™, works with any scanner, portable or flatbed. Your existing scanner can be used to scan your business cards. Cardiris™, a standalone unit, is compatible with all major scanner brands. Give your device new life and increase your productivity. Cardiris™, has connectors that scan business cards and send them to your favorite contact managers.
  • 35
    Nsauditor Network Security Auditor Reviews
    Nsauditor network security auditor is a powerful tool that scans networks and hosts for potential vulnerabilities and provides security alerts. Vulnerability Scanning Software and Network Security Auditing Software Nsauditor network auditor scans the enterprise network for any possible hacker methods and generates a report. Network Security Auditing Software, Vulnerability Scaner Network Security Auditing Software, and VulnerabilityScanner Nsauditor Network Auditing Software significantly reduces the cost of managing enterprise networks. This software allows IT personnel and system administrators to gather information from all computers on the network without installing any server-side programs and creates a report detailing potential problems.
  • 36
    Fast Scanner Reviews
    Fast Scanner scans any type document, from receipts to multiple pages books. All scanned documents can be exported as an industry-standard PDF file. The PDF file can be edited to add pages or remove pages. Fast Scanner supports many image editing options to make the scanned images as clear and easy-to-read as possible. Fast Scanner can scan any type of document, from receipts to multiple pages books. All scanned documents can be exported as an industry-standard PDF file. The PDF file can be edited to add pages or remove pages. Fast Scanner supports many image editing options to make the scanned images as simple as possible.
  • 37
    Deep Dig Reviews
    Deep Dig is a DNS lookup tool with DNS trace and history support. You can easily look up DNS records using this tool by specifying record types and custom servers in the query. Support for A and AAAA records, CNAME and PTR records, NS and MX records, SOA and SRV Records, as well as the "-t type option" in the query. Support for "+trace", "+all", and "+all" when typed into the query/hostname. Custom DNS server and ports via "-hhost" and "-pport" options, and custom DNS server option in the query. Support for DNS queries to multicast local IP addresses (automatically). Allows the querying Bonjour/mDNS server. Support for querying LLMNR servers. Lookup of reverse DNS (PTR), when typing in IPv4/IPv6 addresses. Lookup IP country automatically when resolving a domain or IP address.
  • 38
    Standard Time Reviews

    Standard Time

    Scoutwest

    $149.90 one-time payment
    Basic shop floor management is easy to implement. Set up a tablet equipped with a barcode reader and start scanning employee names, expense reports, bills of materials, inventory and other information. You've now got all the information your shop needs to grow and improve. Contact us for more information or to learn more about any of the features listed below. Use RFIDs and barcodes to track time on the shopfloor. Actual employee hours. Find out how long each job and phase of your process takes. You can create a comprehensive report on your shop floor by scanning both time and material. Find out the real cost for both labor and material. Projects may include lists of tasks that employees are assigned. Compare actual work with estimates, view total project costs, or view resource allocation.
  • 39
    Oracle Virtual Cloud Network Reviews
    Customers can define VCNs according their specific workload IP address requirements. A VCN can be divided into smaller ranges by using private or public subnets, or assigned multiple IP addresses to one VCN. Virtual routers and gateways can be used to extend existing on-premises networks or interconnects. Peering gateways are used by customers to connect to other VCNs within a tenant or to connect securely with other tenancies. Customers can connect directly to their OCI virtual clouds network using FastConnect via dedicated, private, high bandwidth connections. Customers simply choose the appropriate port speed based on how much data they have and pay a consistent, low monthly price. Other providers charge for the amount of data moved, which can be expensive and unpredictable.Prevent attacks on customer tenancies with isolated network virtualization. OCI's security-first architecture includes a SmartNIC, which is a custom-designed SmartNIC that isolates and virtualizes the network.
  • 40
    Dynamic Web TWAIN Reviews
    Dynamic Web TWAIN, a browser-based document scanner SDK, is specifically designed for web applications. You can create robust applications that scan documents from any scanner, edit the images, and save them to a local/server folder or document repository with just a few lines JavaScript code
  • 41
    Vistumbler Reviews
    Vistumbler is an AutoIT for Windows wireless network scanner. Vistumbler's main purpose is to map and visualize access points around you based upon the wireless and GPS data collected. To get the best results, disconnect all access points and scan for networks. If there are no access points, ensure that the Interface menu selects the correct network adapter. GPS receivers must be serial-based and appear as a COM Port. You may be able use a tool such as 'Centrafuse Locator' to create a virtual port that vistumbler could use if your sensor uses the windows location platform. The 'GPSGate Splitter" also offers tools that can be used to create a compatible virtual port that vistumblers can use.
  • 42
    IRISPowerscan Reviews
    With the IRISPowerscan™, you can scan, capture, sort, index and export any document to your business application. Any scanner, file or MFD can be used to capture data. Sort documents and extract valuable information. The extracted indexes can be used to automatically populate your ECM, Cloud systems, or document workflows. It's easier and faster to collect and share documents. We have developed a variety of IRISPowerscan™, versions to meet your business needs. No matter what configuration you have, IRISPowerscan™, scanning solution will work for you. It requires minimal training and offers a user-friendly interface. A file menu is available to create, save, and open projects. It also allows you to modify interface, language, and general settings. A simple navigation mode that allows you to scan, modify, and process documents. For advanced configurations and project customization, a detailed designer view is available.
  • 43
    QRExplore Reviews
    Two-dimensional barcodes that encode text content are called Quick Response (QR). QR codes can contain more than 4,000 characters and can be scannable by any compatible barcode scanner within a fraction of a second. QR codes can be used for asset tagging and proof of identity, event tickets, ticketing, proof-of-identity, proof of identity, event tickets, interactive museum exhibits as well as school quizzes, business cards, and many other purposes. The QR Code's URL or data is permanently encoded and nearly impossible to alter. QR Codes are a unique way to engage customers with media while also adding unique tracking data to track the performance of each media install. QR Explore codes are compliant with all barcode scanners and do not add to the data. They also provide codes that will never expire. The service keeps a record of each code generated and the origin IP address. This is done to prevent abuse.
  • 44
    ScanFactory Reviews
    ScanFactory provides real-time security monitoring of all external assets. It uses 15+ of the most trusted security tools and a large database of exploits to scan the entire network infrastructure. Its vulnerability scanner stealthily maps your entire external attack surface and is extended with top-rated premium plugins, custom wordslists, and a plethora vulnerability signatures. Its dashboard allows you to review all vulnerabilities that have been sorted by CVSS. The dashboard also contains enough information to reproduce, understand, and remediate the issue. It can also export alerts to Jira and TeamCity, Slack, and WhatsApp.
  • 45
    sqlmap Reviews
    sqlmap is an open-source penetration testing tool that automates the detection and exploiting of SQL injection flaws. It also allows for the taking over of database servers. It has a powerful detection engine and many niche features that make it the ultimate penetration tester. There are many switches that allow you to perform database fingerprinting, data fetching from the database, and accessing the underlying file systems. You can also execute commands on the operating system via out of band connections. You can connect directly to the database without using SQL injection by providing DBMS credentials. Automatic recognition of password hash format and support for cracking them with a dictionary-based attack. You can dump entire database tables, or a specific number of entries, as per your choice. You can also choose to only dump a certain number of characters from each column entry.
  • 46
    Mobile Scanner App Reviews
    Mobile Scanner is an Android Fast Scanner. Mobile Scanner app turns your phone into a powerful scanner. You can scan any document, receipts, or paper notes into sharp PDFs or images. OCR technology converts images to text and can export searchable PDF files. There are many scanning options to choose from so you can do a variety of tasks for your daily life, work, and study. Smart cropping, auto-detect borders and HD enhancement all allow you to create high-quality PDF documents in a matter of seconds. Set passwords to protect confidential documents and folders. Secure all of your personal information, such as bank cards, contracts, and tax documents. To organize all your files and documents, create, move, or merge folders quickly. Enter keywords to quickly locate any document you need.
  • 47
    Arachni Reviews
    Arachni is a Ruby framework that allows administrators and penetration testers to evaluate the security of modern web applications. It is modular, feature-rich, and high-performance. It is free and open-source, so you can review the source code. It is multi-platform and supports all major operating systems (MS Windows OS X, Mac OS X, and Linux). It is distributed via portable packages that allow for immediate deployment. It can be used for a variety of purposes, including a command-line scanner utility, a global high-performance grid of scanners, a Ruby library that allows for scripted audits, and a multi-user multiscan web collaboration platform. Its simple REST API makes integration easy. It can also support complex web applications that make heavy use JavaScript, HTML5, DOM manipulation, and AJAX thanks to its integrated browser environment.
  • 48
    Nexus Intelligence Reviews
    The truth about open source risks. Alternative tools are more likely to produce false positives or negatives than the ones that scan apps "as declared". They trust developers to reveal the truth about dependencies embedded within software. Nexus scans apps using Advanced Binary Fingerprinting (ABF). The result is a precise reading of embedded dependencies and a Software Bill of Materials that reflects truth about third-party risks. ABF identification uses cryptographic hash to identify binaries, structural similarity and derived coordinates. It can identify renamed and modified components, regardless of whether they were declared, misnamed, added manually to the code base, or misnamed. The Octopus Scanner's recent success is a great example of why scanning a manifest is not enough to detect malicious components being injected in our software supply chains.
  • 49
    IRIScan Reviews

    IRIScan

    IRIS Portable Scanners & Conversion Software

    IRIScan for iOS makes scanning any document very simple using the native camera on your iPhone or iPad. You will always be able to capture the precious bits of information you collect every day, no matter where you are. Any information, including pictures, magazines articles, and sticky notes, will be archived at the destination of your choosing. IRIScan iOS is also compatible with our latest Wi-Fi mobile scanners. Just connect your iOS device and the scanner will scan any document you have scanned. You can then import it into the application with a single click. This will allow you to take advantage of the advanced scanning capabilities offered by our mobile scanners.
  • 50
    Dataedo Reviews

    Dataedo

    Dataedo

    $49 per month
    Your metadata can be discovered, documented and managed. Dataedo has multiple automated metadata scanners. These scanners connect to different database technologies, extract data structures, and then load them into the metadata repository. In just a few clicks you can create a catalog of all your data and then describe each element. With business-friendly aliases, decrypt column and table names and provide meaning and purpose to data assets with descriptions and custom fields. To find out what data is stored in your data asset, you can use sample data. Make sure you have a better understanding of the data before you use it. Data profiling can help ensure high quality data. Data profiling allows everyone to have access to data knowledge. A lightweight, on-premises data catalogue can help you build data literacy, democratize data, and empower your employees to make better data use. A data catalog can help you increase data literacy.