SoftPerfect Network Scanner
Online User Manual

Getting started

SoftPerfect Network Scanner - Main window
The main window you see when you run the SoftPerfect Network Scanner.

Under the menu there is a toolbar with buttons used to access the main features.

The program controls are as follows:

Clear Clear the display
Load Load the scan results from a XML file
Save Save the scan results to a file
Collapse Collapse the results tree
Expand Expand the results tree
Find Search the results tree
Paste Paste IP address from the clipboard
Filter Apply the shares filter. Only devices with available shared folders are shown
Open filter panel Open the advanced filter panel
Options Program options
DHCP Discovery Discover DHCP servers
Wake-on-LAN Open the Wake-on-LAN manager
Detect Automatically detect the network configuration
WMI Open the Windows Management Instrumentation manager
Registry Open the remote registry query manager
Services Open the remote service query manager
Files Open the remote file query manager
SNMP Open the SNMP query manager
Groups Open the remote groups query manager
Help Online Help (this web page)
Add Add one or more IP address range to scan
Address representation Convert a CIDR notation to a range, and vice versa
Scan mode Toggle noncontiguous scan mode
Comment View or set a comment assigned to the IP address range

Application options

Press Ctrl+O or the Open settings button button to access the Network Scanner options:

Options - General tab
General tab

On the General tab:

  • Max. threads: the maximum number of scanning threads.
  • Max. thread run-time gracefully stops a thread and moves on to a next IP address if it has not finished within the specified time. If the thread cannot be stopped, it will be forcibly terminated when 2 x the specified time elapses. A zero run-time sets no limit on thread execution time.
  • Method: the ping method. Can be chosen from ICMP (ping), ARP (arping), or both.
  • Ping timeout: the period to wait for a reply from the remote device.
  • Attempts: the maximum number of ping requests.
  • Always analyse host forces the scanner to analyse a non-responding host.
  • Ping network and broadcast addresses: when enabled, the scanner tries to ping the first and last IP addresses in a network.
  • Explore shared folders in background: if this option is set, whenever you choose to explore a folder, the Network Scanner launches a separate process of Windows Explorer to avoid temporary unresponsiveness.
  • Case insensitive sorting ignores case type when results are sorted.
  • Display dead hosts adds non-responding hosts to the results.
  • Show last scan time shows the time when the host was last scanned.
  • Show successful ping method displays the ping method that resulted in receiving a response.
  • Allow ARP outside current subnet: normally ARP requests are not sent when scanning IP addresses outside the current subnet. However, if your router runs proxy ARP or forwards ARP requests and responses, turning this option on may help detect more devices and their MAC addresses.
  • Determine packet loss and jitter sends a series of echo requests and shows the number of lost packets as well as a packet delay variation. The higher are the numbers, the less reliable the connection is.
  • Detect duplicate MAC addresses informs you if there are any duplicate MAC addresses discovered.
  • Scan in random order scans IP addresses and ports in a random order, not sequentially.
  • Minimise to the notification area: the application will be minimised to the system tray.
Options - Additional tab
Additional tab:

On the Additional tab:

  • Resolve host names: when enabled, the IP addresses are converted to the host names.
  • Perform double reverse lookup: convert the resolved host names back to their IP addresses.
  • Resolve MAC addresses: when enabled, you will see hardware (MAC) addresses. There are three discovery methods available: ARP query, NetBios query and Router SNMP MIB query. The ARP query method sends an ARP packet to the target device to resolve its MAC address directly. Similarly, the NetBios query method sends a NetBios packet to the target device. If the target device responds to the request, the Network Scanner will obtain the MAC address of that device. The Router SNMP MIB query method works differently. Before starting scanning, the application will send a few SNMP requests to the default gateway configured in your network card’s properties in order to find out what MAC address corresponds to what IP address. If the gateway is SNMP capable and responds to the request, the application will cache this information and use it for MAC address resolution. Generally, the ARP query method is sufficient to resolve all MAC addresses in a local subnet. However, if you also require to discover those behind the router, enable the NetBios query and Router SNMP MIB query methods and place them first and second in the list. Double-click a method to access its additional configuration parameters.
  • Resolve IPv6 addresses enables the Network Scanner to obtain the IPv6 address of a remote host. This feature requires Windows Vista or above and discovers addresses of hosts with a dual IPv4/IPv6 stack.
  • Lookup network card vendor: as per the IEEE standard, the first three octets of a MAC address represent the NIC’s vendor. In order to use this feature you will need to download this file from the IEEE and save it to the Network Scanner folder.
  • Lookup monitor information displays monitor vendor, model and serial number if available. This feature requires the remote registry service, as the information is read from the registry.
  • Grab HTTP & FTP banner displays web-server and file server software name and version if one is running on a remote host. In order to probe an FTP port, append f to a port number, for example 21f. For an HTTPS probe, append s, for example 443s. A port number without a suffix does a standard HTTP probe.
Options - Workstation tab
Workstation tab

On the Workstation tab:

  • Lookup LAN group displays the workgroup/domain name that a Windows workstation belongs to.
  • Lookup Windows version displays the Windows version on a workstation.
  • Enumerate user accounts lists all user accounts registered on a remote computer.
  • Lookup logged-on users displays a list of users currently logged-on to a Windows workstation.
  • Lookup logged-on SIDs displays Security Identifiers of the users currently logged-on to a Windows workstation.
  • Lookup remote Time and Date retrieves and shows the time of the day on a remote system.
  • Retrieve list of disk drives lists all disk drives available on a remote computer.
  • Retrieve computer uptime shows how long a remote computer was up and running.
  • Retrieve assigned comment displays a comment assigned to a Windows workstation.
  • Lookup server type/roles displays all roles (e.g. PDC, SQL server, Master Browser) assigned to a server.
  • Retrieve list of installed applications displays installed applications from a remote computer.

On the Ports tab:

  • Check for open TCP ports attempts connection to the specified TCP ports and reports those open (you can specify several ports separated by a comma or dash, e.g. 21, 80, 110-115).
  • Check for open UDP ports discovers some UDP-based services such as DNS, TFTP, NTP, NBNS, MSSQL and RADIUS.

See the rightmost columns on the main screen once you have enabled one or more options.

Options - Shares tab
Shares tab

On the Shares tab:

  • Scan for shared resources enables scanning of shared resources. All the possible types of shared resources are listed below.
  • Check for write access determines whether the shared folder is writable or read-only.
  • Enable security & user permission scan: with this option enabled, the Network Scanner will discover what reading and writing privileges are assigned to shared folders. You may have to be an administrator to retrieve this information.
  • Determine disk space determines shared folders’ total and free space.
  • All: all resources.
  • Folders: shared folders or drives.
  • Printers: shared printers.
  • Comm. device: communication devices.
  • Administrative shares: special share reserved for remote administration of the server, e.g. ADMIN$, C$, D$, E$, etc.
  • IPC: interprocess communication (IPC).
Options - Applications tab
Applications tab

The Applications tab extends support for third-party applications. For example, if you use remote administration or specific network client software, you can setup the Network Scanner to connect to a remote host using the additional software directly from the Network Scanner:

Menu extension for third-party applications support
Menu extension for third-party applications support
Menu extensions for third-party applications support

Should you require to pass extra arguments upon launching an application, you can use user-prompted parameters specified in braces. It is also possible to specify a default value after a colon. If the parameter name contains the “file” or “path” string, there will be a button allowing you to choose a file or a directory respectively. As an example, the following line lets you quickly execute commands on the remote system with PsExec:

psexec.exe \\%0 -u {User name:Admin} -p {Password} {Command}

Launching this command will bring up a window where you can specify the arguments to pass to PsExec as shown below. Then the Network Scanner will launch PsExec with your input.

Menu extension
Running PsExec

Since the Network Scanner interprets braces as user-prompted parameters, you may have problems with passing a value containing braces, for example a GUID. In this case double the braces, e.g. myapp.exe {{12345678-ABCD-EFGH-1234-567890ABCDEF}}, so that this value is not treated as a user-prompted parameter.

If you have got many applications to launch and some require common parameters such as a user name and password, you can define these as global variables. Click Advanced at the Applications tab to open the variables editor. A value can be either plain text or an environment variable, whose contents you can pass to applications.

Variables editor
Variables editor in the Applications tab’s Advanced options

Finally, the Browsing tab enables the Network Scanner to check whether a host is still on-line when you attempt to explore its folders, or establish a connection to that host. This greatly speeds up some operations, because an attempt to connect an off-line device might temporarily freeze the Network Scanner until the connection fails. You can enable one or more methods to check the availability. Additionally, you can choose a live display mode, whether the Network Scanner must only find previously undiscovered nodes in background, or it must keep rescanning those already discovered, or it must do both. Don’t forget to turn the live display on in the main menu: View - Enable Live Display.

Options - Browsing tab
Browsing tab

IP address range and automatic detection of network configuration

The SoftPerfect Network Scanner is able to detect your IP range automatically. Select the Options - IP Address - Detect Local IP Range menu item. In the following dialog, select an interface and the program will calculate the IP range of the network. If you are connected to the Internet and are behind a router or proxy server, use the Detect External IP Address command to determine your external IP address (requires Internet connection).

Address detection
Address detection
Address detection - Result
In this example SoftPerfect Network Scanner has determined the range of IP addresses on the network. You are good to go!

You can add more IP address ranges to scan with the Plus button. Hold Ctrl while clicking this button to add an IPv6 address range rather than IPv4.

The interpretation of your IP address range depends on the state of the Mode button. If the button is up, the range is interpreted as a regular one. In this case, the program will sequentially scan all IP addresses within the range. If the button is down, the range is interpreted as a noncontiguous one. In this case, the program will only scan IP addresses whose octets fall in the range. For example, if you specify a range of to, the following octets will be scanned:

Octet 1: 10
Octet 2: 1 – 9
Octet 3: 254
Octet 4: 1 – 5

Namely, the program will scan:,,,,,,,,,,,,

This can be useful if you have got a large network and want to scan specific devices in each subnet.

Scanning modes and how the software deals with IPv6

There are three scanning modes supported:

IPv4 address range

In this mode the network scanner simply runs from the lowest to the highest IP address. This the default mode and it can be used by entering an IP address range manually or using the detection feature described above.

IPv4 address range

IPv6 address range

Likewise, the network scanner runs from the lowest to the highest IP address. Due to a very large pool of possible addresses only up to four last octets can vary. In practice, probably only the last two, for example 2001:db8::1 to 2001:db8::ffff. This can be useful when the IP addresses are allocated by a DHCP server within a known range. This mode can be used by entering an IP address range manually.

IPv6 address range

IPv6 neighbour discovery

The network scanner sends out a multicast ping to ff02::1 and awaits replies. After that it runs through a list of addresses that responded. This may be handy for discovering auto-configured IPv6 devices. This mode can be used by selecting one of the local addresses in the detection dialog described above.

IPv6 address seed


To begin scanning click the Start Scanning button.

Main window, scanning
Main window, scanning in progress

Scan results

When scanning has finished, you will be able to browse the results, save them to a file, map a network drive, explore folders, etc.

Main window, scan results
Main window, scan results

Live display

If you enable the Live Display option (choose View - Live Display from the main menu), the Network Scanner will constantly update scan results to reveal the latest changes in the network. If a host joins or leaves the network, it will be reflected in the main window. The live display log keeps track of devices joining and leaving the network. When the live display is active, choose View - Show Live Display Log from the main menu to access it.

Live Display Log window
Live Display Log

You can specify what happens when a device joins or leaves the network. If the Notify me... option is ticked, a balloon will popup in the notification area. In addition, you can choose one or more actions in the settings: play a sound, launch another application or save the event to a file. It is possible to pass the contents of any column to the application by specifying it in the square brackets as shown below. There is also a pseudo column [event] that you can refer to. It contains the event type, i.e. join or leave.

Notifications preferences window
Notifications Preferences

Rogue DHCP server detection

There is a built-in tool searching for active DHCP servers in a LAN segment. It does not require a scan as such. Instead it broadcasts a DHCP discovery message and collects replies from all available DHCP servers. These may be either normal DHCP servers, or rogue servers that are not under administrative control of the network staff. The latter may disrupt connectivity or may be used for network attacks.

In order to see all active DHCP servers, choose Actions - DHCP Server Discovery from the main menu. In a few moments, you will see a list of all the servers along with offered DNS and gateway addresses.

DHCP Server Discovery window
DHCP Server Discovery

UPnP device detection

Furthermore, the application can discover Universal Plug and Play (UPnP) devices in your network such as media servers, routers and printers. Similarly to the DHCP discovery, it broadcasts a UPnP discovery message and collects replies from compatible devices. In order to see your UPnP devices, choose Actions - UPnP Device Discovery from the main menu. Click a Device User Interface URL to access the device.

UPnP Device Discovery window
UPnP Device Discovery

Wake-on-LAN and remote shutdown

To send a “magic” wake up packet to a remote device (its MAC address must be known), choose Actions – Wake-On-LAN from the main menu. To shutdown or reboot a remote PC, choose Actions – Remote Shutdown. You can also suspend or hibernate a remote computer by choosing Actions – Remote Suspend/Hibernate.

Remote shutdown options
Remote shutdown options
Remote suspend options
Remote suspend options

In order to shutdown or suspend a remote computer, several criteria must be met:

  • Administrative shares are enabled.
  • Administrator has got a non-empty password.
  • Simple file sharing is turned off.
  • Administrative shares IPC$ and ADMIN$ are accessible.

Otherwise you may encounter either the Access is denied or the Network path not found error.

WMI Query builder and scanning

The Network Scanner is capable of running WMI (Windows Management Instrumentation) queries against the hosts being scanned. In order to create a WMI query, choose Options - WMI from the main menu. Queries are written in a special language called WQL, similar to SQL.

WMI Queries window
WMI Queries

The New button allows you to easily construct simple WQL queries. It merely connects to your computer’s WMI subsystem and lets you pick a WMI class and parameter to be used in the query. When you have one or more WMI queries enabled, there will be additional columns shown in the scan results.

WMI Queries Results
WMI Query Results

Remote file, registry and services

Firstly, the application can connect to the remote registry of remote PCs running Windows, provided the remote registry service is started. Secondly, it can also connect to the their file system via administrative shares (C$, D$, E$, etc) and retrieve information about a specific file. Thirdly, it can connect to the remote service manager and query the status of one or more service. These features are useful mainly for network administrators maintaining large networks and can be accessed by choosing Options - Remote Registry, Options - Remote File or Options - Remote Services from the main menu.

There are several predefined entries in the list, and you can easily add new items to retrieve data about hardware and software specific to your environment. The columns are as follows: Item Name is a name of the entry, Root represents one of the root registry hives, Registry key contains the path to a value of interest, Parameter Name is the value name to be retrieved, and Local Value merely shows the value in the local registry on your computer.

Remote Registry window
On this screenshot three items are chosen to be retrieved from remote computers.

Likewise, provided the administrative shares are enabled and accessible, you can pull out information about a specific file or folder on remote computers. For example, you want to find out the version of Internet Explorer, or when a log file changed, or how large a particular file is. To do so, enter the full name of a file and choose what property you would like to retrieve.

On the following screenshot, the application is configured to access the Internet Explorer executable and display its version. Drive letters get substituted to the relevant administrative shared folders. For example, if you scan a range of to with these settings, the application will attempt to display the version information embedded in the files \\\C$\Program Files\Internet Explorer\iexplore.exe, \\\C$\Program Files\Internet Explorer\iexplore.exe, etc.

It also possible to use wildcards, for example C:\Program Files\Internet Explorer\*.exe will process all executable files in C:\Program Files\Internet Explorer.

Furthermore, you can have variable parts in path names, which is especially useful in a multilingual environment. If you have a few possible locations for your file, list them in the brackets and separated by a vertical bar, as in the following example: C:\[Program Files|Program Files (x86)|Programme]\Internet Explorer\iexplore.exe. In this case, the Network Scanner will try three different paths C:\Program Files\Internet Explorer\iexplore.exe, C:\Program Files (x86)\Internet Explorer\iexplore.exe, C:\Programme\Internet Explorer\iexplore.exe and proceed with the first valid one.

Remote file window
Remote file

Lastly, you can retrieve information about the status and configuration of a service on remote computers. For example, if you want to make sure that the wuauserv service is up and running, turn the pre-defined item on, as shown below. The Network Scanner will then connect to each computer’s service manager and query the information requested.

Remote services window
Remote services

There will be additional columns showing the information retrieved:

Remote - information retrieved

Remote SNMP query

Network Scanner can look for machines that have an SNMP service running. You can specify a community (e.g. public or private) and a MIB OID number. The application automatically determines the type of data received and displays it in a readable form.

All three versions of SNMP are supported. A default Windows SNMP implementation is used if you choose Windows built-in or you can use a specific SNMP version.

Remote SNMP items

Remote groups query

If you need to find out what users participate in a particular group, or what groups a user belongs to, you can use this feature. The Network Scanner connects to each computer and retrieves local or global group membership:

Remote groups

Remote XML

There is an advanced feature to obtain device configuration and status. It allows you to send a HTTP request and parse a XML, HTML or text response. It works virtually for any device that has got a built-in web-server producing text output, which can then be parsed with XPath or a regular expression. For example, there is a couple of default entries to retrieve HP Integrated Lights-Out properties:

Remote XML

Remote SSH

If you have Unix/Linux computers, you can use this feature to connect to their shell and execute one or more commands.

Remote SSH

Remote performance

This feature makes use of the Windows Performance Counters to obtain various live system data such as CPU usage or information about processes. It needs the Remote Registry service to be running and accessible.

Remote Performance

Remote PowerShell

The software can execute your PowerShell scripts against remote computers. It works by executing the following command in a PowerShell console and capturing its output:

powershell.exe -NonInteractive Invoke-Command -ComputerName <name> -ScriptBlock { <script> }
Remote PowerShell

Remote Scripting

The software can execute a custom VB script against remote computers. It uses Windows Scripting Host and most existing scripts would work, only requiring to replace WScript.Echo with Output.Write and obtain current IP address from Input.Current

Remote Scripting
There is a built-in script editor with syntax highlighting and function templates:
Script Editor

Duplicate IP address detection

Occasionally, two or more devices in a network can be assigned the same IP address, which disrupts connectivity between these devices. Use this feature to discover any duplicate IP addresses in the current subnet.

The detection works by sending an ARP request to every address and collecting ARP replies. If two or more devices respond to one request, this means they have been erroneously assigned the same address and this situation needs to be resolved.

You may need to download and install WinPCap to use this feature, as it requires low-level access to the network card.

Duplicate IP address detection

Output presentation

You can change any column’s background colour and text colour for easy identification and highlight certain values:

Changing column view menu
Right click a column’s header and choose Change Column View.
Changing column view window
Then, set the background and text colour. The network scanner also supports regular expressions which you can use for data extraction and manipulation. For example, the above regular expression extracts the last 3 characters of a string.
Changed column view
An example of a column with new background and text colour settings, and altered host name.

Scan Comparison

You can compare the differences between any two scans by choosing File - Compare Scans and loading the XML files.

Scan Comparison

Tips and tricks

  • When clicking a bookmark in the Network Scanner’s main menu, the current IP addresses will be replaced with those assigned to the selected bookmark. Hold the Ctrl key to append them instead. The same applies to choosing one or more IP addresses in the automatic IP address detection dialog and Importing IP/Hostnames.
  • It is possible to group bookmarks or custom applications that you define within the Network Scanner. Specify a vertical bar to create groups of items. For example, try naming your bookmarks as Network A | Subnet 1, Network A | Subnet 2 or naming your applications as FTP clients | FileZilla, FTP clients | Total Commander.
  • If it appears that all IP addresses are detected as active, set the Ping Method to ICMP only. This is happening because when you are scanning a different subnet, the default gateway may respond to every ARP request with its own MAC address rather than the target device’s address, thus misleading the Network Scanner.
  • If you want to send Wake-On-LAN packets to a subnet specific broadcast address, change the default broadcast address to In this case, when you are adding a device to wake up from the main view, the actual device’s IP addresses will be combined with the default address. For example, when adding and the default broadcast address being, a new WOL entry will have

Command line switches

You can use the following switches as netscan.exe /switch1 /switch2 ... switchN.

/auto:filename.[txt|htm|xml|csv|json] runs scan with global settings and exports the results to a file, i.e. /auto:"c:\desktop\result.txt". Specify a corresponding extension to produce a file of that type. For example:

netscan.exe /hide /auto:"c:\desktop\result.txt"
netscan.exe /hide /auto:"c:\desktop\result.htm"
netscan.exe /hide /auto:"c:\desktop\result.csv"

In order to run a scan automatically without exporting to a file, specify /auto without a parameter. It is also possible to have the current date and time in the file name. Use any combination of the following tokens, each enclosed between two percent signs: y, yy, yyyy, m, mm, mmm, mmmm, d, dd, ddd, dddd, h, hh, n, nn, s, ss. For example, date_%yyyy%%mm%%dd%_time_%hh%%nn%.csv.

/live:filename.[txt|htm|xml|csv] is similar to the above switch. Unlike the /auto switch, the /live switch leaves the Network Scanner on and enables the live display. The specified file is updated after every complete round of the live scan, so the file always reflects latest changes.

/config:filename.xml loads the specified XML configuration file in the application.

/hide hides the main window (silent mode). If the network scanner was launched from a command prompt, it would output its progress in the command prompt window. Note that because the network scanner isn’t a true console application, the command processor and the application’s output may sometimes overlap. For better readability, use the following command to launch the application:

start /wait netscan.exe /hide ...

/load:filename.xml loads the specified XML result set in the application. It is possible to rescan it with the /auto switch.

/cols:col1;col2;col3 applies to the /auto command and exports only the specified columns to a file. Otherwise all visible columns are exported. Example: /cols:"Host Name;MAC Address".

/range:from-to Sets an IP address range for scanning, for example: /range: Multiple ranges should be comma-separated. In order to pass a noncontiguous IP address range, append #N, for example /range:

/range:type Automatically detects the current IP address range for scanning. Valid types are all, v4 and v6. For example, /range:v4 will detect all available IPv4 ranges.

/append applies to the /auto command for text and CSV files. Appends the results to a file rather than overwrites it.

/merge applies to the /auto command for text and CSV files. Merges the results with those in a file, output lines are sorted and duplicates are removed.

/wol:mac sends a Wake-On-LAN magic packet to the specified MAC address and immediately exits. Example: /wol:AABBCCDDEEFF.

/wolfile:filename.txt allows you to specify a text file with MAC addresses to wake-up, e.g. /wolfile:c:\myfile.txt where the file is a plain text file containing one MAC address per line.

/wakeall sends a WOL packet to all devices configured in the WOL manager and immediately quits.

/maxcols:N allows to display more columns for certain multi-column queries. The default value is 10, however you may want to increase it to see more than 10 columns of the same type at once.

/openpass turns off hiding of passwords behind asterisks. Use this feature if you forgot a password or need to see it openly.

/file:filename.txt loads the specified text file and feeds in IP addresses to be scanned. Use this switch with /auto or /live. There must be one address or range per line in one of the following notations. Any mismatching lines in the file will be discarded. Another way to import a file is to choose File - Import IP/Host Name List from the main menu.

Line Example Interpretation
x.x.x.x Plain IPv4 address
x.x.x.x-y.y.y.y IPv4 address range
x.x.x.x/y IPv4 address/mask
x:x:x:x:x:x:x:x 2001:db8::1 Plain IPv6 address
x:x:x:x:x:x:x:x-x:x:x:x:x:x:x:x 2001:db8::1-2001:db8::ffff IPv6 address range
x:x:x:x:x:x:x:x/y 2001:db8::/120 IPv6 address/mask
hostname Host name (will be resolved to an IP address)

End User Licence Agreement (EULA)

This software and the included documentation is copyright SoftPerfect. All rights are reserved. The software may be used, installed or copied only in accordance with the terms of the licence described in the following paragraphs.


The evaluation version of the software may be freely distributed provided that the original distribution package is not modified in any way.


This is not free software. You are hereby licensed to use this software for evaluation purposes without charge for as long as you consider appropriate. The evaluation version may have some features limited or disabled. To use the software without these restrictions you need to purchase a licence.


The software is licensed, not sold. Upon purchase of a licence, SoftPerfect grants you non-exclusive, non-transferable rights to use the software and all its features according to the terms of this EULA and the purchased licence type as described in the Licence Types section.


Except for the specific purposes described in the Grant of Licence and the Licence Types sections, licence keys issued by SoftPerfect may not be distributed by any person, organisation or their agents without written permission from the copyright holder.




Unauthorised modification, decompilation or reverse engineering of the software or any subset of the software without written permission from the copyright holder is strictly prohibited.


Installation or use of this program signifies your acceptance of the terms and conditions of the licence. If you do not agree with them, you must stop using and remove the software from your computer(s). SoftPerfect reserves all rights not expressly granted here.

Product Page & Download