MAC Scanner is an awesome tool that allows you to get a list of all MAC Addresses on your LAN. Previsouly, there was a free edition and a pro edition with advanced functionality.


With MAC Scanner Pro Edition, you can:

  • Save Scan Results into database for future reference
  • Add attributes (such as users name and physical location of the host) to scan results and save in database
  • Automatically compares new MAC scan results with database records and notifies difference and new records (illegal access)
  • Export Scan Results
  • and more…



LAN Explorer: Network Traffic Monitor Software

by packetpro on October 4, 2016

LanExplorer is a cost effective, software only, 32-bit Microsoft Windows Protocol analyser & network monitor with Internet traffic analysis. Native Win32 application program for Windows 95/98/NT4.0/2000, using existing Ethernet, Fast Ethernet, Token Ring or WAN NIC.

LanExplorer is the complete solution for network monitoring and analysis. With numerous network monitoring tools like statistics, traffic tables and graphs, host tables (top talkers) and threshold alarms, users will have a tremendous amount of information to troubleshoot and manage their networks. 

Along with network monitoring, LanExplorer has detailed analysis through its ability to capture, modify, playback and decode network packets. This feature allows precise analysis of packets in HEX, ASCII and decode format of any packet captured from the network. (VoIP decode support is available as an add on option.) 

Finally, LanExplorer can remotely access other segments over a LAN or WAN when used with the Remote Traffic Agent. This not only gives users remote network statistics but also allows full packet capture and analysis from distant networks.

LanExplorer is better then ever with new features added and an improved user interface.

Basic Features

  • Protocol analyser & network monitor with Internet traffic analysis.

  • Native Win32 application program for Windows 95/98/NT4.0/2000.

  • Uses existing Ethernet, Fast Ethernet, Token Ring or WAN NIC.

  • Intercepts packets in and out of the workstation or server.

  • Captures all packets from the network segment (promiscuous mode).

  • Decodes 802.3, 802.5, VLAN, Apple, Novell, Microsoft, TCP/IP protocols.

  • Displays accumulated and historical network statistics in graphical formats.

  • Shows historical statistics with threshold and alarm.

  • Tells who was connecting to what Internet site.

  • Discovers all local PC hosts in different network segments.

  • Shows host name instead of MAC/IP address in all application windows.

  • Queries DNS to translate remote IP address into Internet site name.

  • Supports Token Ring networks.

  • Distributed LanExplorer for remote monitoring; remote agent sold separately.


VIDEO: What is ColaSoft Packet Builder?

August 28, 2016

Here is a good rundown of what Colasoft’s extremely helpful packet builder software is, the features within, and the options you have as an anaylst with the program. Please be careful as it is really powerful and only should be used by professionals.

Read the full article →

How can the Capsa Network Analyzer help you?

June 16, 2016

In general, Network Protocol Analyzers are there to tell you what is going on in your network. They don’t just give you a bandwidth utilization gauge. They REALLY tell you what that traffic is that is using your network bandwidth and where it is coming from. They tell you if there are errors on the […]

Read the full article →

What is a packet analyzer?

June 11, 2016

A Packet Analyser is a wire-tap device that plugs into computer networks and eavesdrops on the network traffic. Like a telephone wiretap allows the FBI to listen in on other people’s conversations, an “analysing” program lets someone listen in on computer conversations. However, computer conversations consist of apparently random binary data. Therefore, network wiretap programs […]

Read the full article →

VIDEO: Quick Detect of ARP Poisoning, Spoofing, and Flooding

May 16, 2016

Let’s start our first real post off with an informative video from Hackaholic of how to quickly detect ARP Poisoning and ARP Flooding… Note: Please do not attempt to hack unless you are doing it for real purposes. Hacking company software is illegal and punishable by law. Use the video for informative purposes only. Let me know what […]

Read the full article →

Welcome to the new!

May 14, 2016

Welcome to my new blog –! In this blog, I will cover IP Packet Analysis, Step by Step How-To using IP Packet Analysis Tools, and how all this can help you in the real-world. Thank you for following us through our RSS Feed!

Read the full article →