Discover All Devices Including Those Behind Firewalls With Fing

Advertisement

Remember Look@Lan? Users criticized it as a bloated monitoring software that wouldn’t work. For some it was a life-saver, as it happens to monitor everything happening over the network. The app is long dead and born from it’s ashes comes a whole new network discovery tool called Fing.

Fing is, as of now, only a command-line tool, the GUI is coming soon according to the developer. It is faster and smarter than Look@Lan and aims to become an ultimate network discovery application. It can detect all devices, both wireless and wired, including those which are behind the firewalls.

Run Fing executable and you will see the command line window as shown in the screenshot below.

Fing

Hit D to Discover networks, S to Scan networks, P to Ping, or I to Display Information. You will be asked a bunch of questions before the process starts.

Fing main

Fing Discovery

The result are not shown in command-line tool, rather they are saved as output in Log or Table, in Text or CSV format depending on the user. While testing we were impressed to find out the information contained in the output file, it did indeed manage to find out all devices over the network.

The app is not exclusive to Windows, versions for Linux and Mac are also available. According to the developer, it works seamlessly on both Windows 7 and Mac OS X Snow Leopard.

Download Fing

Advertisement
  • Niels C

    Coming soon? Yeah, right. That was in March, the tool is still command line only.

  • mrethiopian

    got it, playing with it kinda limited and info not so verbose . .
    Command line options: -v [ –version ] show fing version -i [ –info ] show network informations -n [ –netdiscover ] arg run network discovery -s [ –servicescan ] arg run service scan on host/network -o [ –output ] arg use output setup for discovery/scan/ping -P [ –profile ] arg use specific discovery/scan/ping profile -d [ –rdns ] arg enable/disable reverse DNS lookups -r [ –rounds ] arg number of rounds (network discovery) –session arg use specific discovery session file –silent force to silent mode –interactive start the interactive mode -p [ –ping ] arg run icmp ping on the hosts –installservice arg install fing as service with provided name –uninstallservice arg uninstall provided fing service

  • Guest

    Coming soon?!? Its been four years.