Description
✨ Key Features
- 🔎 Network Device Discovery: Scan the LAN (ARP / ICMP / mDNS) to list connected devices with IP, MAC address, hostname and vendor (OUI lookup).
- 📡 WiFi Signal & Channel Analysis: Show SSID, BSSID, RSSI, channel, security type (WPA2/WPA3), and recommend less-congested channels.
- 🧭 Port Scanning & Service Detection: Basic TCP/UDP port scan to detect open services (HTTP, SSH, SMB) for quick diagnostics.
- 🚨 Rogue Device Alerting: Flag unknown or new devices, optional email / webhook notifications for suspicious joins.
- 📈 History & Reporting: Maintain scan history, export CSV/PDF reports for audits and client reporting.
- 🛠 Network Tools Collection: Ping, traceroute, DNS lookup, WHOIS, Wake-on-LAN and basic bandwidth check utilities.
- 🔐 Access Control Insights: Suggest weak wifi settings, highlight open networks and insecure protocols to improve security posture.
- ⚙️ API & Integration: REST API or webhook endpoints for integrating scans into dashboards, RMM tools or monitoring systems (where included).
- 🎨 UI / CLI Options: Web dashboard (PHP/Node) + mobile-friendly pages, and optional command-line utilities for automation.
⚙️ Technical Stack
- Core Languages: PHP / Node.js for web backend helpers; optional Python scripts (scapy, nmap wrappers) for advanced scanning.
- Frontend: HTML5, Bootstrap/Tailwind, JavaScript (Vue/React optional) for dashboard and interactive reports.
- System Tools / Libraries: nmap (optional), arp/arp-scan, ping, traceroute, tcpdump (read only), libpcap wrappers for packet inspection where permitted.
- Database: SQLite / MySQL / PostgreSQL for storing scans and device history.
- API: REST endpoints (JSON) for scan control, results retrieval, and webhook notifications.
- Server Requirements: Linux VPS or compatible hosting for server components; local LAN access required for accurate device discovery. For mobile versions, Android/iOS apps or PWAs that query a local agent/back-end.
🧩 Installation Guide
- Choose deployment model: Local agent (runs on a machine inside the LAN) or server-side installation on a host with network access.
- Install prerequisites: Ensure
php/node/pythonruntimes as required, plus native tools likenmaporarp-scanif included. - Deploy files: Upload web dashboard to your server (e.g.,
/var/www/wifiscanner) or place scripts on the agent host. - Configure: Edit config (API keys, admin user, scan ranges, notification settings) and set allowed network interface(s).
- Set permissions & cron: Secure files, create cron jobs for scheduled scans & reporting (e.g., daily scan, hourly check for new devices).
- Run initial scan: Perform first scan to populate device inventory; verify results, tune scan ranges and timeouts.
- Integrate: Hook webhooks, add to monitoring dashboards, or enable email alerts as needed.
📦 Deliverables
- ✅ Web dashboard source (HTML/CSS/JS + backend helpers).
- ✅ Local agent scripts (PHP/Node/Python) for in-LAN scanning.
- ✅ Example cron jobs, systemd unit files, and automation scripts.
- ✅ API documentation and sample integration snippets (cURL / JavaScript).
- ✅ README, quick-start guide, and troubleshooting checklist.
- ✅ Licensing file (GPL or vendor-specified) and audit/export templates (CSV/PDF).
📱 Supported Platforms
- Linux (recommended): Best for server/agent deployment (Ubuntu, Debian, CentOS).
- Windows / macOS: Agent scripts may run with proper toolset (PowerShell / brew / WSL) but Linux is preferred for packet/ARP tools.
- Mobile: PWA or native wrappers for Android/iOS to view dashboard—active scanning requires a local agent on the same LAN.
- Hosting: VPS with private network access or an on-premise server that can see the target subnets. Cloud hosts without LAN access will report less accurate device lists.
🧠 Notes
Experience & Use Cases: This tool is based on widely used network discovery patterns and is valuable for home users checking for unknown guests, MSPs auditing client networks, and administrators generating device inventories. Real-world deployments commonly combine periodic ARP scans with occasional deeper nmap scans for service discovery.
Security & Legal: Network scanning can be intrusive. Only scan networks you own or are explicitly authorized to test. Do not use these tools to probe third-party or public networks without consent. Logs may contain sensitive device metadata—store and transmit results securely.
Customization Tips:
- Use OUI vendor lookups to label manufacturer names for MAC addresses for quicker identification.
- Whitelist known devices (static IPs, DHCP reservations) to reduce false positives and alert fatigue.
- Integrate with RMM or ticketing systems to create automatic remediation tickets for suspicious devices.
- Use lightweight agents on Raspberry Pi devices for continuous on-site scanning in remote offices.
Performance & Accuracy: ARP and mDNS scans are fast and accurate for local networks; active port scans are slower and more intrusive. Tune concurrency/timeouts for large networks to avoid false negatives or network disruption.
SEO Assurance: This description is structured with semantic HTML and includes target keywords such as “WiFi scanner”, “who uses my WiFi”, “net scanner wifi detector”, “network device discovery script”, and “WiFi rogue device alert” to help listings on GPL/script directories and technical marketplaces. It balances practical guidance (Experience), implementation detail (Expertise), source attribution (Authority), and clear licensing/security guidance (Trust).
👨💻 Original Developer Credit
The various names used for this product (e.g., Who Use My WiFi, WiFi Man, Net ScannerWiFi Detector) indicate multiple marketplace variants and authors. All code, UI and core algorithms are originally created by their respective developers — please consult your package’s marketplace listing for the specific author and support channel. If you use the code commercially, support the original author by obtaining the legitimate licensed copy.
🔒 Disclaimer
Transparency Notice: This description is for informational, educational and resource-listing uses. We do not claim ownership of any third-party product or marketplace listing. Network scanning can expose personal data and has legal/ethical implications—always obtain authorization before scanning networks you do not own. Check the package license (GPL or vendor license) and third-party tool licenses (nmap, libpcap) before redistribution or commercial use.

Haunted Halloween Deal Enjoy Unlimited Downloads!
Reviews
There are no reviews yet.