IP Scanners for Video Surveillance

Author: Ethan Ace, Published on Feb 15, 2016

IP scanners, tools like Advanced IP ScannerAngry IP Scanner and Fing, can be useful for setting up and managing video surveillance systems. In this tutorial, we explain their uses, limitations, comparisons to vendor specific ones and conclude with videos showing operation of Advanced IP Scanner and Fing.

IP Scanner Basics

While exact features vary, IP scanners have three common functions:

  • Up/down status: The scanner sends a ping to each IP address in the specified range to see if it is up or down, the most basic indication of whether or not a device is available.
  • Basic port scanning: Common ports are scanned to see if services are running, such as web servers, FTP, RTSP, SSH, etc. Note that this scanning is generally not configurable, nor is it as detailed as a dedicated port scanner, such as NMAP.
  • Hostname/MAC lookup: Basic identification of devices is performed by checking the hostname of each if available, and looking up the MAC OUI to identify manufacturer. In many cases, this will identify the camera/server/NVR name and the brand.

Using these three functions, users gain three key benefits:

** ********, ***** **** ******** ** ************ ** **************, *** ** ****** *** ******* ** *** ******** ***** surveillance *******. ** **** ********, ** ******* ***** ****, ***********, comparisons ** ****** ******** **** *** ******** **** ****** ******* operation ** ******** ** ******* *** ****.

IP ******* ******

***** ***** ******** ****, ** ******** **** ***** ****** *********:

  • **/**** ******:*** ******* ***** * **** ** **** ** ******* ** the ********* ***** ** *** ** ** ** ** ** down, *** **** ***** ********** ** ******* ** *** * device ** *********.
  • ***** **** ********:****** ***** *** ******* ** *** ** ******** *** *******, such ** *** *******, ***, ****, ***, ***. **** **** this ******** ** ********* *** ************, *** ** ** ** detailed ** * ********* **** *******, **** ******.
  • ********/*** ******: ***** ************** ** ******* ** ********* ** ******** *** ******** of **** ** *********, *** ******* ** *** *** *** to ******** ************. ** **** *****, **** **** ******** *** camera/server/NVR **** *** *** *****.

***** ***** ***** *********, ***** **** ***** *** ********:

[***************]

****** ******* *********

************, ** ******** **** ****** ******** ****** ******, ****** ************-******** tools, **** ** ****' ** ******* ** ********* ****. **** is ********** ******* ** *** *** ***** ******** ****** ** cameras, ** **** *** **** *** ** ****, ******* ** multiple.

*******, ** ********** ************* ** ******** ** *******, ******** ********, ** ***** ************* may ** ********* *** *** *******. ********** **** *** *** device's *** ********* ** ******* ***** *****

***** ******* *************

**** ****** **** ** *********** ** ******** *******, ** ** address ** ***** ****** *********** *** ** ******* ********* ** all. ******* ** ** **** ** *** ************ ******* ****** users * ****** ***** ** ***** *** ********* *******, ******* IP *** *** *********, ************ (***** ** ***), *** ****** name (**** ********* *** *********). **** ***** ****** ** **** information, ** ****, ** * *********** ** ***** ********.

******* ********

** ******** **** ***** * ****** ******** ** *** ******* on *** *******, ****** ** ** *******. **** ****** ************** to ************ ***** ** *** ** *** ************/********** ******* *** on ***** *******, **** ** ******* ********** *** **** ******** access ******, *** *******. 

**** **** **** ******** **** *** ******* *** **** ** monitoring/alerting. ***** ********* ********* ************** **********/**** ********.

Desktop ****

***** *** *** ****** ** **** ** ******** ********* *********.******** ** *******(******* ****) *** ***** ** ******* (*******/*** **/*****) *** **** popular, *** ****** *** ********* *** ******* *********, ** ****.

**** ***** *** ******** ** ******** **** *********. *******, ******** ** Scanner ***** ******** **** *********** *** *********, **** ******* *** MAC ************ (***** ** ***) *** ***** ** ******* ******** such ** ******* ******, *** *****, ***, ***., *** ***** in *****.

**** ***** ******* *** ********* ** ******** ** *******:

Mobile ****

**** ****** **** ***** ** ******** ** ****, **** ******* the **** ******* *********. **** ********* ********* ** ******* *********, ****** ******** **** to *******. 

** ********, **** ****** **** ******** ** *******, ********* **** surveillance ******** ***** (**, ***) *** ****** ***** ** *** specific ***** ***** *** *** ** ********. **** **** ******** is *** ** ******** *** ** ************ ** * ******* utility **** ** ****, *** *** ** ****** ** *************** basic ****** ** *********** *******.

**** ***** ***** ***** *** ** ****:

Postscript: Manufacturer ********* *****

*** ********* ** ***** ************ ******** ********* ***** ** **** they ******* **** *************, ************ ******** ***** ** ****** ** addresses ** *** ** **** ******* ******** **** *** ****, instead ** ****** ** *** *** *** ********* ** *** camera. **** ****** ************, ********** ** ****** ************, *** ** a ********** ****** ***** ** ******* ***** *** *****.

************, ************ ***** *** ******** ******* ***** *** *** ** the **** ** ****** ** *** *******, ***** **** ******* tools **** **** **** ***** ** *** **** *******.

** **** ***** (**** ***** ******* ***** ***** *** ************) ** **** ***** ********* ************ ***** (****, *****, *** ****) and **** *** ** ******** *** ******* ******* ** ****:

Comments (3)

* *** **** **** **** ** ** ******. **** ***** discovery ****. ****.

"************, ************ ***** *** ******** ******* ***** *** *** ** the **** ** ****** ** *** *******, ***** **** ******* tools **** **** **** ***** ** *** **** *******."

*** ***** ** * **** ********* ********* ***** ********* *** needs ** ******** *** **** **** **** *** ************* ** the *****.

** ****** *** *** *** *** **** ********* ***** ** it ** * *** ***** *** *** ******* **** *** get **** ********** ** * **** ** ****.

* *** "****&***" **** *** *******, *** **** ** ** apple ******* *****.

*** ** *** **** ******** ****** ****. **** * ****** is ********* ** *** ******* "*** *****" *** * **** to **** **** **** ** *** * **** *** *** IP ******* *** ** **** ***** *** *** *****, **** useful ** *** **** ** **** **** **** *** ****** has.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Selling and Valuing Security Integrators on May 12, 2017
This ia a tutorial in how to (1) determine your security integrator's value and (2) to sell your security integrator. If you own an integrator,...
Duress Codes For Alarms Systems on May 02, 2017
An alarm system can call for help in the event of an attempted break in, but only if it is armed. If an adversary forces an authorized user to...
Last Day - IP Networking Course May 2017 on Apr 26, 2017
Today is the last day to register for the May IP Networking Course. This is the only networking course designed specifically for video...
IPVM First Dean's List W2017 - Thomas Atkinson, Matt Hurly and Fredrik Lundqvist on Apr 24, 2017
IPVM is happy to congratulate and celebrate our first "Dean's List", the top students in our courses. For the Winter 2017 IP Networking course...
Burglar Alarm Strobes Guide on Mar 31, 2017
Strobes provide visual notification of alarm incidents, as sirens are used to give audible notification. Using a strobe gives alarm users and alarm...
Cap Connector "You Can't Screw Up" Profile on Mar 31, 2017
One company, CaP Connectors, is marketing their coax connectors as “The 30-second Connector You Can’t Screw Up”, by claiming to combine the best...
DDNS vs P2P vs VPN Usage Statistics on Mar 30, 2017
Cyber security concerns are escalating, even in the video surveillance industry which has historically lagged in its attention here. A key...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Glass Break Sensor Tutorial on Mar 21, 2017
Burglars often break glass windows to get into a house. Using glass break detectors in conjunction with alarm contacts is a good way to protect the...

Most Recent Industry Reports

Axis Criticizes OEMs: "When You Buy An Axis Camera, An Axis Camera Is What You Get!" on May 19, 2017
When you buy a Honeywell camera, you likely get a Hikvision, Dahua or some other company's product. The same goes for easily 100 different...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Forget The Backdoor, "ALL HIKVISION PRODUCTS" On Sale on May 18, 2017
Less than 2 weeks after the Hikvision Backdoor was confirmed, Hikvision has launched a sale "ON ALL HIKVISION PRODUCTS". In this note, we examine...
Amazon Techs Installing IP Cameras Tested on May 18, 2017
In 2015, Amazon started offering video surveillance installation. Now, Amazon has made it a lot easier, with automatic add-on options and...
Hanwha Recorder Vulnerability Analyzed on May 18, 2017
ICS-CERT has released a vulnerability notice for Hanwha SRN-4000 recorders.  Hanwha provided additional information to IPVM about this issue,...
ShotSpotter To IPO, Facing Low Revenue and Losses on May 17, 2017
A rare event for North American security manufacturers is upcoming. ShotSpotter is planning to IPO on the NASDAQ, aiming to raise $34.5...
DMP Video Doorbell / Access Reader Examined on May 17, 2017
Consumers increasingly demand video doorbells, with "doorbells selling like hotcakes, everyone wants a doorbell", according to ADT's CEO. At ISC...
FLIR Is Giving Away $3,000 Demo Kits on May 17, 2017
Everybody likes free stuff, and FLIR is using that concept to attract dealers by giving them $3,000 worth of demo gear for attending a...
Shark Tank Startup Guard Llama Mobile Panic Tested on May 16, 2017
A Shark Tank TV show appearance has attracted big attention for Guard Llama, a security startup touting a 'panic button' paired with mobile app...
Axis Beats Avigilon Growth Rate (AVO Q1 2017) on May 16, 2017
In what is likely the first time ever, Axis beat Avigilon's revenue growth for Q1 2017. Inside this note, we examine Avigilon's Q1 2017 financial...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact