Have you noticed a rapid drain in your Network data. You feel like some “unseen spirits” are using your data with you? You don’t have to be shocked as the advancement in technology has given. So many snoopers the access to tap into people’s local networks. Connect to it and sometimes not only use up their data. But gain access to personal files. This has, however, called for urgent action, you need to know how to detect these ports and take necessary measures to prevent future occurrences.
In this article, I am going to take you through a step-by-step method by which you can scan your network for open ports and devices using it.
Let Us Do some Deep Scanning
When you start doing this scan, you will be able to see whether your remote desktop is enabled or an HTTP/FTP is running, or whether you are unintentionally sharing files or data with another network
You will find several windows system scanners online. However, I will suggest this free tool you can use on your Windows – SoftPerfect Network Scanner. This program runs on a 64-bit and 32-bit security system; it will also not ask for any form of installation so you can save it on your USB cable, or save it on Dropbox for future use on other PCs.
Now here are some steps you need to follow to run a scan on your local network:
First, to prevent your window firewall from denying your SoftPerfect scanner. You need to check the Private network option when you see the windows security alert. This is to know if you have a 64-bit or 32-bit security system on your windows.
Next step is to enter the IP Address range. But if you don’t know this, you can quickly click under, “program options – IP Address” the “Auto Detect Local IP Range.
You will then see a popup that will show the list of all the IPV6 and IPv4 that have access to your local network. Note that, unless you have the IPv6 setup, you will only be able to access those in the IPv4.
After clicking on the list, you will redirect to another window where you will see a “start scanning” icon. But before you start scanning, ensure you choose your scanning option. Which I will advise you to click on the “Always analyze device” option.
This scan usually takes a while, so try to be patient. If you wish to see all the devices on your network.
After all these networks are displayed, you can then check whether there has been transferring of files, usage of data, etc. Note that the Additional and the Workstation tabs are for advanced network stations.
It is good to safeguard your network system from fraudsters, and this article has shown you a simple way to detect unsolicited network ports even in some advanced situations.
Linux/Windows System and SQL Server Database Administrator with more than 4.5 years of experience in Linux Servers administration, Windows Administration, Network Administration, SQL Server Administration, MySQL Administration and SQL Programming.