: Includes features to minimize the chance of triggering intrusion detection systems during reconnaissance.
: Launch the .exe file (Administrator privileges may be required for certain deep scans).
: Uses multi-threading to probe a wide range of ports in seconds.
: Input the IP address or range you wish to scan.
Share your favourite memories with Sting and read other fans’ stories here.
Share your memorySorry, there was a problem uploading your memory - please try again later.
This entry has been added to the moderation queue and will appear on the site once approved.