AcunetixInvicti Security 
                        
                        
                        
                        
                     | 
        
        
        
            Spiceworks IP ScannerSpiceworks 
                        
                        
                     | 
        
        |||||
Related Products
  | 
            
            ||||||
                
            
            
            About
            As the market leader in automated web application security testing, Acunetix by Invicti is the go-to security tool for Fortune 500 companies. DevSecOps teams can cut through the noise to uncover unseen risks and mitigate dangerous exploits, detecting and reporting on a wide array of vulnerabilities. With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight into an organization's risk posture. It's a leader for a reason: the technology behind Acunetix delivers the only product on the market that can automatically detect out-of-band vulnerabilities to enable comprehensive management, prioritization, and control for vulnerability threats by criticality. Plus, it's available both online and as an on-prem solution, integrating with popular issue trackers and WAFs so that DevSecOps teams don't have to slow down when building innovative apps.
             
            
        
         | 
        
        
                
            
            
            About
            Discover the devices on your network automatically with the Spiceworks IP Scanner for basic information like OS and MAC Address. Or get detailed hardware and software information on your workstations and servers like CPU, storage, memory, installed software, serial number, and lots more. Get the information you need, with minimal setup! IP Scanner is a cloud tool that scans your local network and returns a sortable list of the devices it discovers. Devices can be filtered, searched, and exported to CSV. By default, it detects and scans a local subnet, though you can also define a custom IP range. The IP Scanner lists each device’s hostname, IP address, vendor, OS, MAC address, description, open ports, and if it’s up or down. The kind of data returned depends on the type of device being scanned.
             
            
        
         | 
        |||||
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        
        
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        |||||
                
            
        
        Audience
        Companies of all sizes that have a website
         
        
    
         | 
        
        
                
            
        
        Audience
        Anyone in need of an advanced IP Scanner solution
         
        
    
         | 
        |||||
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        
        
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        |||||
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        
        
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        |||||
                
            
        
        Screenshots and Videos | 
        
        
                
            
        
        Screenshots and Videos | 
        |||||
                
            
        
        Pricing
        No information available.
        
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        
        
                
            
        
        Pricing
        Free
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        |||||
                
            
        
    
        
Reviews/
        
    
    
         | 
        
        
                
            
        
    
        
Reviews/
         | 
        |||||
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        
        
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        |||||
                
            
        
        Company InformationInvicti Security 
    
    Founded: 2018 
    
    United States 
    acunetix.com 
         | 
        
        
                
            
        
        Company InformationSpiceworks 
    
    Founded: 2006 
    
    United States 
    community.spiceworks.com/tools/ip-scan/ 
         | 
        |||||
                
            
            
    
        
        
        
            Alternatives | 
        
        
                
            
            
    
        
        
        
            Alternatives | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        ||||||
                
            
        
    
        Categories | 
        
        
                
            
        
    
        Categories | 
        |||||
                
            
        
    
        
            
            
                
                    
                
                Application Security Features
            
                Analytics / Reporting
            
            
         
        
    
        
        
            
                Open Source Component Monitoring
            
            
         
        
    
        
        
            
                Source Code Analysis
            
            
         
        
    
        
        
            
                Third-Party Tools Integration
            
            
         
        
    
        
        
            
                Training Resources
            
            
         
        
    
        
        
            
                Vulnerability Detection
            
            
         
        
    
        
        
            
                Vulnerability Remediation
            
            
         
        
    
                    Computer Security Features
            
                Anti Spam
            
            
         
        
    
        
        
            
                Antivirus
            
            
         
        
    
        
        
            
                Audit Trail
            
            
         
        
    
        
        
            
                Compliance Management
            
            
         
        
    
        
        
            
                Database Security Audit
            
            
         
        
    
        
        
            
                File Access Control
            
            
         
        
    
        
        
            
                Financial Data Protection
            
            
         
        
    
        
        
            
                Maintenance Scheduling
            
            
         
        
    
        
        
            
                Real Time Monitoring
            
            
         
        
    
        
        
            
                Security Event Log
            
            
         
        
    
        
        
            
                Virus Definition Update
            
            
         
        
    
        
        
            
                Vulnerability Protection
            
            
         
        
    
                    Cybersecurity Features
            
                AI / Machine Learning
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                IOC Verification
            
            
         
        
    
        
        
            
                Tokenization
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    IT Security Features
            
                Anti Spam
            
            
         
        
    
        
        
            
                Anti Virus
            
            
         
        
    
        
        
            
                Email Attachment Protection
            
            
         
        
    
        
        
            
                Event Tracking
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                IP Protection
            
            
         
        
    
        
        
            
                Spyware Removal
            
            
         
        
    
        
        
            
                Two-Factor Authentication
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Web Traffic Reporting
            
            
         
        
    
                    Network Security Features
            
                Access Control
            
            
         
        
    
        
        
            
                Analytics / Reporting
            
            
         
        
    
        
        
            
                Compliance Reporting
            
            
         
        
    
        
        
            
                Firewalls
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                Threat Response
            
            
         
        
    
        
        
            
                VPN
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
                    Vulnerability Management Features
            
                Asset Discovery
            
            
         
        
    
        
        
            
                Asset Tagging
            
            
         
        
    
        
        
            
                Network Scanning
            
            
         
        
    
        
        
            
                Patch Management
            
            
         
        
    
        
        
            
                Policy Management
            
            
         
        
    
        
        
            
                Prioritization
            
            
         
        
    
        
        
            
                Risk Management
            
            
         
        
    
        
        
            
                Vulnerability Assessment
            
            
         
        
    
        
        
            
                Web Scanning
            
            
         
        
    
                    Vulnerability Scanners Features
            
                Asset Discovery
            
            
         
        
    
        
        
            
                Black Box Scanning
            
            
         
        
    
        
        
            
                Compliance Monitoring
            
            
         
        
    
        
        
            
                Continuous Monitoring
            
            
         
        
    
        
        
            
                Defect Tracking
            
            
         
        
    
        
        
            
                Interactive Scanning
            
            
         
        
    
        
        
            
                Logging and Reporting
            
            
         
        
    
        
        
            
                Network Mapping
            
            
         
        
    
        
        
            
                Perimeter Scanning
            
            
         
        
    
        
        
            
                Risk Analysis
            
            
         
        
    
        
        
            
                Threat Intelligence
            
            
         
        
    
        
        
            
                Web Inspection
            
            
         
        
    
                     | 
        
        ||||||
                
            
        
    
        Integrations
            
                
    ArmorCode
            
            
         
        
    
        
        
            
                
    Axonius
            
            
         
        
    
        
        
            
                
    Bizzy
            
            
         
        
    
        
        
            
                
    Centraleyezer
            
            
         
        
    
        
        
            
                
    CyberArk Workforce Identity
            
            
         
        
    
        
        
            
                
    Enso
            
            
         
        
    
        
        
            
                
    Hexway Pentest Suite
            
            
         
        
    
        
        
            
                
    Imperva CDN
            
            
         
        
    
        
        
            
                
    Imperva DDoS Protection
            
            
         
        
    
        
        
            
                
    Imperva WAF
            
            
         
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
             | 
        
        
                
            
        
    
        Integrations
            
                
    ArmorCode
            
            
         
        
    
        
        
            
                
    Axonius
            
            
         
        
    
        
        
            
                
    Bizzy
            
            
         
        
    
        
        
            
                
    Centraleyezer
            
            
         
        
    
        
        
            
                
    CyberArk Workforce Identity
            
            
         
        
    
        
        
            
                
    Enso
            
            
         
        
    
        
        
            
                
    Hexway Pentest Suite
            
            
         
        
    
        
        
            
                
    Imperva CDN
            
            
         
        
    
        
        
            
                
    Imperva DDoS Protection
            
            
         
        
    
        
        
            
                
    Imperva WAF
            
            
         
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
             | 
        |||||
| 
                
            
        
    
     | 
        
        
                
            
        
    
     |