Whether you are troubleshooting a connectivity issue, hunting for a rogue device, or simply curious about what is connected to your home network, scanning your local network on a Mac is a skill every user should have in their toolkit. Your local network might look simple on the surface — a router, a laptop, maybe a phone — but in reality, most modern home and office networks have dozens of devices connected at any given time. Smart TVs, IoT sensors, game consoles, smart speakers, printers, and even the occasional uninvited guest all share the same subnet.

The problem is that macOS does not ship with a dedicated network scanner. Unlike some Linux distributions that bundle nmap out of the box, Apple expects users to rely on third-party solutions or dig into Terminal. That gap is exactly what this guide fills. We will walk through three distinct methods for scanning your local network on Mac — from raw Terminal commands to built-in system utilities to a full-featured network scanner app — so you can pick the approach that matches your skill level and goals.

Why Scan Your Local Network?

Before we dive into the how, it helps to understand the why. Scanning your local network is not just something security professionals do. Here are the most common reasons everyday Mac users find themselves needing a network scan.

Inventory all connected devices. You would be surprised how many devices are on your network. A quick scan reveals every IP address, hostname, and often the manufacturer of each connected device. This gives you a complete picture of your LAN that the router admin page sometimes fails to provide — especially if you have access points, switches, or mesh nodes creating a more complex topology.

Troubleshoot connectivity problems. When a printer stops responding, a NAS drive disappears, or two devices fight over the same IP address, a network scan tells you exactly what is happening. You can identify IP conflicts (two devices assigned the same address), find devices that dropped off the network, and verify that DHCP is handing out addresses correctly. This is far more efficient than power-cycling every device and hoping for the best.

Detect unauthorized devices. This is the security angle, and it is increasingly important. If a neighbor is leeching your WiFi, or if a compromised IoT device has joined your network, a scan will expose it. Unfamiliar MAC addresses, unknown vendors, or devices with suspicious hostnames are all red flags that warrant investigation. Our guide on how to see who is connected to your WiFi goes deeper into this specific use case.

Find network services and devices. Looking for the IP of your network printer so you can add it manually? Trying to find the address of your Raspberry Pi that grabbed a DHCP lease? Need to verify that your NAS is advertising the correct SMB shares? A network scan answers all of these questions in seconds.

Pre-audit before making changes. Before you reconfigure your router, change your subnet, or set up VLANs, it is essential to know the current state of your network. A baseline scan gives you a snapshot to compare against after the change, ensuring nothing was broken in the process.

Understanding Your Local Network Basics

To scan your local network effectively, you need to understand a few foundational concepts. If you are already comfortable with IP addresses and subnets, feel free to skip ahead to Method 1.

What is a local network? A local area network (LAN) is the group of devices connected to the same router or switch. Every device on your LAN can communicate directly with every other device without packets leaving your home or office. Your LAN is separated from the wider internet by your router, which acts as a gateway between your private network and your ISP.

Private IP address ranges. Devices on your LAN use private IP addresses that are not routable on the public internet. There are three reserved ranges defined by RFC 1918:

Subnet masks and CIDR notation. A subnet mask defines the size of your network. The most common home network uses a /24 subnet (subnet mask 255.255.255.0), which means 256 addresses are available (from .0 to .255). Of those, .0 is the network address, .255 is the broadcast address, and the remaining 254 are usable by devices. When you see a range written as 192.168.1.0/24, the /24 is the CIDR notation indicating the subnet size.

How to find your Mac's IP address. There are two quick methods:

How to find your router (gateway) IP. In Terminal, run netstat -rn | grep default. The IP address in the second column next to the first default entry is your gateway. Alternatively, check System Settings > Network > your connection > Details > TCP/IP. The "Router" field shows your gateway address. Knowing your gateway IP is essential because it defines the base of your network range for scanning.

Method 1 — Terminal Commands (For Power Users)

Terminal is the most flexible approach to scanning your local network on Mac. It requires no software installation (unless you want nmap), and it gives you granular control over exactly what you are doing. The downside is that it demands comfort with the command line and an understanding of what each command actually does.

Using arp -a to View the ARP Table

The simplest way to see devices on your local network is by examining the ARP table. ARP (Address Resolution Protocol) is the mechanism your Mac uses to map IP addresses to MAC (hardware) addresses. Every time your Mac communicates with another device on the LAN, an entry is added to the ARP cache.

Open Terminal and run:

arp -a

You will see output similar to this:

? (192.168.1.1) at aa:bb:cc:dd:ee:01 on en0 ifscope [ethernet]
? (192.168.1.12) at aa:bb:cc:dd:ee:02 on en0 ifscope [ethernet]
? (192.168.1.35) at aa:bb:cc:dd:ee:03 on en0 ifscope [ethernet]
? (192.168.1.100) at aa:bb:cc:dd:ee:04 on en0 ifscope [ethernet]
? (192.168.1.255) at ff:ff:ff:ff:ff:ff on en0 ifscope [ethernet]

Each line shows an IP address, the corresponding MAC address, and the network interface. The ? at the beginning means the hostname could not be resolved. The broadcast address (.255) with ff:ff:ff:ff:ff:ff is normal — that is the layer-2 broadcast.

Important limitation: The ARP table only contains entries for devices your Mac has recently communicated with. If a device is on the network but your Mac has not sent or received any traffic from it, it will not appear. This means arp -a alone gives you an incomplete picture. To get a full view, you need to trigger ARP entries first, which is what the next technique does.

Ping Sweep with a Bash Loop

A ping sweep sends an ICMP echo request to every IP address in your subnet, forcing your Mac to perform ARP resolution for each one. Devices that respond (or even those that do not respond to ICMP but still ARP-reply) will appear in the ARP table afterward.

Here is the classic one-liner. Replace 192.168.1 with your actual subnet prefix:

for i in $(seq 1 254); do
  ping -c 1 -W 100 192.168.1.$i &>/dev/null &
done
wait
arp -a

This command works in three stages. First, it launches 254 parallel ping processes, each sending a single ICMP packet (-c 1) with a 100-millisecond timeout (-W 100) to every address from .1 to .254. The & at the end of each ping sends it to the background so they run concurrently. Second, wait pauses until all 254 pings complete. Third, arp -a dumps the now-populated ARP table.

The entire sweep completes in roughly two to three seconds on a typical home network. You will see many more entries than a bare arp -a because even devices that block ICMP still perform ARP resolution at the layer-2 level before deciding to drop the packet.

Limitation: Some devices have firewalls that block ICMP entirely and may not appear even after a ping sweep. Additionally, this approach tells you nothing about what services those devices are running — you only get IP and MAC addresses.

Using nmap via Homebrew

nmap (Network Mapper) is the gold standard for network scanning. It is not included with macOS, but it is easy to install via Homebrew:

brew install nmap

Once installed, a basic host discovery scan looks like this:

nmap -sn 192.168.1.0/24

The -sn flag tells nmap to perform a ping scan (host discovery only, no port scanning). Output will list every live host with its IP, MAC address, and often the manufacturer based on the MAC OUI prefix:

Nmap scan report for 192.168.1.1
Host is up (0.0024s latency).
MAC Address: AA:BB:CC:DD:EE:01 (Netgear)

Nmap scan report for 192.168.1.12
Host is up (0.015s latency).
MAC Address: AA:BB:CC:DD:EE:02 (Apple)

Nmap scan report for 192.168.1.35
Host is up (0.032s latency).
MAC Address: AA:BB:CC:DD:EE:03 (Samsung Electronics)

If you want to go deeper and scan specific ports, add the -p flag:

nmap -p 22,80,443,8080 192.168.1.0/24

This scans TCP ports 22 (SSH), 80 (HTTP), 443 (HTTPS), and 8080 (HTTP alternate) on every live host. For each port, nmap reports whether it is open, closed, or filtered (blocked by a firewall). You can also enable OS detection with -O or service version detection with -sV, but these require root privileges (sudo) and take significantly longer.

Pros: nmap is incredibly powerful and flexible. It supports dozens of scan types, scriptable output formats (XML, JSON), and a massive library of NSE scripts for vulnerability detection. It is the tool that security professionals reach for first.

Cons: It is command-line only, has a steep learning curve, and provides no real-time monitoring capability. Every scan is a one-time snapshot. You also need to install Homebrew and nmap separately, which some users may find daunting.

Other Useful Terminal Commands

Beyond arp, ping, and nmap, macOS includes several other network diagnostic commands that complement a network scan.

networksetup -listallhardwareports — lists every network interface on your Mac along with its device name and MAC address. Useful for identifying which interface (en0, en1, etc.) corresponds to WiFi versus Ethernet versus Thunderbolt.

networksetup -listallhardwareports

ifconfig en0 — displays detailed configuration for your WiFi interface, including your IP address, subnet mask, broadcast address, and MAC address. Replace en0 with the appropriate interface name from the previous command.

ifconfig en0

netstat -rn — shows your Mac's routing table, which tells you where traffic is being directed. The default route points to your gateway (router), and you can see routes for any VPN tunnels or additional subnets.

netstat -rn

dns-sd -B _services._dns-sd._udp — browses for all Bonjour (mDNS/DNS-SD) services advertised on your local network. This will reveal printers, AirPlay devices, file shares, and other services that devices choose to advertise. Press Ctrl+C to stop the continuous output.

dns-sd -B _services._dns-sd._udp

Each of these commands provides a piece of the puzzle. Combined, they give a reasonably thorough view of your network — but it takes time, knowledge, and multiple Terminal windows to piece everything together.

Method 2 — Built-in macOS Tools

Apple includes a handful of network-related tools in macOS, but none of them qualify as a true local network scanner. Let us examine what is available and where each falls short.

Network Utility (Legacy)

For years, Network Utility was the go-to GUI for basic network diagnostics on macOS. It lived in /Applications/Utilities/ and provided tabs for Netstat, Ping, Lookup (DNS), Traceroute, Whois, Finger, and Port Scan.

Starting with macOS Ventura, Apple officially deprecated Network Utility. On newer macOS versions, you can still access a version of it through System Information: open System Information (via Spotlight or /Applications/Utilities/System Information.app), then go to Window > Network Utility in the menu bar.

The Port Scan feature lets you specify an IP address and an optional port range, then attempts TCP connections to identify open ports. It works, but it is extremely basic:

The Ping and Traceroute tabs are more useful for troubleshooting individual connections, but they do not help with discovering all devices on your network.

System Settings > Network

The Network section of System Settings (formerly System Preferences) shows your own connection details: IP address, subnet mask, router address, DNS servers, and WiFi network name. It is the quickest way to find your own IP and gateway without opening Terminal.

However, it provides zero visibility into other devices on the network. You cannot see who else is connected, what IP addresses are in use, or what services are running. It is a self-diagnostic tool, not a network scanner.

Wireless Diagnostics

macOS includes a hidden wireless diagnostic tool that you can access by holding the Option key and clicking the WiFi icon in the menu bar. The dropdown reveals additional information: BSSID (your access point's MAC), channel, RSSI (signal strength), noise level, transmit rate, and security type.

Selecting "Open Wireless Diagnostics..." launches a utility that can capture WiFi frames, run diagnostic tests, and generate reports. You can also use the Terminal command:

sudo wdutil diagnose

This creates a detailed diagnostic archive in /var/tmp/ containing WiFi logs, network configuration, and signal information. It is excellent for troubleshooting WiFi connectivity and performance issues — slow speeds, intermittent drops, channel congestion — but it is not a device discovery tool. It tells you about your WiFi environment (channels, signal quality) rather than the devices on your network.

The Reality: macOS Has No Built-in Network Scanner

Here is the honest summary. Unlike Windows, which provides at least some basic network discovery through net view, File Explorer's "Network" section, and the legacy Network Map feature, macOS provides no native way to discover and list all devices on your local network.

Apple's philosophy prioritizes privacy and simplicity. Network scanning is seen as a power-user or IT-professional task, so Apple leaves it to Terminal commands and third-party applications. This is a perfectly reasonable design choice, but it means that when you need a network scan, you need to look beyond what macOS provides out of the box.

That gap is precisely why third-party IP scanner applications for Mac exist. They package the capabilities of Terminal tools like arp, ping, and nmap into visual interfaces with additional intelligence on top — vendor identification, device classification, security analysis, and ongoing monitoring.

Method 3 — Paranoid (Pro Network Scanner App)

If Terminal commands feel like too much work and built-in macOS tools are not enough, a dedicated network scanner app is the answer. Paranoid is a native macOS network scanner built entirely with Apple frameworks — no external dependencies, no Homebrew, no configuration files. It combines the power of every Terminal technique we covered above into a single-click workflow, then adds layers of intelligence that Terminal simply cannot match.

Why a Dedicated Scanner App?

The fundamental advantage of a dedicated scanner app is integration. Each Terminal command we discussed earlier gives you one piece of information: arp -a gives you MAC addresses, a ping sweep gives you live hosts, nmap gives you ports and services. A dedicated app runs all of these discovery mechanisms simultaneously, cross-references the results, and presents a unified view.

Beyond integration, a purpose-built scanner adds capabilities that are impractical to achieve with command-line tools alone. Vendor identification requires maintaining and querying the IEEE OUI database. OS fingerprinting requires analyzing subtle differences in TCP/IP stack behavior. Real-time monitoring requires continuous background scanning with intelligent change detection. These are not things you want to script in Bash.

Getting Started with Paranoid

Setting up Paranoid takes less than a minute:

  1. Download from getparanoid.app. The DMG is a native macOS universal binary that runs on both Apple Silicon and Intel Macs.
  2. Launch the app. Paranoid auto-detects your active network interface (WiFi or Ethernet) and displays your subnet information.
  3. Click "Start Scan." The scan begins immediately, discovering devices within seconds.
  4. Review results. Each discovered device shows its IP address, hostname, MAC address, vendor name, device type classification, latency, and open ports — all in a clean, sortable table.

There is no Homebrew installation, no Terminal commands, and no configuration required. The app works with both WiFi and Ethernet connections and supports multiple network interfaces simultaneously.

What Paranoid Finds That Terminal Cannot

While Terminal commands cover the basics, Paranoid goes significantly deeper:

Devices with no open TCP ports. Many IoT devices, smartphones, and smart TVs do not have any TCP ports open. A standard nmap -sn scan may miss them if they also block ICMP. Paranoid uses a multi-phase discovery process with ARP prepopulation that ensures every device on the subnet is found, regardless of its firewall configuration. The app sends targeted ARP requests to every IP before performing TCP probes, catching devices that would be invisible to port-based scanning alone.

Device manufacturer and model identification. The raw MAC address (aa:bb:cc:dd:ee:ff) means nothing to most users. Paranoid cross-references the MAC OUI prefix against the IEEE database to identify the manufacturer (Apple, Samsung, TP-Link, etc.), and integrates with the Fingerbank API to identify specific device models. Instead of seeing a cryptic MAC address, you see "iPhone 15 Pro" or "Samsung Galaxy S24."

Operating system fingerprinting. Paranoid analyzes multiple network signals — TCP window size, TTL values, port response patterns, and DNS behavior — to determine what operating system each device is running. This is similar to nmap's -O flag but runs automatically on every device without requiring root privileges.

Service version detection on open ports. When Paranoid finds an open port, it does not just report "port 80 is open." It sends protocol-specific probes (using nmap's service probe database) to identify the exact software and version running on that port. You might see "nginx 1.25.4" on port 80 or "OpenSSH 9.6" on port 22.

CVE vulnerability lookup. Once Paranoid knows the service name and version, it checks against a local CVE database to flag known vulnerabilities. If your router is running an outdated firmware version with a known exploit, Paranoid will tell you. This is a level of security auditing that requires significant effort to replicate manually.

Network topology and routing information. Paranoid maps the relationships between devices, identifies the gateway, and can perform traceroute analysis to understand how traffic flows through your network.

🔍
Scan your local network in one click

Paranoid combines Terminal power with a visual interface. No commands to memorize, no setup required.

Download Free Trial

Beyond Discovery: Security Features

Paranoid is not just a scanner — it is a full network security suite. Here are the features that go well beyond what any Terminal command can offer:

WiFi Guard. Monitors your WiFi connection for ARP spoofing attacks (man-in-the-middle), evil twin access points (fake WiFi networks impersonating yours), and gateway anomalies. If someone on your network is intercepting traffic, WiFi Guard detects and alerts you.

Network Monitor. Runs continuous background scans at configurable intervals, tracking which devices appear and disappear over time. When a new, unknown device joins your network, you receive an alert immediately. This is the difference between a one-time snapshot and ongoing surveillance of your network.

Honeypot Mode. Deploys lightweight decoy services on your Mac that look like real network targets. If an attacker or compromised device on your network tries to probe these fake services, Paranoid logs the attempt and can automatically block the offending IP. This is an active defense mechanism that no Terminal command can replicate.

Bluetooth Guard. Scans for BLE (Bluetooth Low Energy) trackers in your vicinity — AirTags, SmartTags, Tile trackers — and alerts you if an unknown tracker appears to be following you. While not a network scan per se, it is a critical privacy feature that integrates with the overall security picture.

Hidden camera detection. Analyzes devices on the network for signatures commonly associated with hidden cameras and IoT surveillance devices. By examining open ports, service banners, and manufacturer data, Paranoid can flag suspicious devices that may be streaming video covertly.

Export capabilities. Paranoid exports scan results in multiple formats: CSV for spreadsheets, JSON for automation and scripts, nmap-compatible XML, and full HTML reports with interactive charts, sortable tables, and print-ready layouts. This makes it easy to document your network for compliance, share findings with colleagues, or feed data into other tools.

Comparison Table — Terminal vs Built-in vs Paranoid

Here is a side-by-side comparison of the three methods across every important capability. This should help you decide which approach (or combination of approaches) is right for your use case.

Feature Terminal Commands macOS Built-in Paranoid
Device Discovery Manual Automatic
Port Scanning nmap ~ Basic Full
Vendor Identification
OS Fingerprinting ~ nmap -O
Service Detection ~ nmap -sV
Vulnerability Scan
Real-time Monitoring
WiFi Security
Graphical Interface ~
Learning Curve High Low Low
Price Free Free €49.90

A few notes on the table. Terminal commands score well on raw capability — but only if you install nmap and know how to use it. The "partial" ratings for nmap features reflect the fact that OS fingerprinting (-O) and service detection (-sV) require sudo and significant nmap expertise to interpret correctly. The macOS built-in tools score "partial" for port scanning only because the legacy Network Utility has a basic port scanner — which Apple has deprecated.

Paranoid fills every gap at a one-time cost of €49.90. For anyone who scans their network more than occasionally, the time savings and security insights pay for themselves quickly.

Which Method Should You Use?

The right method depends on your technical background, your goals, and how often you need to scan. Here is a decision guide for four common profiles.

Complete beginner — Start with Method 3 (Paranoid). If you have never opened Terminal and the words "ARP table" mean nothing to you, a graphical scanner is the right starting point. Paranoid does everything automatically: detects your network, scans every device, identifies manufacturers, flags security issues. You get a complete picture of your network without memorizing a single command. As you grow more comfortable, you can explore Terminal commands at your own pace.

Terminal-comfortable user — Use Method 1 for quick checks, Method 3 for depth. If you are comfortable with ping, arp, and basic shell scripting, Terminal is a great tool for fast, ad-hoc checks. Need to quickly see if a device is online? ping it. Want to see all active devices? Run a ping sweep. But when you need deeper analysis — vendor identification, vulnerability scanning, continuous monitoring — switch to Paranoid. The two approaches complement each other perfectly.

Security professional or IT admin — Combine nmap with Paranoid. For professionals, nmap remains indispensable for custom scan types, scripted audits, and integration with other security tools like Metasploit. Paranoid adds continuous monitoring and automated vulnerability assessment that nmap cannot provide on its own. Use nmap for targeted, deep-dive scans and Paranoid for ongoing network surveillance and rapid device identification.

You just need your own IP or gateway — Method 2 is enough. If all you need is to find your own IP address, check your DNS settings, or identify your router's address, System Settings > Network has you covered in two clicks. No need to open Terminal or install anything.

Common Network Scanning Questions

Here are answers to the questions we see most often from Mac users who are new to network scanning.

Is scanning my own network legal?

Yes. Scanning your own local network — the one you own or have authorization to administer — is completely legal in virtually every jurisdiction. You are examining devices and services on hardware you own, connected to an internet service you pay for. This is no different from logging into your router's admin panel to see connected devices. The legality changes if you scan networks you do not own or do not have permission to test, so always limit scanning to your own infrastructure.

Will scanning crash my network or disrupt devices?

No. Modern network scanning tools, including the Terminal commands and Paranoid, use lightweight probes that generate negligible traffic. A full /24 subnet scan (254 hosts) produces less traffic than loading a single webpage. The ARP requests and TCP SYN packets used during discovery are the same packets that your devices exchange naturally during normal operation. Even the most aggressive scan profile will not saturate a modern home network. The only scenario where scanning could cause issues is on very old, resource-constrained embedded devices (like vintage IoT gear) — and even then, it is extremely unlikely.

Can I scan from WiFi only, or does Ethernet work too?

Both work. Your Mac can scan the local network regardless of whether it is connected via WiFi or Ethernet. The scanning techniques (ARP, TCP, ICMP) operate at the IP layer and do not depend on the physical connection type. That said, an Ethernet connection will typically produce faster and more reliable scan results because it has lower latency and no WiFi interference. If you use both WiFi and Ethernet simultaneously (dual-homed), you may be connected to different subnets and will need to scan each one separately.

How often should I scan my network?

Regularly, or better yet, continuously. A one-time scan gives you a snapshot, but networks are dynamic. Devices join and leave throughout the day. A new smart bulb added by a family member, a guest's phone connecting to WiFi, or an attacker probing your network at 3 AM — all of these happen between manual scans. Ideally, you should use a tool with continuous monitoring that runs periodic scans in the background and alerts you when something new appears. Paranoid's Network Monitor does exactly this, running scans at configurable intervals (every 5 minutes, 15 minutes, etc.) and notifying you when unknown devices are detected.

What if I find unknown devices on my network?

Do not panic, but do investigate. First, check the device's MAC address vendor — if it says "Apple" or "Samsung," it is likely a family member's phone or tablet you forgot about. Check the hostname; many devices identify themselves (e.g., "Johns-iPhone" or "Living-Room-Chromecast"). If you truly cannot identify a device, consider changing your WiFi password and monitoring to see if it reappears. Our guide on how to see who is connected to your WiFi and block intruders provides a detailed step-by-step process for handling unknown devices.

Do I need administrator (root) privileges to scan?

For basic scanning, no. The arp -a command, ping sweeps, and standard TCP connection scans work without sudo. However, some advanced nmap features — SYN scans (-sS), OS detection (-O), and raw packet operations — require root privileges. Paranoid is designed to work entirely without admin access by using TCP connect scans and userspace ARP parsing instead of raw sockets. This means you get comprehensive results without ever typing sudo.

What about scanning IPv6 devices?

IPv6 scanning is fundamentally different from IPv4 because the address space is astronomically larger — you cannot simply sweep every address. On a local network, IPv6 devices are typically discovered through Neighbor Discovery Protocol (NDP) rather than ARP. The command ndp -an on macOS shows the IPv6 neighbor cache, similar to arp -a for IPv4. For most home networks, IPv4 scanning is sufficient because the vast majority of local traffic still uses IPv4 addressing.


Scanning your local network on Mac does not have to be complicated. Whether you prefer the granular control of Terminal commands, the convenience of built-in system tools for basic checks, or the comprehensive power of a dedicated scanner app, there is a method that fits your needs. The important thing is that you do scan regularly. Your network is only as secure as your visibility into it, and you cannot protect what you cannot see.

For most Mac users, the fastest path from "I have no idea what is on my network" to "I can see and secure every device" is a one-click scan with a purpose-built tool. Terminal will always be there when you need it, but life is too short to parse arp -a output every morning.

See your entire network in seconds

Download Paranoid and discover every device, service, and vulnerability on your local network. Native macOS, no dependencies.