network-scannerScan networks to discover devices, gather MAC addresses, vendors, and hostnames. Includes safety checks to prevent accidental scanning of public networks.
Install via ClawdBot CLI:
clawdbot install florianbeer/network-scannerDiscover and identify devices on local or remote networks using nmap. Gathers IP addresses, hostnames (via reverse DNS), MAC addresses, and vendor identification.
Safety First: Includes built-in protection against accidentally scanning public IP ranges or networks without proper private routing ā preventing abuse reports from hosting providers.
nmap - Network scanning (apt install nmap or brew install nmap)dig - DNS lookups (usually pre-installed)sudo access recommended for MAC address discovery# Auto-detect and scan current network
python3 scripts/scan.py
# Scan a specific CIDR
python3 scripts/scan.py 192.168.1.0/24
# Scan with custom DNS server for reverse lookups
python3 scripts/scan.py 192.168.1.0/24 --dns 192.168.1.1
# Output as JSON
python3 scripts/scan.py --json
Configure named networks in ~/.config/network-scanner/networks.json:
{
"networks": {
"home": {
"cidr": "192.168.1.0/24",
"dns": "192.168.1.1",
"description": "Home Network"
},
"office": {
"cidr": "10.0.0.0/24",
"dns": "10.0.0.1",
"description": "Office Network"
}
},
"blocklist": [
{
"cidr": "10.99.0.0/24",
"reason": "No private route from this host"
}
]
}
Then scan by name:
python3 scripts/scan.py home
python3 scripts/scan.py office --json
The scanner includes multiple safety checks to prevent accidental abuse:
blocklist config array are always blockedTrusted networks (configured in networks.json) skip route verification since you've explicitly approved them.
# Blocked - public IP range
$ python3 scripts/scan.py 8.8.8.0/24
ā BLOCKED: Target 8.8.8.0/24 is a PUBLIC IP range
# Blocked - in blocklist
$ python3 scripts/scan.py 10.99.0.0/24
ā BLOCKED: 10.99.0.0/24 is blocklisted
# Allowed - configured trusted network
$ python3 scripts/scan.py home
ā Scanning 192.168.1.0/24...
# Create example config
python3 scripts/scan.py --init-config
# List configured networks
python3 scripts/scan.py --list
# Scan without sudo (may miss MAC addresses)
python3 scripts/scan.py home --no-sudo
Markdown (default):
### Home Network
*Last scan: 2026-01-28 00:10*
| IP | Name | MAC | Vendor |
|----|------|-----|--------|
| 192.168.1.1 | router.local | AA:BB:CC:DD:EE:FF | Ubiquiti |
| 192.168.1.100 | nas.local | 11:22:33:44:55:66 | Synology |
*2 devices found*
JSON (--json):
{
"network": "Home Network",
"cidr": "192.168.1.0/24",
"devices": [
{
"ip": "192.168.1.1",
"hostname": "router.local",
"mac": "AA:BB:CC:DD:EE:FF",
"vendor": "Ubiquiti"
}
],
"scanned_at": "2026-01-28T00:10:00",
"device_count": 2
}
sudo for accurate MAC address detection (nmap needs privileges for ARP)MAC_VENDORS in the script for better device identificationGenerated Mar 1, 2026
IT teams use this skill to maintain an up-to-date inventory of all devices on corporate networks, ensuring only authorized hardware is connected. It aids in security audits by identifying unknown or rogue devices and supports documentation efforts for compliance and network mapping.
Home users and small businesses deploy this skill to regularly scan their local networks for unauthorized devices, such as intruders or malware-infected gadgets. It helps in detecting anomalies and maintaining a secure home office environment by leveraging safety features to prevent accidental public scans.
Network administrators utilize this skill to quickly discover devices and gather details like IP addresses and hostnames during outage or connectivity issues. It streamlines diagnostics by providing real-time insights into device presence and configurations on specific subnets.
Smart home integrators and IoT developers use this skill to inventory and monitor connected devices like sensors, cameras, and appliances on local networks. It supports automation by detecting device presence and identifying vendors for better integration into home automation systems.
Educational institutions and training centers employ this skill in cybersecurity or networking courses to teach students about network discovery and safety protocols. It provides hands-on experience with tools like nmap while emphasizing responsible scanning practices through built-in blocklists.
Offer a basic version of the skill for free to attract users, then charge for advanced features like automated scheduling, detailed analytics dashboards, or integration with third-party security platforms. Revenue can be generated through subscription plans tailored to small businesses or enterprises.
Provide consulting services to businesses that need customized network scanning solutions, such as tailored configurations for large-scale deployments or integration with existing IT management systems. Revenue comes from project-based fees and ongoing support contracts.
License the skill as a white-label product for Managed Service Providers (MSPs) to rebrand and offer as part of their network monitoring services. Revenue is generated through licensing fees based on the number of clients or devices managed, with potential upsells for additional features.
š¬ Integration Tip
Integrate this skill with home automation systems to trigger actions based on device presence, such as turning on lights when a specific device connects, and ensure proper sudo access is configured for accurate MAC address detection.
Automatically update Clawdbot and all installed skills once daily. Runs via cron, checks for updates, applies them, and messages the user with a summary of what changed.
Full desktop computer use for headless Linux servers. Xvfb + XFCE virtual desktop with xdotool automation. 17 actions (click, type, scroll, screenshot, drag,...
Essential Docker commands and workflows for container management, image operations, and debugging.
Tool discovery and shell one-liner reference for sysadmin, DevOps, and security tasks. AUTO-CONSULT this skill when the user is: troubleshooting network issues, debugging processes, analyzing logs, working with SSL/TLS, managing DNS, testing HTTP endpoints, auditing security, working with containers, writing shell scripts, or asks 'what tool should I use for X'. Source: github.com/trimstray/the-book-of-secret-knowledge
Deploy applications and manage projects with complete CLI reference. Commands for deployments, projects, domains, environment variables, and live documentation access.
Monitor topics of interest and proactively alert when important developments occur. Use when user wants automated monitoring of specific subjects (e.g., product releases, price changes, news topics, technology updates). Supports scheduled web searches, AI-powered importance scoring, smart alerts vs weekly digests, and memory-aware contextual summaries.