Scans nearby IP addresses, hostnames, MAC addresses, etc.
Scan your local network to manage available resources and vulnerabilities.
List available hosts, open ports, and their characteristics.