Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.

Glossary > Ping Scanning

What is Ping Scanning?

Understanding Ping Scanning

Network mapping technique to detect if host replies to a ping then the attacker knows that a host exists at that address. Ping scanning is a reconnaissance technique that sends ICMP echo request ping packets to multiple IP addresses to identify which systems are active on a network. This basic network discovery method helps attackers map network topology before launching more targeted attacks. Ping scanning is addressed in penetration testing methodologies and network security frameworks like NIST SP 800-53. Organizations counter ping scanning through firewall filtering of ICMP traffic network segmentation IDS/IPS monitoring for scanning activity and deception technologies. For example a security-conscious organization might configure edge firewalls to block external ICMP echo requests implement internal network monitoring to detect unauthorized ping sweeps deploy honeypots to identify reconnaissance activity and regularly conduct authorized scans to identify exposed systems. Related terms Network reconnaissance Port scanning ICMP Network mapping Footprinting Network discovery Active scanning Host discovery.

Learn More About Ping Scanning: