how do I discover what devices are hooking up to my internet connectivity?

Solution
You need to log into your router and see what the MAC address of all devices are, then check that against each device you own. No other way.


Those don't work, the ONLY way to know 100% is to check the router logs, since anything else depends on the devices being visible to the network (which malicious devices will not be) and in many cases you need to install a helper program (which you can't).
 


Yes and no. Some are very good at client discovery and some routers are very poor at reporting if at all. So to say the ONLY way is a bit far of the mark.
 


By definition a router handles all traffic that flows through it and keeps track of what is there. Whether or not it reports it is another issue entirely.

And while some might be good at discovery, I could program an arduino in 10 min to connect through the network to a specified outside server without having that thing being noticed by anything other than the router (i.e. sketchy stuff that malicious devices do). On top of that, those programs can't detect how much bandwidth is being used by other devices, again, it's something only the router can do (assuming consumer equipment, and that the router has that functionality, which most dont)
 

Ralston18

Titan
Moderator
Look into the nmap commands.

One reference (there are many others):

https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/

Also there are free GUIs based on the command and the available options: e.g., Advanced IP Scanner and Wifi Network Monitor.

Powershell can also be used to customize as you need.
 


"Whether or not it reports it is another issue entirely." Well not really no. If you are saying the router by definition is the ONLY way to record attached devices, yet his doesn't because it doesn't have the functionality, you aren't really helping the OP in the slightest and isn't a different matter entirely. I could place an IDS on a network and track all the activity on it, including attached devices but it wouldn't be doing any routing or switching. Just saying.


 


1) It would be doing one form of routing, from the inner nodes to the outer ones, passthrough, yes, but all traffic must flow through it to work
2) Like I said above, consumer devices only are considered. If his router doesn't support logging and there are malicious actors on his network, the chances of him catching them are slim to none with software clients
 


#semantics