The classic tool used for ping sweeps is fping, which traditionally was accompanied by gping to generate the list of hosts for large subnets, although more recent version of fping include that functionality. Well-known tools with ping sweep capability include nmap for Unix systems, and the Pinger software from Rhino9 for Windows NT. There are many other tools with this capability, including: Hping, IEA's aping, Simple Nomad's ICMPEnum, SolarWind's Ping Sweep, and Foundstone's SuperScan. There is also a ping sweep tool for Windows, Mac, Linux, Android, and iOS called Fing made by Overlook Soft.
Pings can be detected by protocol loggers like ippl.
- Mike Shema, Chris Davis, Anti-hacker tool kit, Edition 3, McGraw Hill Professional, 2006, ISBN 0-07-226287-7, pp. 403–406
- Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed: Network Security Secrets & Solutions, Edition 6, McGraw Hill Professional, 2009, ISBN 0-07-161374-9, pp. 44–51
- Teo, Lawrence (December, 2000). Network Probes Explained: Understanding Port Scans and Ping Sweeps, Linux Journal
- Stuart McClure and Joel Scambray, An arsenal of attack tools is an essential part of any strong security defense, InfoWorld, Jul 24, 2000, Vol. 22, No. 30, ISSN 0199-6649, p. 59
- Susan Elizabeth Young, Dave Aitel, The hacker's handbook: the strategy behind breaking into and defending Networks, CRC Press, 2004, ISBN 0-8493-0888-7, p. 75