[options:]
-l get the Adapter lists
-i usage adapters id
-s get the sniffing host
-h get the host
example:
arpscan.exe -i1 -h 192.168.0.1 192.168.0.254
C:>arpscan.exe -l
1. DeviceNPF_{AE5CB855-9045-4C54-BA6E-A33D3B1B97BB} (IBM 10/100 EtherJet PCI Adapter)
2. DeviceNPF_{44485286-BEC8-4019-8AAD-449233DD9AC8} (VMware Virtual Ethernet Adapter)
3. DeviceNPF_{4D5DCCEF-5C4E-42F7-BBF4-EE1DAD10223A} (VMware Virtual Ethernet Adapter)
C:>arpscan.exe -i1 -h 192.168.1.1 192.168.1.254
Adapter id: 1
—————————————–
Description: IBM 10/100 EtherJet PCI Adapter
MAC Address: 00-60-94-EA-FF-DE
DHCP Enabled: NO
IP Address: 192.168.1.88
Subnet Mask: 255.255.255.0
Gateway: 192.168.1.1
Activities Host————————–
192.168.1.1 00-90-D0-8A-CC-CC