Tool Documentation:

snmp-check Usage Example

Scan the target host ( using the public SNMP community string (-c public):

root@kali:~# snmp-check -c public
snmp-check v1.9 - SNMP enumerator
Copyright (c) 2005-2015 by Matteo Cantoni (

[+] Try to connect to using SNMPv1 and community 'public'

[*] System information:

  Host IP address               :
  Hostname                      : ...retracted...
  Description                   : ...retracted...
  Contact                       : ...retracted...
  Location                      : ...retracted...
  Uptime snmp                   : -
  Uptime system                 : 3 days, 00:13:51.05
  System date                   : -

[*] Network information:


[*] Network interfaces:


[*] Network IP:


[*] Routing information:


[*] TCP connections and listening ports:


[*] Listening UDP ports:



Packages and Binaries:


Like to snmpwalk, snmpcheck allows you to enumerate the SNMP devices and places the output in a very human readable friendly format. It could be useful for penetration testing or systems monitoring.

Installed size: 46 KB
How to install: sudo apt install snmpcheck

  • libnet-snmp-perl
  • libnumber-bytes-human-perl
  • perl
  • ruby
  • ruby-snmp

SNMP device enumerator

root@kali:~# snmp-check -h
snmp-check v1.9 - SNMP enumerator
Copyright (c) 2005-2015 by Matteo Cantoni (

 Usage: snmp-check [OPTIONS] <target IP address>

  -p --port        : SNMP port. Default port is 161;
  -c --community   : SNMP community. Default is public;
  -v --version     : SNMP version (1,2c). Default is 1;

  -w --write       : detect write access (separate action by enumeration);

  -d --disable_tcp : disable TCP connections enumeration!
  -t --timeout     : timeout in seconds. Default is 5;
  -r --retries     : request retries. Default is 1; 
  -i --info        : show script version;
  -h --help        : show help menu;

Updated on: 2024-Mar-11