The SitRep project provides sysadmins with the tools to quickly and easily list all machines on a net that match specific port criteria. It can be used to document (un)authorized servers and printers for maintenance and security reasons.
Basically, the SitRep scanner module uses nmap to scan your network and logs the results for systems that match your predefined criteria (open ports). It then flags authorized servers (based on a user-defined list) and devices that look like printers. Once this process is completed it will timestamp the results and email you a report containing the relevant information, log the report locally, upload the report to an FTP site or upload the report to a MySQL database. The access module then interfaces with the MySQL database and allows you to view, search, modify and remove records via the web.
What's the point?
The most obvious use - and the reason I wrote it - is to track unauthorized servers on your network. If you need to monitor for things like peer-to-peer file sharing programs, web, FTP, SMTP or IRC servers simply set SitRep to run several times a day and seek the ports used by those applications. It will assemble a list of systems that meet the requested criteria and present them in a manageable format.
Features
Scanner script:
Records IP addresses, hostnames and relevant ports with timestamp.
Automatically flags authorized systems and printers.
Will optionally determine and record the remote OS.
Scan result reports can be emailed automatically.
Scan result reports can be archived in plain text locally or remotely via FTP.
Results can be stored locally or remotely in a MySQL database.
Web interface:
The database interface is searchable and sortable.
Database entries can be displayed in a printable report format.
Access rights can be granted by IP address.
Privilege levels currently supported: denied, read-only, modify or full control.
Usage
Untar/unzip the downloaded file in the directory of your choice (/usr/local/sitrep is used by the default configuration file). Run configure.pl and follow the prompts to generate a custom configuration, or edit sitrep.conf manually.
For more detailed instructions be sure to check the SitRep manual (forthcoming).
Screenshots
The following images are taken from the MySQL database web interface: