INSTRUMENT SUITE
Eighteen self-contained instruments organised across four operational categories. Every module surfaces raw telemetry. Every result can launch the next investigation.
PING
ICMP round-trip time, packet loss, and jitter with live waveform readout.
TRACEROUTE
Hop-by-hop path discovery with tactical geographic map and animated route arcs.
MTR
Continuous path-quality monitoring — identifies which hop drops packets across multiple probe rounds.
DNS
Query all record types (A, AAAA, MX, CNAME, NS, TXT, SOA, PTR, SRV) with configurable resolvers and DNSSEC validation.
PORT SCAN
TCP port scanning with service detection, banner grabbing, and direct CVE lookup per detected service.
LAN SCAN
Discover active hosts on the local subnet via ICMP/TCP with vendor identification.
PING SWEEP
Scan a CIDR range to identify alive hosts across an entire network.
BONJOUR
Browse mDNS/Bonjour services advertised on the local network.
WHOIS / RDAP
Ownership, registrar, ASN, and one-tap abuse contact lookup from parsed RDAP and classic WHOIS data.
TLS INSPECT
SSL/TLS certificate chain analysis, cipher suites, ALPN, and expiry detection.
CVE LOOKUP
Search the National Vulnerability Database by keyword or CVE ID with CVSS severity scoring.
ASN / BGP
Autonomous system lookup via Team Cymru — prefix, registry, allocation date.
SPEED TEST
TCP/UDP throughput measurement via iperf3.
WIFI INFO
Current connection details: SSID, signal, channel, IP, gateway, DNS.
IP CALC
Subnet math from CIDR: mask, host range, broadcast, class, scope.
REVERSE DNS
IP-to-hostname PTR lookup in one tap.
HTTP HEADERS
HTTP request inspector with status, response headers, redirect chain, timing breakdown, and curl export.
TOPOLOGY
Force-directed network graph from LAN scan, colour-coded by risk, with per-node port scan launch.
NOT A LIST OF TOOLS · A CONNECTED WORKSPACE
Tools That Talk to Each Other
Port Scan finds an open service → tap to launch CVE Lookup for that service. LAN Scan discovers hosts → tap to view them in Topology. Topology surfaces a suspicious node → tap to launch Port Scan against it. A breadcrumb trail keeps your investigation organised. Every other network app treats tools as islands. RECON is a single connected workspace.
Your Field Operations, Captured
Every tool run is automatically recorded into a session timeline. Scrub through past investigations on a visual timeline. Inspect full results from any prior operation. Auto-play a session to retrace your steps. Re-run any recorded operation with a single tap. Critical for incident response, post-event analysis and client reporting.
OPERATIONAL ROLES
SECURITY / IR TEAMS
Abuse contact lookups, CVE checks, TLS audits, and rapid network forensics from your pocket. Topology view surfaces lateral risk in seconds.
MILITARY NETOPS
Field-deployable network reconnaissance for comms and infrastructure teams. Offline-capable. No cellular dependency. Hardened against unreliable links.
NETWORK ENGINEERS
Full diagnostic suite for on-site troubleshooting, performance validation and BGP/peering investigation. Raw output preserved for handoff to NOC.
SYSADMINS
LAN discovery, port enumeration and TLS auditing from your pocket. ARP-table inspection. Certificate expiry warnings before they bite production.
YOUR OPERATOR
RECON is built by a single engineer with 20+ years of enterprise network work. Every tool exists because I needed it in the field and couldn't find a mobile version worth using. Email me directly — I read everything, I respond within 24 hours, and your feedback shapes what ships next.
DEPLOY NOW
$34.99 one-time · No subscription · All 18 tools unlocked at install · iPhone · iOS 17+