Solved

Where does HostName come from (that shows up on IP scan, like Angry IP?

Posted on 2008-11-03
5
1,172 Views
Last Modified: 2013-11-05
When I use an IP scanner on my office LAN, the HostName that shows up (in the scanner's results) are sometimes not consistent with the setting for Computer Name on that PC (after a recent computer name change and reboot). Sometimes, I can reboot the nrewly-named PC several times, and Angry IP Scanner will still show the old name. How does this work? (Where does HostName come from on Angry IP?)
0
Comment
Question by:lee88
  • 3
  • 2
5 Comments
 
LVL 8

Accepted Solution

by:
Shmoid earned 500 total points
ID: 22869071
Angry IP Scanner just pinging each address in the range that you specify. The hostname it is displaying si coming from your local DNS server. After you rename a PC and reboot it will register the new name with it's current IP but it may be some time before the old name is removed from the DNS server. As a result Angry IP Scanner is simply reporting the first match of the IP that it finds.

You could manually delete the DNS record after renaming the PC.
0
 

Author Comment

by:lee88
ID: 22869506
Thanks for the answer Shmoid. Is there a local command line comand that will expedite the flushing-out of the old and registering of the new name with the DNS server?
0
 
LVL 8

Expert Comment

by:Shmoid
ID: 22870186
On Windows 2000 and newer you can use the ipconfig command with the /registerdns switch to register the PC after a name change but it will not remove the old entry. Syntax is:
ipconfig /registerdns [adapter]

You can turn on DNS scavenging on the DNS server but it runs at a configurable interval. So it wouldn't help immediately after a name change. However, it does automate the task so you don't have to  manually go and delete old records. Take a look at this article about DNS scavenging.

http://searchwindowsserver.techtarget.com/tip/0,289483,sid68_gci1040355,00.html
0
 

Author Comment

by:lee88
ID: 22870234
Thanks for the very complete answer.
0
 
LVL 8

Expert Comment

by:Shmoid
ID: 22870521
Glad I could help. Thanks for the points!

0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Preface There are many applications where some computing systems need have their system clocks running synchronized within a small margin and eventually need to be in sync with the global time. There are different solutions for this, i.e. the W3…
Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now