Detect the weak points of your network and find the strange devices that are connected using your resources