whosthere
Local Area Network discovery tool with an interactive TUI

Local Area Network discovery tool with an interactive Terminal User Interface (TUI) written in Go. Discover, explore, and understand your LAN in an intuitive way. Knock Knock.. who's there? 🚪
AI Analysis
whosthere is an open-source LAN discovery tool written in Go that features an interactive Terminal User Interface (TUI). It allows users to scan, discover, and explore devices on their local network intuitively with a simple 'Knock Knock.. who's there?' approach. Core features include real-time device detection and an engaging terminal-based visualization. It solves key user pain points such as the complexity and lack of intuitiveness in traditional network scanning tools like command-line utilities that require deep expertise. The unique selling point is its lightweight, interactive TUI design tailored for quick LAN exploration without heavy GUIs or setups. Overall value proposition: free, open-source network visibility for developers and enthusiasts seeking simplicity and clarity in understanding their local networks.
In 2025-2026, the timing is favorable due to explosive growth in IoT devices, smart homes, remote/hybrid work setups, and heightened network security awareness amid rising cyber threats. Users increasingly demand simple tools to identify unknown devices on their networks. Technology for LAN protocols is mature, and open-source adoption continues to rise. However, established tools reduce urgency somewhat. Overall a good window for niche, user-friendly innovations. Moderate Timing.
Technical difficulty is low to medium; the tool leverages standard network protocols (ARP, mDNS) in Go, which is efficient for this use case. Development and operation costs are minimal as it is already built and open-source with no servers required. No significant supply chain, compliance, or regulatory risks for a LAN scanner. High scalability for personal and small team use; easy to maintain and extend. Team fit is strong for Go/CLI developers. Overall rating: High.
Main target segments: Software developers, IT administrators, network engineers, IoT hobbyists and security enthusiasts (ages 20-45, tech-savvy, CLI-comfortable). Industries: Software dev, DevOps, home automation, cybersecurity. Geographic distribution: Global, concentrated in US, Europe, and Asia via GitHub communities. Estimated market size: Developer tools TAM ~$15B+, niche SAM for network utilities ~$500M, SOM limited (~few million) as a free OSS tool. Core pain points: Difficulty visualizing/identifying devices on opaque home/office networks and detecting intruders. Potential willingness to pay: Low (open-source model); users may support via donations or upgrades for advanced features.
Competition level: Medium. Direct competitors: 1. Nmap (nmap.org), 2. Angry IP Scanner (angryip.org), 3. Advanced IP Scanner (advanced-ip-scanner.com), 4. Fing App (fing.com), 5. netdiscover (github.com/netdiscover). Advantages vs competitors: More interactive and visually engaging TUI compared to plain CLI tools like Nmap; simpler and more approachable than comprehensive but complex alternatives; completely free and lightweight. Disadvantages: Lacks advanced scanning depth, scripting, or packet analysis of Nmap; no cross-platform GUI like Angry IP Scanner; smaller community and brand recognition as a newer GitHub project.
Upgrade Pro to unlock full AI analysis
Similar Products

Runtime
Sandboxed coding agents for everyone on your team
▲ 200 votes

Graphbit PRFlow - AI Code Review Agent
AI code reviewer that catches what others miss
▲ 175 votes

Mantel
Stop confusing your Claude Code sessions & terminal windows
▲ 72 votes

DecisionBox for Databricks
Connect DecisionBox to your Databricks to validate findings
▲ 72 votes

Arkiv
Modern Asset Protection for Designers
▲ 68 votes

Stagent
Drive Claude Code through long tasks it would otherwise drop
▲ 58 votes