Uses ICMP Echo packets, ICMP Timestamp and ICMP Information packets to probe networks. Supports spoofing and promiscuous listening for reply packets.