Use Network Utility in mac was a very useful tool for fixing problems with connections. However, when macOS Big Sur came out, Apple decided to stop making the app. Even though Network Utility still works on older versions of the operating system, those of us who have upgraded must find other ways to get what we need.
The good news is that Terminal is up to the task, and with the right commands, you can do most of what Network Utility does. Here, we’ll list each Network Utility tool and tell you what command should be used instead.
How to use Mac Network Utility
With each of these features, it depends on what information you’re looking for, what you already have (like someone else’s or another device’s IP address or domain name), and whether or not the device is in your network or can connect to your network remotely. This works even if your machine is not airtight.

Even though Network Utility was only made for OS X, the Finder tool can look for the data packets that iOS devices on your network are sending and receiving. It can be helpful for people who want to add more tools to their iOS toolkit.
All of the above options have easy-to-use input fields and search buttons, so once you have the information you need, such as an IP address, you can search for more information. Take Network Utility’s Port Scan feature, for example. It can run for a long time looking for open TCP/IP ports because it scans for port numbers from 1 to 65535.
FAQ
How do I run a port scan on a Mac?
- Hit Command+Spacebar to summon Spotlight and type “Network Utility” followed by the return key to launch the Network Utility app.
- Select the “Port Scan” tab.
- Enter the IP or domain name you wish to scan for open ports and choose “scan”
How do I scan a port and IP address?
Type “portqry.exe –n [hostname/IP]” where [hostname/IP] is the hostname or IP address of the remote host to see its TCP/UDP open port state.
How do hackers scan ports?
Hackers send a message to each port one at a time during a port scan. The answer they get from each port tells them if it’s being used and shows any possible weaknesses. Security experts can do port scanning regularly to get an inventory of a network and find possible security holes.