It monitors wireless networks to detect threats such as rogue access points, evil-twin attacks, and unauthorised channel usage. The system stealthily scans IP ranges, identifies
vulnerabilities, and provides actionable intelligence to enable rapid and effective responses.