Images
Pull, build, push, analyze, and scan Docker images with a built-in Docker Hub browser and Trivy scanner.
Pull, build, push, analyze, and scan images from here, and browse Docker Hub without leaving the app.
The image list
Use the image list to sort by size or created time, and switch between all images and dangling images when you want to clean up old layers.
All images include every tag that is available locally. Use this view when you want to inspect, retag, build from, push, or scan an image.
Dangling images are untagged layers left behind by builds. Use this view when you want to delete unused intermediates.
Pull an image
Dockerman suggests registries, image names, and tags as you type in the pull combobox. Added in v4.7.0.
Open the Pull dialog
Click Pull from the Images page.
Enter the image reference
Type the registry, repository, and tag you want to pull.
Watch the streaming progress
Follow the layer download and extract progress until the image appears in the list.
Browse Docker Hub
Added in v4.6.0.
Use the built-in Hub browser to search, inspect, and pull public images without switching to the web UI.
Open the Hub browser
From the Images page, click Browse Docker Hub.
Search for an image
Type a query, then review the official and verified badges in the results.
Read the README and tags
Click an image to view its README inline and the full tag list.
Pull a specific tag
Click Pull next to the tag you want to use.
Build from a Dockerfile
Build uses the same Docker daemon as the rest of Dockerman, and BuildKit is used automatically when the daemon supports it.
Choose a build context
Select a local folder that contains the Dockerfile.
Review or edit the Dockerfile
Open the Dockerfile in Monaco, then save your changes to disk before you build.
Set the image name and build args
Set the image tag, optional build arguments, and a target stage if you need one.
Run the build
Watch the build logs stream in the terminal until the image appears in the Images list.
Dockerman honors .dockerignore in the selected build context.
Push to a registry
Added in v4.6.0.
Push a tagged image after you sign in to the target registry or provide credentials for the push.
Tag the image for the target registry
Use a full name like registry.example.com/team/app:1.2.0.
Configure registry credentials
Dockerman reads existing Docker auth from ~/.docker/config.json, or you can add credentials per push.
Push with streaming progress
Follow the upload progress until the registry accepts the new tag.
Public registries and private registries both work here, including Docker Hub, GHCR, Harbor, AWS ECR, Nexus, and GitLab Container Registry.
Analyze image size
Open the Image Size view to see the layer tree and the places where the image spends its space.
- Look for oversized package caches that were left in the final layer.
- Look for build artifacts that should have been copied into a smaller runtime image.
- Look for redundant
COPYlayers that duplicate the same files.
Tag operations
Use tag operations to tag, untag, or retag an image for another repository or registry. Retagging changes the reference only, so the underlying layers stay where they are.
Scan with Trivy
Added in v4.6.0.
Scan an image to find known vulnerabilities in its installed layers.
First-time install
The first scan downloads the Trivy binary and its vulnerability database.
The first scan downloads the Trivy binary, about 50 MB, plus the vulnerability database. The download is one-time and cached locally. See Trivy settings if you need a custom binary path.
Run a scan
Select an image
Pick the image you want to scan from the Images page.
Click Scan with Trivy
Dockerman starts the scan and streams progress into the report view.
Wait for the report
Typical scans take 30 seconds to 3 minutes, depending on image size.
Read the report
Dockerman groups findings by severity, then lets you expand each finding to see the CVE ID, description, affected versions, and fix versions when available. Export the raw report as JSON when you want to feed it into CI or archive the result.
Cleanup
- Remove dangling images from the Dangling tab when you want to clear build leftovers quickly.
- Delete old versions with multi-select when you no longer need a tag.
- Use the system prune controls in Docker settings when you want to remove all unused images at once.