Scan an IPv4 host\/address<\/p>\n
nmap 192.168.1.1<\/pre>\nScan an IPv6 host\/address<\/p>\n
nmap -6 2607:f8b0:4007:804::1009\r\nnmap -v A -6 2607:f8b0:4007:804::1009<\/pre>\nScan FQDN<\/p>\n
nmap server1.cyberciti.biz<\/pre>\nScan a host name with more info<\/p>\n
nmap -v server1.cyberciti.biz<\/pre>\nScan a range of IP address<\/p>\n
nmap 192.168.1.1-20\r\nnmap 192.168.1.*\r\nnmap 192.168.1.0\/24\r\nnmap 192.168.1.1,2,3\r\nnmap 192.168.1.1 192.168.1.2<\/pre>\nRead list of hosts\/networks from a file<\/p>\n
nmap -iL \/tmp\/test.txt<\/pre>\nExcluding hosts\/networks (IPv4)<\/p>\n
nmap 192.168.1.0\/24 --exclude 192.168.1.5\r\nnmap 192.168.1.0\/24 --exclude 192.168.1.5,192.168.1.254\r\nnmap -iL \/tmp\/scanlist.txt --excludefile \/tmp\/exclude.txt<\/pre>\nTurn on OS and version detection scanning script (IPv4)<\/p>\n
nmap -A 192.168.1.254\r\nnmap -v -A 192.168.1.1\r\nnmap -A -iL \/tmp\/scanlist.txt<\/pre>\nFind out if a host\/network is protected by a firewall<\/p>\n
nmap -sA 192.168.1.254<\/pre>\nScan a host when protected by the firewall<\/p>\n
nmap -PN 192.168.1.1<\/pre>\nScan a network and find out which servers and devices are up and running<\/p>\n
nmap -sP 192.168.1.0\/24<\/pre>\nPerform a fast scan<\/p>\n
nmap -F 192.168.1.1<\/pre>\nDisplay the reason a port is in a particular state<\/p>\n
nmap --reason 192.168.1.1<\/pre>\nOnly show open (or possibly open) ports<\/p>\n
nmap --open 192.168.1.1<\/pre>\nShow all packets sent and received<\/p>\n
nmap --packet-trace 192.168.1.1<\/pre>\nShow host interfaces and routes (netsat -nr)<\/p>\n
nmap --iflist<\/pre>\nScan specific ports<\/p>\n
nmap -p 80 192.168.1.1\r\nnmap -p 80,443 192.168.1.1\r\nnmap -p 80-200 192.168.1.1\r\nnmap -p T:80 192.168.1.1\r\nnmap -p U:53 192.168.1.1\r\nnmap -p U:53,111,137,T:21-25,80,139,8080 192.168.1.1\r\nnmap -v -sU -sT -p U:53,111,137,T:21-25,80,139,8080 192.168.1.254\r\nnmap --top-ports 5 192.168.1.1<\/pre>\nFastest way to scan all your devices\/computers for open ports<\/p>\n
nmap -T5 192.168.1.0\/24<\/pre>\nDetect remote operating system<\/p>\n
nmap -O 192.168.1.1\r\nnmap -O --osscan-guess 192.168.1.1\r\nnmap -v -O --osscan-guess 192.168.1.1<\/pre>\nDetect remote services (server \/ daemon) version numbers<\/p>\n
nmap -sV 192.168.1.1<\/pre>\nScan a host using TCP ACK (PA) and TCP Syn (PS) ping<\/p>\n
nmap -PS 192.168.1.1\r\nnmap -PS 80,21,443 192.168.1.1\r\nnmap -PA 192.168.1.1\r\nnmap -PA 80,21,200-512 192.168.1.1<\/pre>\nScan a host using IP protocol ping<\/p>\n
nmap -PO 192.168.1.1<\/pre>\nScan a host using UDP ping<\/p>\n
nmap -PU 192.168.1.1\r\nnmap -PU 2000.2001 192.168.1.1<\/pre>\nStealthy scan<\/p>\n
nmap -sS 192.168.1.1<\/pre>\nFind out the most commonly used TCP ports using TCP ACK scan<\/p>\n
nmap -sA 192.168.1.1<\/pre>\nFind out the most commonly used TCP ports using TCP Window scan<\/p>\n
nmap -sW 192.168.1.1<\/pre>\nFind out the most commonly used TCP ports using TCP Maimon scan<\/p>\n
nmap -sM 192.168.1.1<\/pre>\nFind out the most commonly used TCP ports using TCP connect scan<\/p>\n
nmap -sT 192.168.1.1<\/pre>\nScan a host for UDP services (UDP scan)<\/p>\n
nmap -sU 192.168.1.1<\/pre>\nScan for IP protocol<\/p>\n
nmap -sO 192.168.1.1<\/pre>\nScan a firewall for security weakness. TCP Null Scan to fool a firewall to generate a response
\n Does not set any bits (TCP flag header is 0) <\/p>\nnmap -sN 192.168.1.254<\/pre>\nTCP Fin scan to check firewall. Sets just the TCP FIN bit <\/p>\n
nmap -sF 192.168.1.254<\/pre>\nTCP Xmas scan to check firewall. Sets the FIN, PSH, & URG flags, lighting the packet up like a Christmas tree <\/p>\n
nmap -sX 192.168.1.254<\/pre>\nScan a firewall for packets fragments<\/p>\n
nmap -f 192.168.1.1<\/pre>\nSet your own offset size with the –mtu option <\/p>\n
nmap --mtu 32 192.168.1.1<\/pre>\nCloak a scan with decoys<\/p>\n
nmap -n -Ddecoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip\r\nnmap -n -D192.168.1.5,10.5.1.2,172.1.2.4,3.4.2.1 192.168.1.5<\/pre>\nSpoof your MAC address<\/p>\n
nmap --spoof-mac MAC-ADDRESS-HERE 192.168.1.1<\/pre>\nAdd other options<\/p>\n
nmap -v -sT -PN --spoof-mac MAC-ADDRESS-HERE 192.168.1.1<\/pre>\nUse a random MAC address. The number 0, means nmap chooses a completely random MAC address <\/p>\n
nmap -v -sT -PN --spoof-mac 0 192.168.1.1<\/pre>\nSave output to a text file<\/p>\n
nmap 192.168.1.1 > output.txt\r\nnmap -oN \/tmp\/filename 192.168.1.1\r\nnmap -oN output.txt 192.168.1.1<\/pre>\nFind host MAC address (can only be done on same LAN segment)<\/p>\n
sudo nmap -sP -n 192.168.0.1\r\nsudo nmap -sP -n 192.168.0.0\/24<\/pre>\n","protected":false},"excerpt":{"rendered":"Scan an IPv4 host\/address nmap 192.168.1.1 Scan an IPv6 host\/address nmap -6 2607:f8b0:4007:804::1009 nmap -v A -6 2607:f8b0:4007:804::1009 Scan FQDN nmap server1.cyberciti.biz Scan a host name with more info nmap -v server1.cyberciti.biz Scan a range of IP address nmap 192.168.1.1-20 nmap 192.168.1.* nmap 192.168.1.0\/24 nmap 192.168.1.1,2,3 nmap 192.168.1.1 192.168.1.2 Read list of hosts\/networks from a file nmap -iL \/tmp\/test.txt Excluding hosts\/networks (IPv4) nmap 192.168.1.0\/24 –exclude 192.168.1.5 nmap 192.168.1.0\/24 –exclude 192.168.1.5,192.168.1.254 nmap -iL \/tmp\/scanlist.txt –excludefile \/tmp\/exclude.txt Turn on OS and version detection scanning script (IPv4) nmap -A 192.168.1.254 nmap -v -A 192.168.1.1 nmap -A -iL \/tmp\/scanlist.txt Find out if a host\/network is protected by a firewall nmap -sA 192.168.1.254 Scan a host when protected by the firewall nmap -PN 192.168.1.1 Scan a network and find out which servers and devices are up and running nmap -sP 192.168.1.0\/24 Perform a fast scan nmap -F 192.168.1.1 Display the reason a port is in a particular state nmap –reason 192.168.1.1 Only show open (or possibly open) ports nmap –open 192.168.1.1 Show all packets sent and received nmap –packet-trace 192.168.1.1 Show host interfaces and routes (netsat -nr) nmap –iflist Scan specific ports nmap -p 80 192.168.1.1 nmap -p 80,443 192.168.1.1 nmap -p 80-200 192.168.1.1 nmap -p T:80 192.168.1.1 nmap -p U:53 192.168.1.1 nmap -p U:53,111,137,T:21-25,80,139,8080 192.168.1.1 nmap -v -sU -sT -p U:53,111,137,T:21-25,80,139,8080 192.168.1.254 nmap –top-ports 5 192.168.1.1 Fastest way to scan all your devices\/computers for open ports nmap -T5 192.168.1.0\/24 Detect remote operating system nmap -O 192.168.1.1 nmap -O –osscan-guess 192.168.1.1 nmap -v -O –osscan-guess 192.168.1.1 Detect remote services (server \/ daemon) version numbers nmap -sV 192.168.1.1 Scan a host using TCP ACK (PA) and TCP Syn (PS) ping nmap -PS 192.168.1.1 nmap -PS 80,21,443 192.168.1.1 nmap -PA 192.168.1.1 nmap […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[32,5],"_links":{"self":[{"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/posts\/100"}],"collection":[{"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/comments?post=100"}],"version-history":[{"count":9,"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/posts\/100\/revisions"}],"predecessor-version":[{"id":109,"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/posts\/100\/revisions\/109"}],"wp:attachment":[{"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/media?parent=100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/categories?post=100"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/theipzone.com\/wp-json\/wp\/v2\/tags?post=100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}