Usage: nmap [Scan Type(s)] [Options] {target specification}
Options | Description |
---|---|
-h, --help | Show help and exit |
-v | Increase verbosity level |
-sn | Ping scan – disable port scan |
-sS | TCP SYN (stealth) scan |
-sT | TCP Connect scan (no raw packets) |
-sU | UDP Scan |
-sO Disabled | IP protocol scan (needs raw sockets) |
-sX, -sF, -sN Disabled | TCP Xmas/FIN/NULL scans |
-p | Only scan specified ports. Ex: -p U:53,111,137,T:21-25,80,139,8080,S:9 |
--top-ports | Scan N most common ports |
-F | Fast mode – scan fewer ports |
-r | Scan ports sequentially (no timing randomization) |
-Pn | Treat all hosts as online, skip discover |
-n | No DNS resolution |
-R | Always resolve DNS |
--dns-servers | Specify custom DNS servers |
--traceroute | Trace hop path to each host |
-A | Enable OS detection, version scan, script scan, traceroute |
-O | Enable OS detection |
-sV | Service/version detection |
--script | NSE script scanning |
--script-args | Provide NSE script arguments |
-iL | Input from list of hosts/networks |
-iR | Choose random targets |
--exclude | Exclude hosts/networks |
--excludefile | Exclude list from file |
-oN, -oX, -oG, -oS | Output formats: normal, XML, grepable, script kiddie |
-D Disabled | Decoy scan: hide real source behind decoys |
--spoof-mac Disabled | Spoof MAC address |
Nmap online
Used for network discovery and security auditing. It scans networks to identify active hosts, open ports, running services with versions, and operating system details.
Homepage
v7.95