Usage: nmap [Scan Type(s)] [Options] {target specification}
Options Description
-h, --help Show help and exit
-v Increase verbosity level
-sn Ping scan – disable port scan
-sS TCP SYN (stealth) scan
-sT TCP Connect scan (no raw packets)
-sU UDP Scan
-sO Disabled IP protocol scan (needs raw sockets)
-sX, -sF, -sN Disabled TCP Xmas/FIN/NULL scans
-p Only scan specified ports. Ex: -p U:53,111,137,T:21-25,80,139,8080,S:9
--top-ports Scan N most common ports
-F Fast mode – scan fewer ports
-r Scan ports sequentially (no timing randomization)
-Pn Treat all hosts as online, skip discover
-n No DNS resolution
-R Always resolve DNS
--dns-servers Specify custom DNS servers
--traceroute Trace hop path to each host
-A Enable OS detection, version scan, script scan, traceroute
-O Enable OS detection
-sV Service/version detection
--script NSE script scanning
--script-args Provide NSE script arguments
-iL Input from list of hosts/networks
-iR Choose random targets
--exclude Exclude hosts/networks
--excludefile Exclude list from file
-oN, -oX, -oG, -oS Output formats: normal, XML, grepable, script kiddie
-D Disabled Decoy scan: hide real source behind decoys
--spoof-mac Disabled Spoof MAC address
Nmap online Logo

Nmap online

Used for network discovery and security auditing. It scans networks to identify active hosts, open ports, running services with versions, and operating system details.


Homepage
Star
v7.95