NMAP useful commands.


 Nmap is a shortform for Network Mapper. It is an open source security tool for network check, security scanning and auditing.

nmap command comes with a lots of options that make the utility more robust and difficult to follow for new users.


Scan an  IP address (IPv4)


## Scan a single ip address ###
 ## Scan a host name ###
nmap server1.example.com
 ## Scan a host name with more info###
nmap -v server1.example.com


Scan multiple IPs address or subnet (IPv4)

nmap ## works with same subnet as well i.e. nmap,2,3

You can scan a range of IP address too:


You can scan a range of IP address using a wildcard:

nmap 192.168.1.*

Finally, you scan an entire subnet:


Read list of hosts/networks from a file (IPv4)


The -iL option allows you to read the list of target systems using a text file. This is useful to scan a large number of hosts/networks. Create a text file as follows:


cat > /tmp/test-file.txt

Sample outputs:

server1.example.com localhost

The syntax is:

nmap -iL /tmp/test-file.txt


Excluding hosts/networks (IPv4)


When scanning a large number of hosts/networks you can exclude hosts from a scan:

nmap –exclude nmap –exclude,
OR exclude list from a file called /tmp/exclude.txt

nmap -iL /tmp/scanlist.txt --excludefile /tmp/exclude.txt

Turn on OS and version detection scanning script (IPv4)


nmap -A
nmap -v -A
nmap -A -iL /tmp/scanlist.txt



There are no revisions for this post.

Tags: , ,

No comments yet.

Leave a Reply