nmap
Verified for current stable LTS
Nmap Commands
Nmap command syntax with verified terminal examples.
Commands
8 commands for Nmap
nmap Operations
Nmap Command: Enable Os Detection And Traceroute From File
sudo nmap -A -iL <path/to/file.txt> nmap Operations
Nmap Command: Evade Ids Ips With Slow Scan
sudo nmap -T0 -D <decoy_ip1,decoy_ip2,...> --source-port <53> -f --data-length <16> -Pn <ip_or_host> nmap Operations
Nmap Command: Ping Sweep Subnet Aggressively
nmap -T5 -sn <192.168.0.0/24|ip_or_hostname1,ip_or_hostname2,...> nmap Operations
Nmap Command: Scan Carefully With Default And Safe Scripts
nmap --script "default and safe" <ip_or_host1,ip_or_host2,...> nmap HTTP
Nmap Command: Scan For Web Servers On Standard Ports
nmap --script "http-*" <ip_or_host1,ip_or_host2,...> -p 80,443 nmap Operations
Nmap Command: Scan Specific List Of Ports
nmap -p <port1,port2,...> <ip_or_host1,ip_or_host2,...> nmap Operations
Nmap Command: Scan Top 1000 Ports With Verbosity
nmap -v<1|2|3> <ip_or_hostname> nmap Operations
Nmap Command: Service Version Detection Top 1000 Ports
nmap -sC -sV -oA <top-1000-ports> <ip_or_host1,ip_or_host2,...> Suggest a Nmap Command
Submit missing workflows, corrections, or verified alternatives for this tool.
FAQ
Coverage: Focused examples for common Nmap workflows.
Verified version: current stable LTS.
Verification: Test commands in a disposable workspace and submit notes for edge cases.