Bootstrap FreeKB - nmap - Scan machines in your network
nmap - Scan machines in your network

Updated:   |  nmap articles

To scan a single machine in your network using nmap, all you need is the IP address of the machine, like this.

nmap 192.168.0.22

 

Or hostname, like this.

nmap server1.example.com

 

If the target machine does not exist, is down, or is configured to block ICMP packets, something like this should be returned.

Starting Nmap 6.40 ( http://nmap.org ) at 2020-08-30 10:56 CDT
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.06 seconds

 

If the machine is up and is not blocking ICMP packets, something like this should be returned.

Starting Nmap 6.40 ( http://nmap.org ) at 2020-08-30 10:50 CDT
Nmap scan report for 192.168.0.22
Host is up (0.00027s latency).
Not shown: 994 closed ports
PORT     STATE SERVICE
22/tcp   open  ssh
80/tcp   open  http
139/tcp  open  netbios-ssn
443/tcp  open  https
445/tcp  open  microsoft-ds
3306/tcp open  mysql

Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds

 


Scan a range of IP addresses

Here is how you would scan a range of IP addresses.

nmap 192.168.0.10-20

 


Scan every IP address in a subnet

Here is how you would scan every IP address in a subnet.

Note - This command may take a long time to complete, especially if your subnet contains a large number of hosts

For this reason, it's helpful to include the --status-every xx option

nmap 192.168.0.0/24 --stats-every 5s

 




Did you find this article helpful?

If so, consider buying me a coffee over at Buy Me A Coffee



Comments


Add a Comment


Please enter d33247 in the box below so that we can be sure you are a human.