{"id":4657,"date":"2023-07-22T10:14:15","date_gmt":"2023-07-22T10:14:15","guid":{"rendered":"https:\/\/arzhost.com\/blogs\/?p=4657"},"modified":"2025-08-23T15:30:41","modified_gmt":"2025-08-23T10:30:41","slug":"learn-nmap-linux-networking","status":"publish","type":"post","link":"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/","title":{"rendered":"Learn the Basics of Nmap for Linux Networking"},"content":{"rendered":"\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_74 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#Introduction_to_Nmap_Basics_of_Linux_Networking\" >Introduction to Nmap: Basics of Linux Networking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#What_is_Nmap\" >What is Nmap?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#Commands_for_Nmap_for_Linux_Networking\" >Commands for Nmap for Linux Networking<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#1_Using_Nmap_to_Check_for_Open_Ports\" >1: Using Nmap to Check for Open Ports<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#2_Check_Several_Hosts\" >2: Check Several Hosts<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#3_Leaving_Hosts_Out_of_the_Search\" >3: Leaving Hosts Out of the Search<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#Kickstart_Your_Hosting_Empire%E2%80%94Special_Reseller_Plans_Just_for_You\" >Kickstart Your Hosting Empire\u2014Special Reseller Plans Just for You!<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#4_Find_OS_Information_via_Scanning\" >4: Find OS Information via Scanning<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#5_Check_for_Firewall_Configurations\" >5: Check for Firewall Configurations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#6_Discover_Details_Regarding_Service_Versions\" >6: Discover Details Regarding Service Versions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#7_Check_for_ports\" >7: Check for ports<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#8_Conduct_a_Stealth_Mode_Scan\" >8: Conduct a Stealth Mode Scan.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#9_Recognize_hostnames\" >9:&nbsp; Recognize hostnames<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#10_Scan_from_a_File\" >10: Scan from a File<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#11_Use_Verbose_to_Gather_More_Information\" >11: Use Verbose to Gather More Information<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#12_Detect_IPv6_Addresses\" >12: Detect IPv6 Addresses<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#13_Check_the_Active_Servers_List\" >13: &nbsp;Check the Active Servers List<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#One_Payment_Infinite_Possibilities%E2%80%94Unlock_59_Off_Lifetime_Hosting_Now\" >One Payment, Infinite Possibilities\u2014Unlock 59% Off Lifetime Hosting Now!<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#14_Find_Host_Interfaces_Routes_and_Packets_versions\" >14: Find Host Interfaces, Routes, and Packets versions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#15_Rapid_and_aggressive_scans\" >15: Rapid and aggressive scans<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#16_Seek_Assistance\" >16: Seek Assistance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#17_While_Scanning_create_decoys\" >17: While Scanning, create decoys<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/arzhost.com\/blogs\/learn-nmap-linux-networking\/#Final_Remarks\" >Final Remarks<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Introduction_to_Nmap_Basics_of_Linux_Networking\"><\/span>Introduction to Nmap: Basics of Linux Networking<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>One of the first and most adaptable networking tools is <strong>Nmap \u2013 Basic Commands for Linux Network<\/strong>. Nmap is used by network administrators to find, examine, and map networks in a variety of scenarios. The command-line tool&#8217;s wealth of features is essential for security and troubleshooting.<\/p>\n\n\n\n<p>This article from our <a href=\"https:\/\/arzhost.com\/blogs\/\"><strong>Blog<\/strong><\/a> defines Nmap \u2013 Basic Commands for Linux Network and lists 17 <strong>fundamental Linux commands.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_is_Nmap\"><\/span><strong>What is Nmap?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>An open-source Linux program for network and security audits is called <a href=\"https:\/\/nmap.org\/\" target=\"_blank\" rel=\"noopener\"><strong>Nmap<\/strong><\/a> (<span style=\"color: #000000;\"><strong>Nmap \u2013 Basic Commands for Linux Network<\/strong><\/span>). Network administrators can view hosts and services on multiple platforms using the application.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"536\" title=\"what is Nmap\" src=\"https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2023\/07\/what-is-Nmap-1024x536.jpg\" alt=\"what is Nmap\" class=\"wp-image-12219\" style=\"width:780px;height:auto\" srcset=\"https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2023\/07\/what-is-Nmap-1024x536.jpg 1024w, https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2023\/07\/what-is-Nmap-300x157.jpg 300w, https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2023\/07\/what-is-Nmap-768x402.jpg 768w, https:\/\/arzhost.com\/blogs\/wp-content\/uploads\/2023\/07\/what-is-Nmap.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">what is Nmap<\/figcaption><\/figure><\/div>\n\n\n<p>Both locally and remotely, Nmap functions. Common applications include checking for open ports, identifying network vulnerabilities, network mapping, and maintenance. The tool is useful from both a networking and security perspective.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Commands_for_Nmap_for_Linux_Networking\"><\/span><strong>Commands for Nmap for Linux Networking<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Depending on the circumstance, there are a variety of parameters and use cases available for the <strong>Nmap command.<\/strong> The most popular and <strong>practical Nmap commands<\/strong> for Linux are listed below with examples.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Using_Nmap_to_Check_for_Open_Ports\"><\/span><strong>1: Using Nmap to Check for Open Ports<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Nmap commands can employ server names, IPV4 addresses, or IPV6 addresses to scan hosts. A simple Nmap command will reveal details about the specified host.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>server.com nmap<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>As stated above, Nmap displays open services and ports on the specified host or hosts in the absence of any flags.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap 192.168.0.1<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>Nmap can show open services and ports by both IP address and domain name.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -F 192.168.0.1<\/code><\/li>\n<\/ul>\n\n\n\n<p>The -F flag can be used to swiftly complete a scan. The Nmap-services files&#8217; ports are listed using the -F flag. The -F &#8220;Fast Scan&#8221; flag is less thorough because fewer ports are scanned.<\/p>\n\n\n\n<p><strong>Related Article: <a href=\"https:\/\/arzhost.com\/blogs\/ethtool-command-change-speed-duplex-ethernet-card-linux\/\" data-type=\"link\" data-id=\"https:\/\/arzhost.com\/blogs\/ethtool-command-change-speed-duplex-ethernet-card-linux\/\">Ethtool Command Change Speed Duplex Ethernet Card Linux<\/a><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Check_Several_Hosts\"><\/span><strong>2: Check Several Hosts<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Instead of scanning a single host at a time, Nmap can scan many sites simultaneously. This is advantageous for larger network architectures. Depending on how many sites you need to scan at once, there are a variety of methods you can use.<\/p>\n\n\n\n<p><u>To scan several hosts simultaneously, add numerous domains or IP addresses in a row.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap 192.168.0.1 192.168.0.2 192.168.0.3<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>To quickly scan a whole subnet, use the wildcard *.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap 192.168.0. *<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>Instead of entering out the complete IP address, separate the several address endings using commas.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap 192.168.0.1,2,3<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>To scan a range of IP addresses, use a hyphen.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap 192.168.0.1-4<\/code><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Leaving_Hosts_Out_of_the_Search\"><\/span><strong>3: Leaving Hosts Out of the Search<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>You might want to choose an entire group (such as a whole subnet) while omitting a single host when scanning a network.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>168.0. * nmap 192.168.0.2 \u2014exclude<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>The -exclude switch lets you exclude specific hosts from your search.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>\/file.txt nmap 192.168.0. * \u2014exclude file<\/code><\/li>\n<\/ul>\n\n\n\n<p>Using the -exclude flag and a specified file, you may also exclude a list of hosts from your search. The simplest way to eliminate several hosts from your search is to do it in this manner.<\/p>\n\n\n\n<div class=\"wp-block-uagb-call-to-action uagb-block-c4713a8d wp-block-button uag-blocks-common-selector\" style=\"--z-index-desktop:479;;--z-index-tablet:undefined;;--z-index-mobile:undefined;\"><div class=\"uagb-cta__wrap\"><h2 class=\"uagb-cta__title\"><span class=\"ez-toc-section\" id=\"Kickstart_Your_Hosting_Empire%E2%80%94Special_Reseller_Plans_Just_for_You\"><\/span><a href=\"https:\/\/arzhost.com\/reseller-hosting\/\" data-type=\"link\" data-id=\"https:\/\/arzhost.com\/reseller-hosting\/\">Kickstart Your Hosting Empire\u2014Special Reseller Plans Just for You!<\/a><span class=\"ez-toc-section-end\"><\/span><\/h2><p class=\"uagb-cta__desc\">Shape Your <strong>Hosting Business with Confidence<\/strong>\u2014Save Big on Reseller Hosting!<\/p><\/div><div class=\"uagb-cta__buttons\"><a href=\"https:\/\/arzhost.com\/reseller-hosting\/\" class=\"uagb-cta__button-link-wrapper wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\">Read More<\/a><\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Find_OS_Information_via_Scanning\"><\/span><strong>4: Find OS Information via Scanning<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Nmap can provide general information as well as the operating system, script, traceroute, and version detection. It&#8217;s crucial to remember that, despite Nmap&#8217;s best efforts, its ability to detect elements like OS systems and versions may not always be perfect.<\/p>\n\n\n\n<p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/4t4kBkMsDbQ\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n\n\n\n<p><u>To learn the operating system details of the hosts that are mapped, add the -A flag to your Nmap command.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -A 192.168.0.1<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>Other Nmap commands may be used in conjunction with the -A flag.<\/u><\/p>\n\n\n\n<p>You can learn more about the mapped hosts&#8217; operating systems by running Nmap with the -O switch. OS detection is enabled with the -O flag.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -O 192.168.0.1<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>-osscan-limit and -osscan-guess are additional tags.<\/u><\/p>\n\n\n\n<p>The command -osscan-limit will only attempt to predict simple operating system targets. The -osscan-guess command will guess operating systems more aggressively. Once more, operating systems are identified based on specific hallmarks; nevertheless, the accuracy of the information cannot be guaranteed.<\/p>\n\n\n\n<p>Wish to Build Your kernel? See our detailed guide on <a href=\"https:\/\/arzhost.com\/blogs\/build-your-own-linux-kernel-from-scratch\/\"><strong>Building Your Own Linux Kernel from Scratch<\/strong><\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Check_for_Firewall_Configurations\"><\/span><strong>5: Check for Firewall Configurations<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>During penetration tests and vulnerability scans, detecting firewall configurations might be helpful. The -sA flag is the most often used of several functions that may be used to find firewall configurations on the supplied hosts.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>the address 192.168.0.1<\/code><\/li>\n<\/ul>\n\n\n\n<p>You can determine whether a firewall is running on the host by using the -sA parameter. To obtain the data, this employs an ACK scan.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Discover_Details_Regarding_Service_Versions\"><\/span><strong>6: Discover Details Regarding Service Versions<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>You might occasionally need to gather service and version data from open ports. This can be used for troubleshooting, vulnerability detection, or finding out which services require updates.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>168.0.1 nmap -sV<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>You&#8217;ll get the information you need about the services offered by the specified host from this.<\/u><\/p>\n\n\n\n<p>The \u2014version-intensity level option lets you choose the level of this search&#8217;s intensity, which ranges from 0 to 9. If the scan&#8217;s results are not what you would normally expect, you may also use \u2014version-trace to provide more specific details about the scan.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Check_for_ports\"><\/span><strong>7: Check for ports<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>One of the fundamental tools that Nmap provides is port scanning, thus there are a few different methods to personalize this command.<\/p>\n\n\n\n<p><u>You can search for details about a particular port on a host by using the -p flag and port.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -p 443 192.168.0.1<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>You can search for details about a certain sort of connection by putting a type of port before the port itself.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>168.0.1:8888,443 nmap \u2013p<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>With the -p parameter, you can search for several ports by separating each one with a comma.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -p 80,443 192.168.0.1<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>By indicating a range with a hyphen, you can use the -p flag to scan for multiple ports as well.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -p 80-443 192.168.0.1<\/code><\/li>\n<\/ul>\n\n\n\n<p>The parameter -r can be added to the command to scan ports sequentially rather than randomly. To find the most popular ports up to that number, you may alternatively use the command \u2014top-ports followed by a number.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"8_Conduct_a_Stealth_Mode_Scan\"><\/span><strong>8: Conduct a Stealth Mode Scan.<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><u>Use the Nmap command below to perform a stealthy scan if necessary:<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>168.0.1 with nmap -sS<\/code><\/li>\n<\/ul>\n\n\n\n<p>A TCP SYN stealth scan will start when the -sS flag is used. Other Nmap command types may be used in conjunction with the -sS parameter. This type of scan is slower than other options, and it might not be as aggressive.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"9_Recognize_hostnames\"><\/span><strong>9:&nbsp; Recognize hostnames<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><u>Nmap can be used to implement host discovery in a few different ways. The most typical of these is via -sL. For example<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -sL 192.168.0.1<\/code><\/li>\n<\/ul>\n\n\n\n<p>By performing a DNS query for each hostname, the -sL flag will locate the hostnames for the specified host. Additionally, DNS resolution can be skipped with the -n option and always resolved with the -R flag. Using the -Pn switch will completely omit host discovery; otherwise, hosts will be assumed to be online.<\/p>\n\n\n\n<p>See How to <a href=\"https:\/\/arzhost.com\/blogs\/how-to-list-users-in-linux\/\"><strong>List Users In Linux The System awk Command<\/strong><\/a> for better details.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"10_Scan_from_a_File\"><\/span><strong>10: Scan from a File <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><u>You can directly import a file using the command line if you need to scan a big list of addresses.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>\/file.txt nmap -iL<\/code><\/li>\n<\/ul>\n\n\n\n<p>The supplied IP addresses will be scanned as a result of this. You can add more commands and flags in addition to scanning those IP addresses. If there is a collection of hosts that you often need to reference.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"11_Use_Verbose_to_Gather_More_Information\"><\/span><strong>11: Use Verbose to Gather More Information<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>You typically get a lot more information about a command from a verbose output. This output is sometimes superfluous. However, you can set the provided command to verbose mode if you&#8217;re troubleshooting a particularly complex issue or you want more details.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -v 192.168.0.1<\/code><\/li>\n<\/ul>\n\n\n\n<p>The -v flag will reveal more details about an accomplished scan. Most commands can have it added to provide additional information. Without the -v flag, Nmap often just returns the most important data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"12_Detect_IPv6_Addresses\"><\/span><strong>12: Detect IPv6 Addresses <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Nmap supports IPv6, which is becoming more widespread, in the same way as it supports domains and earlier IP addresses. Any of the Nmap commands available supports IPv6.<\/p>\n\n\n\n<p><u>However, a flag is necessary to inform Nmap that an IPv6 address is being referenced.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -6: ffff:c0a8:1<\/code><\/li>\n<\/ul>\n\n\n\n<p>If you want to use IPv6 for more difficult Nmap operations, combine the -6 option with other flags.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"13_Check_the_Active_Servers_List\"><\/span><strong>13: &nbsp;Check the Active Servers List<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Pinging active machines is one of Nmap&#8217;s most basic capabilities. The -sP command can be used to find machines, check that they are responding, or find unanticipated machines on a network.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>168.0.0\/24; nmap<\/code><\/li>\n<\/ul>\n\n\n\n<p>A list of the computers that are active and available will be generated by the -sP command.<\/p>\n\n\n\n<div class=\"wp-block-uagb-call-to-action uagb-block-349afcb9 wp-block-button uag-blocks-common-selector\" style=\"--z-index-desktop:479;;--z-index-tablet:undefined;;--z-index-mobile:undefined;\"><div class=\"uagb-cta__wrap\"><h2 class=\"uagb-cta__title\"><span class=\"ez-toc-section\" id=\"One_Payment_Infinite_Possibilities%E2%80%94Unlock_59_Off_Lifetime_Hosting_Now\"><\/span><a href=\"https:\/\/arzhost.com\/lifetime-web-hosting\/\" data-type=\"link\" data-id=\"https:\/\/arzhost.com\/lifetime-web-hosting\/\">One Payment, Infinite Possibilities\u2014Unlock 59% Off Lifetime Hosting Now!<\/a><span class=\"ez-toc-section-end\"><\/span><\/h2><p class=\"uagb-cta__desc\">Endless Hosting, One-Time Investment\u2014<strong>Secure Your Lifetime Hosting Today<\/strong> and <strong>Save<\/strong>!<\/p><\/div><div class=\"uagb-cta__buttons\"><a href=\"https:\/\/arzhost.com\/lifetime-web-hosting\/\" class=\"uagb-cta__button-link-wrapper wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\">Read More<\/a><\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"14_Find_Host_Interfaces_Routes_and_Packets_versions\"><\/span><strong>14: Find Host Interfaces, Routes, and Packets versions<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><u>Locating host interfaces, print interfaces, and routes for debugging may be required.<\/u><\/p>\n\n\n\n<p><u>Use the \u2014iflist command to accomplish this.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>\u2014iflist nmap<\/code><\/li>\n<\/ul>\n\n\n\n<p><u>The relevant interfaces and routes will be listed using the \u2014list command.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>\u2014packet-trace nmap<\/code><\/li>\n<\/ul>\n\n\n\n<p>A similar value for debugging is offered by \u2014packet trace, which will display packets sent and received.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"15_Rapid_and_aggressive_scans\"><\/span><strong>15: Rapid and aggressive scans<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>You might occasionally need to scan more aggressively or just quickly. The timing mechanisms can be used to control this. Timing governs the speed and depth of the scan in Nmap.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -T5 192.168.0.1<\/code><\/li>\n<\/ul>\n\n\n\n<p>Although an aggressive scan will be quicker, it may also be more disruptive and erroneous. T1, T2, T3, and T4 scans are among the alternatives. T3 and T4 timings are sufficient for the majority of scans.<\/p>\n\n\n\n<p>better learn to <a href=\"https:\/\/arzhost.com\/blogs\/change-file-permissions-recursively-chmod-linux\/\"><strong>Change File Permissions Recursively with chmod in Linux<\/strong><\/a> to make sure your files remain safe and secure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"16_Seek_Assistance\"><\/span><strong>16: Seek Assistance<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><u>Use a tag to acquire context-based information if you have any questions regarding Nmap or any of the provided commands.<\/u><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap \u2013h<\/code><\/li>\n<\/ul>\n\n\n\n<p>The -h tag will display the Nmap command help screen, which includes details on the possible flags.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"17_While_Scanning_create_decoys\"><\/span><strong>17: While Scanning, create decoys<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>To trick firewalls, decoys can also be made using Nmap. Although decoys can be used for evil, they are typically utilized for debugging.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -D 192.168.0.1,192.168.0.2, ...<\/code><\/li>\n<\/ul>\n\n\n\n<p>When using the -D command, you have the option of adding a list of dummy addresses after the command. These decoy addresses will likewise appear to be scanning the network to conceal the true scan that is taking place.<\/p>\n\n\n\n<p>Similar to how \u2014spoof-mac may be used to spoof a <strong>Nmap MAC address<\/strong>, the command -S can be used to spoof a source address.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Final_Remarks\"><\/span><strong>Final Remarks <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>You may quickly get information about ports, routes, and firewalls by using the appropriate<strong> Nmap for Linux Networking<\/strong>. A system administrator can investigate Nmap&#8217;s many settings and flags. Along with the ability to launch decoys, run in cloaked mode, and aggressively and quickly scan for potential vulnerabilities.<\/p>\n\n\n\n<p><strong>Read More:<\/strong><\/p>\n\n\n<ul class=\"wp-block-latest-posts__list wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/arzhost.com\/blogs\/how-to-fix-403-forbidden-error-wordpress\/\">How To Fix 403 Forbidden Error WordPress<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/arzhost.com\/blogs\/how-to-get-the-most-out-of-claude-ai\/\">How To Get The Most Out Of Claude Ai<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/arzhost.com\/blogs\/bad-gateway-error-502-the-ultimate-guide-to-quick-fixes\/\">Bad Gateway Error (502): The Ultimate Guide to Quick Fixes<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/arzhost.com\/blogs\/a-deep-dive-into-todays-best-linux-distros\/\">A Deep Dive Into Today\u2019s Best Linux Distros<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/arzhost.com\/blogs\/domain-investor-terms-powerful-strategy\/\">Domain Investor Terms: Expert Insight on Powerful Strategy<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Introduction to Nmap: Basics of Linux Networking One of the first and most adaptable networking tools is Nmap \u2013 Basic Commands for Linux Network. Nmap is used by network administrators to find, examine, and map networks in a variety of scenarios. The command-line tool&#8217;s wealth of features is essential for security and troubleshooting. This article [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6125,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31],"tags":[274,198,272,271,273],"table_tags":[],"class_list":["post-4657","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","tag-basics","tag-linux","tag-network","tag-nmap","tag-scanning"],"_links":{"self":[{"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/posts\/4657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/comments?post=4657"}],"version-history":[{"count":6,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/posts\/4657\/revisions"}],"predecessor-version":[{"id":12220,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/posts\/4657\/revisions\/12220"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/media\/6125"}],"wp:attachment":[{"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/media?parent=4657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/categories?post=4657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/tags?post=4657"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/arzhost.com\/blogs\/wp-json\/wp\/v2\/table_tags?post=4657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}