{"id":20880,"date":"2021-04-03T23:09:24","date_gmt":"2021-04-03T17:39:24","guid":{"rendered":"https:\/\/valeurbit.com\/blog\/?p=20880"},"modified":"2021-04-03T23:12:08","modified_gmt":"2021-04-03T17:42:08","slug":"nmap-commands-anonymous-port-scanning","status":"publish","type":"post","link":"https:\/\/valeurbit.com\/blog\/nmap-commands-anonymous-port-scanning\/","title":{"rendered":"Nmap Commands | Anonymous Port Scanning"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">1. Scan One Host or IP Address<\/h3>\n\n\n\n<p>Scan&nbsp;&nbsp;<strong>Specific IP Address<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap 192.168.1.1<\/pre>\n\n\n\n<p>Scan server by&nbsp;&nbsp;<strong>Hostname<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap server.valeurbit.com<\/pre>\n\n\n\n<p>Increase the&nbsp;&nbsp;<strong>Level of Detail of<\/strong>&nbsp;&nbsp;scan results:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -v server.valeurbit.com\n$ nmap -vv server.valeurbit.com<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">2. Scanning Multiple IP Addresses<\/h3>\n\n\n\n<p>Scan&nbsp;&nbsp;<strong>Multiple IP Addresses<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap 192.168.1.1 192.168.1.2 192.168.1.3\n$ namp 192.168.1.1,2,3<\/pre>\n\n\n\n<p>Scan&nbsp;&nbsp;<strong>Subnet<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap 192.168.1.0\/24\n$ nmap 192.168.1. *<\/pre>\n\n\n\n<p>Scan&nbsp;&nbsp;<strong>IP Address Range<\/strong>&nbsp;&nbsp;(192.168.1.0 &#8211; 192.168.1.200):<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap 192.168.1.0-200<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">3. Searching for Active Computers on the Net<\/h3>\n\n\n\n<p>Scan the network for&nbsp;&nbsp;<strong>Active Hosts<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -sn 192.168.1.0\/24<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">4. Scanning the Host List from File<\/h3>\n\n\n\n<p>Scanning a list of hosts \/ networks from a&nbsp;&nbsp;<strong>File<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -iL input.txt<\/pre>\n\n\n\n<p>File format:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"># Entries can be submitted in any of the formats with which it works\n# Nmap from the command line (IP addresses, hostnames, CIDR, IPv6, or octet\n# ranges). Entries must be separated by one or more spaces, tabs\n# or line breaks.\n\n$ cat input.txt\nserver.valeurbit.com\n192.168.1.0\/24\n192.168.2.1,2,3\n192.168.3.0-200<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">5. Excluding IP \/ Hosts \/ Networks from Scanning<\/h3>\n\n\n\n<p><strong>Exclude Targets<\/strong>&nbsp;&nbsp;from Nmap scans:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap 192.168.1.0\/24 --exclude 192.168.1.1\n$ nmap 192.168.1.0\/24 --exclude 192.168.1.1 192.168.1.5\n$ nmap 192.168.1.0\/24 --exclude 192.168.1.1,2,3<\/pre>\n\n\n\n<p><strong>Exclude List of<\/strong>&nbsp;&nbsp;hosts taken from file:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap 192.168.1.0\/24 --excludefile exclude.txt<\/pre>\n\n\n\n<p>The excluded hosts file format is the same as above.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Scanning Specific Ports<\/h3>\n\n\n\n<p>Scan&nbsp;&nbsp;<strong>One Port<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -p 80 192.168.1.1<\/pre>\n\n\n\n<p>Scan&nbsp;&nbsp;<strong>Multiple Ports<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -p 80,443 192.168.1.1<\/pre>\n\n\n\n<p>Scan&nbsp;&nbsp;<strong>Port Range<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -p 80-1000 192.168.1.1<\/pre>\n\n\n\n<p>Scan&nbsp;&nbsp;<strong>All Ports<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -p \"*\" 192.168.1.1<\/pre>\n\n\n\n<p>Scan some of the most&nbsp;&nbsp;<strong>Common Ports<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap --top-ports 5 192.168.1.1\n$ nmap --top-ports 10 192.168.1.1<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">7. Determine Supported IP Protocols<\/h3>\n\n\n\n<p>Determine which&nbsp;&nbsp;<strong>IP Protocols<\/strong>&nbsp;&nbsp;(TCP, UDP, ICMP, etc.) the scanned host supports:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -sO 192.168.1.1<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">8. Scanning TCP \/ UDP Ports<\/h3>\n\n\n\n<p>Scan&nbsp;&nbsp;<strong>all TCP Ports<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -sT 192.168.1.1<\/pre>\n\n\n\n<p>Scan&nbsp;&nbsp;<strong>specific TCP Ports<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -p T: 80 192.168.1.1<\/pre>\n\n\n\n<p>Scan&nbsp;&nbsp;<strong>all UDP Ports<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -sU 192.168.1.1<\/pre>\n\n\n\n<p>Scan&nbsp;&nbsp;<strong>specific UDP Ports<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -p U: 53 192.168.1.1<\/pre>\n\n\n\n<p>Combining scans of different ports:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -p U: 53,79,113, T: 21-25,80,443,8080 192.168.1.1<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">9. Fast Scan<\/h3>\n\n\n\n<p>Activate&nbsp;&nbsp;<strong>Fast<\/strong>&nbsp;&nbsp;Scan&nbsp;<strong>Mode<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -F 192.168.1.1<\/pre>\n\n\n\n<p>*&nbsp;&nbsp;<em>Scans fewer ports than normal scan.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">10. Show Port Status Reason<\/h3>\n\n\n\n<p>Show&nbsp;&nbsp;<strong>Reason<\/strong>&nbsp;Nmap thinks the port is in a particular state:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap --reason 192.168.1.1<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">11. Show Only Open Ports<\/h3>\n\n\n\n<p>Show&nbsp;&nbsp;<strong>Only Open Ports<\/strong>&nbsp;&nbsp;(or possibly open):<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap --open 192.168.1.1<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">12. Definition of OS<\/h3>\n\n\n\n<p>One of the most well-known features of Nmap is remote OS detection based on analysis of the TCP \/ IP stack.<\/p>\n\n\n\n<p>Nmap sends a series of TCP and UDP packets to the remote host and examines the responses.<\/p>\n\n\n\n<p>After running many tests, Nmap compares the results with its database and, when a match is found, displays information about the OS.<\/p>\n\n\n\n<p>Enable&nbsp;&nbsp;<strong>OS Detection<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -O 192.168.1.1<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">13. Determining the Version of the Services<\/h3>\n\n\n\n<p>Enable&nbsp;&nbsp;<strong>Service Version Detection<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -sV 192.168.1.1<\/pre>\n\n\n\n<p>*&nbsp;&nbsp;<em>Determines the versions of programs running on the remote server.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">14. Firewall detection<\/h3>\n\n\n\n<p>Find out if the computer is protected by any&nbsp;&nbsp;<strong>Packet Filters<\/strong>&nbsp;&nbsp;or&nbsp;&nbsp;<strong>Firewall<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -sA 192.168.1.1<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">15. Spoofing MAC Address<\/h3>\n\n\n\n<p>Spoof&nbsp;&nbsp;<strong>MAC Addresses<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap --spoof-mac 00: 11: 22: 33: 44: 55 192.168.1.1<\/pre>\n\n\n\n<p>Spoof MAC Address with&nbsp;&nbsp;<strong>Random MAC<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap --spoof-mac 0 192.168.1.1<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">16. Scanning the Firewall for Vulnerabilities<\/h3>\n\n\n\n<p>These three types of scans exploit an invisible loophole in the&nbsp;&nbsp;<a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc793.txt\" target=\"_blank\" rel=\"noreferrer noopener\">TCP RFC<\/a>&nbsp;to distinguish between open and closed ports.<\/p>\n\n\n\n<p>When an RFC-compliant system is scanned, any packet that does not have the SYN, RST, or ACK bit set will cause an RST to be sent in response if the port is closed, or no response if the port is open.<\/p>\n\n\n\n<p>Because&nbsp;none of these bits are set, then any combination of the three remaining bits (FIN, PSH and URG) will be correct.<\/p>\n\n\n\n<p><strong>TCP Null<\/strong>&nbsp;&nbsp;Scan:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -sN 192.168.1.1<\/pre>\n\n\n\n<p>*&nbsp;&nbsp;<em>No bits are set (Flags in TCP header 0).<\/em><\/p>\n\n\n\n<p><strong>TCP Fin<\/strong>&nbsp;&nbsp;Scan:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -sF 192.168.1.1<\/pre>\n\n\n\n<p>*&nbsp;&nbsp;<em>Only the TCP FIN bit is set.<\/em><\/p>\n\n\n\n<p><strong>TCP Xmas<\/strong>&nbsp;&nbsp;scan:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -sX 192.168.1.1<\/pre>\n\n\n\n<p>*&nbsp;&nbsp;<em>FIN, PSH and URG flags are set (the package glows like a Christmas tree).<\/em><\/p>\n\n\n\n<p>Hosts using a firewall may not respond to standard ICMP pings.<\/p>\n\n\n\n<p>Try the following methods to detect connected hosts if the firewall is blocking standard ICMP pings:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"># TCP SYN Ping\n$ nmap -sn -PS 192.168.1.0\/24\n\n# TCP ACK Ping\n$ nmap -sn -PA 192.168.1.0\/24\n\n# UDP Ping\n$ nmap -sn -PU 192.168.1.0\/24\n\n# Ping over IP Protocol\n$ nmap -sn -PO 192.168.1.0\/24\n\n# ARP Ping\n$ nmap -sn -PR 192.168.1.0\/24<\/pre>\n\n\n\n<p>The last three commands must be run as root.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">17. Covert Scan<\/h3>\n\n\n\n<p><strong>TCP SYN<\/strong>&nbsp;&nbsp;scan:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -sS 192.168.0.1<\/pre>\n\n\n\n<p>*&nbsp;&nbsp;<em>Known as scanning with half-open connections, as it does not open full TCP connections.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">18. Disable Host Discovery (No Ping)<\/h3>\n\n\n\n<p>Do not ping hosts before scanning:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -Pn 192.168.1.1<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">19. Disable DNS Usage<\/h3>\n\n\n\n<p>Never perform reverse DNS resolution for every active IP address found:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -n 192.168.1.1<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">20. Saving Nmap Scan Results to File<\/h3>\n\n\n\n<p>Save Nmap scan result to&nbsp;&nbsp;<strong>Text File<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap 192.168.1.1&gt; output.txt\n$ nmap -oN output.txt 192.168.1.1<\/pre>\n\n\n\n<p>Save Nmap Scan Result to&nbsp;&nbsp;<strong>XML File<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ nmap -oX output.xml 192.168.1.1<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Anonymous Port Scanning: Nmap + Tor + ProxyChains<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">Installing Tor + Nmap + ProxyChains<\/h4>\n\n\n\n<p>To perform anonymous port scanning, we need to install the following programs:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Program<\/th><th>Description<\/th><\/tr><tr><td>tor<\/td><td>Anonymizing Network for TCP<\/td><\/tr><tr><td>nmap<\/td><td>Network Port Scanner<\/td><\/tr><tr><td>proxychains<\/td><td>Redirects connections through proxy servers<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Tor<\/h4>\n\n\n\n<p>Install the&nbsp;&nbsp;<strong>Tor<\/strong>&nbsp;&nbsp;client from the standard repositories:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ sudo apt-get install tor<\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Nmap<\/h4>\n\n\n\n<p>Install Nmap:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ sudo apt-get install nmap<\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">ProxyChains<\/h4>\n\n\n\n<p>Install ProxyChains:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ sudo apt-get install proxychains<\/pre>\n\n\n\n<p><strong>ProxyChains<\/strong>&nbsp;&nbsp;is already configured to work with&nbsp;<strong>Tor<\/strong>&nbsp;by default&nbsp;&nbsp;.<\/p>\n\n\n\n<p>You can verify this by looking at&nbsp;&nbsp;<code>\/etc\/proxychains.conf<\/code>.<\/p>\n\n\n\n<p>The last lines of the config should look like this:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[ProxyList]\n# add proxy here ...\n# meanwile\n# defaults set to \"tor\"\nsocks4 127.0.0.1 9050<\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Anonymous Port Scanning Over Tor<\/h4>\n\n\n\n<p>Run the following command to&nbsp;&nbsp;<strong>scan anonymously with Nmap<\/strong>&nbsp;over the&nbsp;&nbsp;<strong>Tor network<\/strong>&nbsp;:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ proxychains nmap -sT -PN -n -sV -p 80,443,21,22 217.xx.xx.xx\nProxyChains-3.1 (http:\/\/proxychains.sf.net)\n\nStarting Nmap 6.00 (http:\/\/nmap.org) at 2014-03-24 17:34 EET\n| S-chain | - &lt;&gt; - 127.0.0.1:9050-&lt;&gt;&lt;&gt;-217.xx.xx.xx:443-&lt;&gt;&lt;&gt;-OK\n| S-chain | - &lt;&gt; - 127.0.0.1:9050-&lt;&gt;&lt;&gt;-217.xx.xx.xx:21-&lt;&gt;&lt;&gt;-OK\n| S-chain | - &lt;&gt; - 127.0.0.1:9050-&lt;&gt;&lt;&gt;-217.xx.xx.xx:80-&lt;&gt;&lt;&gt;-OK\n| S-chain | - &lt;&gt; - 127.0.0.1:9050-&lt;&gt;&lt;&gt;-217.xx.xx.xx:22-&lt;--denied\n\nNmap scan report for 217.xx.xx.xx\nHost is up (0.14s latency).\nPORT STATE SERVICE VERSION\n21 \/ tcp open ftp Pure-FTPd\n22 \/ tcp closed ssh\n80 \/ tcp open http Apache httpd 2.2.26 ((CentOS))\n443 \/ tcp open ssl \/ http Apache httpd 2.2.26 ((CentOS))<\/pre>\n\n\n\n<p>In the scan logs, we can see a &#8216;chain&#8217; that goes from the&nbsp;&nbsp;<strong>Tor<\/strong>&nbsp;proxy (127.0.0.1:9050) to the host being scanned (217.xx.xx.xx).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Nmap over Tor: Bypassing Node Blocking<\/h4>\n\n\n\n<p>We may face a situation where the scan fails due to the fact that the Tor exit nodes are blocked (banned by the host being scanned).<\/p>\n\n\n\n<p>A way out of this situation can be adding an ordinary&nbsp;<strong>public proxy server<\/strong>&nbsp;to the &#8216;chain&#8217;&nbsp;&nbsp;.<\/p>\n\n\n\n<p>This is done by editing&nbsp;&nbsp;<code>\/etc\/proxychains.conf<\/code>&nbsp;and adding a new entry at the end of&nbsp;&nbsp;<strong>[ProxyList]<\/strong>&nbsp;&nbsp;(also make sure the&nbsp;<em>random_chain<\/em>&nbsp;option&nbsp;&nbsp;<em>is<\/em>&nbsp;&nbsp;off).<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">[ProxyList]\n# add proxy here ...\n# meanwile\n# defaults set to \"tor\"\nsocks4 127.0.0.1 9050\nsocks4 115.71.237.212 1080<\/pre>\n\n\n\n<p>The new &#8216;chain&#8217; goes through the&nbsp;&nbsp;<strong>Tor<\/strong>&nbsp;proxy (127.0.0.1:9050) to the&nbsp;<strong>public proxy server<\/strong>&nbsp;we specified&nbsp;&nbsp;&nbsp;(115.71.237.212:1080) and then to the scanned host (217.xx.xx.xx).<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">$ proxychains nmap -sT -PN -n -sV -p 21 217.xx.xx.xx\nProxyChains-3.1 (http:\/\/proxychains.sf.net)\n\nStarting Nmap 6.00 (http:\/\/nmap.org) at 2014-03-25 11:05 EET\n| S-chain | - &lt;&gt; - 127.0.0.1:9050-&lt;&gt;-115.71.237.212:1080-&lt;&gt;&lt;&gt;-217.xx.xx.xx:21-&lt;&gt;&lt;&gt;-OK\n| S-chain | - &lt;&gt; - 127.0.0.1:9050-&lt;&gt;-115.71.237.212:1080-&lt;&gt;&lt;&gt;-217.xx.xx.xx:21-&lt;&gt;&lt;&gt;-OK\nNmap scan report for 217.xx.xx.xx\nHost is up (1.2s latency).\nPORT STATE SERVICE VERSION\n21 \/ tcp open ftp Pure-FTPd<\/pre>\n\n\n\n<p>In the examples above, I run&nbsp;&nbsp;<strong>nmap<\/strong>&nbsp;&nbsp;with the following options:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Option<\/th><th>Description<\/th><\/tr><tr><td>-sT<\/td><td>full TCP scan<\/td><\/tr><tr><td>-PN<\/td><td>skip host discovery<\/td><\/tr><tr><td>-n<\/td><td>never resolve DNS (to avoid DNS leaks)<\/td><\/tr><tr><td>-sV<\/td><td>determine service version<\/td><\/tr><tr><td>-p<\/td><td>which ports to scan<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Scanning through Tor is very slow.&nbsp;Therefore, in the examples above, I only scanned certain ports.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Scan One Host or IP Address Scan&nbsp;&nbsp;Specific IP Address&nbsp;: $ nmap 192.168.1.1 Scan server by&nbsp;&nbsp;Hostname&nbsp;: $ nmap server.valeurbit.com Increase the&nbsp;&nbsp;Level of Detail of&nbsp;&nbsp;scan results: $ nmap -v server.valeurbit.com $ nmap -vv server.valeurbit.com 2. Scanning Multiple IP Addresses Scan&nbsp;&nbsp;Multiple IP Addresses&nbsp;: $ nmap 192.168.1.1 192.168.1.2 192.168.1.3 $ namp 192.168.1.1,2,3 Scan&nbsp;&nbsp;Subnet&nbsp;: $ nmap 192.168.1.0\/24 $ nmap&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Nmap Commands | Anonymous Port Scanning | ValeurBit Infosec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/valeurbit.com\/blog\/nmap-commands-anonymous-port-scanning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nmap Commands | Anonymous Port Scanning | ValeurBit Infosec\" \/>\n<meta property=\"og:description\" content=\"1. Scan One Host or IP Address Scan&nbsp;&nbsp;Specific IP Address&nbsp;: $ nmap 192.168.1.1 Scan server by&nbsp;&nbsp;Hostname&nbsp;: $ nmap server.valeurbit.com Increase the&nbsp;&nbsp;Level of Detail of&nbsp;&nbsp;scan results: $ nmap -v server.valeurbit.com $ nmap -vv server.valeurbit.com 2. Scanning Multiple IP Addresses Scan&nbsp;&nbsp;Multiple IP Addresses&nbsp;: $ nmap 192.168.1.1 192.168.1.2 192.168.1.3 $ namp 192.168.1.1,2,3 Scan&nbsp;&nbsp;Subnet&nbsp;: $ nmap 192.168.1.0\/24 $ nmap...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/valeurbit.com\/blog\/nmap-commands-anonymous-port-scanning\/\" \/>\n<meta property=\"og:site_name\" content=\"ValeurBit Infosec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/valeurbitinfo\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-03T17:39:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-03T17:42:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:site\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\",\"name\":\"Valeurbit Infosec\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/valeurbitinfo\/\",\"https:\/\/www.instagram.com\/valeurbit\",\"https:\/\/www.linkedin.com\/company\/valeurbit-infosec\/\",\"https:\/\/twitter.com\/valeurbit\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"contentUrl\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"width\":1080,\"height\":512,\"caption\":\"Valeurbit Infosec\"},\"image\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"name\":\"ValeurBit Infosec\",\"description\":\"Cyber Security Company\",\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/valeurbit.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/valeurbit.com\/blog\/nmap-commands-anonymous-port-scanning\/#webpage\",\"url\":\"https:\/\/valeurbit.com\/blog\/nmap-commands-anonymous-port-scanning\/\",\"name\":\"Nmap Commands | Anonymous Port Scanning | ValeurBit Infosec\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\"},\"datePublished\":\"2021-04-03T17:39:24+00:00\",\"dateModified\":\"2021-04-03T17:42:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/nmap-commands-anonymous-port-scanning\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/valeurbit.com\/blog\/nmap-commands-anonymous-port-scanning\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/valeurbit.com\/blog\/nmap-commands-anonymous-port-scanning\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/valeurbit.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nmap Commands | Anonymous Port Scanning\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/valeurbit.com\/blog\/nmap-commands-anonymous-port-scanning\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/nmap-commands-anonymous-port-scanning\/#webpage\"},\"author\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\"},\"headline\":\"Nmap Commands | Anonymous Port Scanning\",\"datePublished\":\"2021-04-03T17:39:24+00:00\",\"dateModified\":\"2021-04-03T17:42:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/nmap-commands-anonymous-port-scanning\/#webpage\"},\"wordCount\":969,\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"articleSection\":[\"Valeurbit\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\",\"name\":\"ValeurBit\",\"sameAs\":[\"https:\/\/valeurbit.com\/blog\"],\"url\":\"https:\/\/valeurbit.com\/blog\/author\/valeurbit\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/20880"}],"collection":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/comments?post=20880"}],"version-history":[{"count":0,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/20880\/revisions"}],"wp:attachment":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/media?parent=20880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/categories?post=20880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/tags?post=20880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}