You can scan a range of IP address using a wildcard: at 16:38, 0.00s elapsedĭiscovered open port 80/tcp on 192.168.1.1ĭiscovered open port 22/tcp on 192.168.1.1Ĭompleted SYN Stealth Scan at 16:38, 0.27s elapsed (1000 total ports) 4: Scan multiple IP address or subnet (IPv4): at 16:38Ĭompleted Parallel DNS resolution of 1 host. Initiating Parallel DNS resolution of 1 host. # nmap -v -A 192.168.1.1 Sample outputs: Starting Nmap 5.00 ( ) at 16:38 ISTĬompleted ARP Ping Scan at 16:38, 0.04s elapsed (1 total hosts) # nmap 192.168.1.1 3: Information out of the remote system: Nmap version 5.51 ( ) 2: To scan an IP address or a host name (FQDN), run: TOP NMAP COMMEANDS: 1: To find out nmap version, run: # nmap -version Sample outputs: This is important because it lends Nmap its vibrant development and user support communities. It is among the top ten (out of 30,000) programs at the Freshmeat.Net repository.
0 Comments
Leave a Reply. |