Nmap Commands

Fast Scan

Cyber security experts, network administrators using Nmap (“Network Mapper”) open source tool for network exploration and security auditing. If you want to scan your target with nmap tool without any additional installations, skills, or it is lazy to configure or open terminal and enter this commands then nmap.online for you.

nmap command

nmap -F [hostname]

[hostname] is your host name or IP address

This command scan just the most popular 100 ports with the -F (fast scan) option.

Port scan

nmap command

nmap -sV -p 21,22,25,80,110,143,443,445 [hostname]

[hostname] - is your domain name or IP address

TCP scan for FTP(21), SSH(22), SMTP(25), HTTP(80), POP(110), IMAP(143), HTTPS(443), SMB(445). Service detection (-sV) is also enabled in this port scanning configuration and you will get the version of the running services.

Scan OS information and Traceroute

nmap command

nmap -A [hostname]

[hostname] is your host name or IP address

To identify operating system (OS) on target, which is useful for an inventory sweep of your network. 
Use the -A switch to determine the OS for a remote system.

OS Detection

nmap command

nmap -O [hostname]

[hostname] - is your domain name or IP address

One of Nmap's best-known features is remote OS detection using TCP/IP stack fingerprinting. Nmap sends a series of TCP and UDP packets to the remote host and examines practically every bit in the responses. 
Command with -O Enables OS detection on nmap scan.