Nmap Commands
Fast Scan
Cyber security experts, network administrators using Nmap (“Network Mapper”) open source tool for network exploration and security auditing. If you want to scan your target with nmap tool without any additional installations, skills, or it is lazy to configure or open terminal and enter this commands then nmap.online for you.
nmap command
nmap -F [hostname]
[hostname] is your host name or IP address
This command scan just the most popular 100 ports with the -F (fast scan) option.
Port scan
nmap command
nmap -sV -p 21,22,25,80,110,143,443,445 [hostname]
[hostname] - is your domain name or IP address
TCP scan for FTP(21), SSH(22), SMTP(25), HTTP(80), POP(110), IMAP(143), HTTPS(443), SMB(445). Service detection (-sV) is also enabled in this port scanning configuration and you will get the version of the running services.
Scan OS information and Traceroute
nmap command
nmap -A [hostname]
[hostname] is your host name or IP address
To identify operating system (OS) on target, which is useful for an inventory sweep of your network.
Use the -A switch to determine the OS for a remote system.
OS Detection
nmap command
nmap -O [hostname]
[hostname] - is your domain name or IP address
One of Nmap's best-known features is remote OS detection using TCP/IP stack fingerprinting. Nmap sends a series of TCP and UDP packets to the remote host and examines practically every bit in the responses.
Command with -O Enables OS detection on nmap scan.