Complete NMAP command cheatsheet with practical examples
nmap -sn 192.168.1.0/24Ping scan (no port scan)
nmap -Pn targetSkip host discovery (assume host is alive)
nmap -PR 192.168.1.0/24ARP ping scan (local network)
nmap -PS22,80,443 targetTCP SYN ping on specific ports
nmap -PA80,443 targetTCP ACK ping on specific ports
nmap targetDefault TCP SYN scan (top 1000 ports)
nmap -sS targetTCP SYN scan (stealth scan)
nmap -sT targetTCP Connect scan (full connection)
nmap -sU targetUDP scan
nmap -sF targetTCP FIN scan
nmap -sN targetTCP NULL scan
nmap -p 80 targetSingle port
nmap -p 80,443 targetMultiple specific ports
nmap -p 1-100 targetPort range
nmap -p- targetAll 65535 ports
nmap --top-ports 100 targetScan top 100 most common ports
nmap -F targetFast scan (top 100 ports)
nmap -sV targetService version detection
nmap -A targetAggressive scan (OS, version, scripts)
nmap -O targetOperating system detection
nmap -sC targetDefault scripts
nmap --script vuln targetVulnerability detection scripts
nmap -T0 targetParanoid timing (very slow)
nmap -T1 targetSneaky timing (slow)
nmap -T3 targetNormal timing (default)
nmap -T4 targetAggressive timing (fast)
nmap -T5 targetInsane timing (very fast)
nmap -f targetFragment packets
nmap -D decoy1,decoy2,ME targetDecoy scan
nmap --source-port 53 targetSpoof source port
nmap --data-length 25 targetAppend random data
nmap --randomize-hosts targetRandomize target order