Select the type of action you want

Nmap command generator and full cheat sheet

Use my free Nmap command generator tool. You can select the type of scan you would like to do and the generator will quickly provide you the correct Nmap query which you can copy and paste directly into your terminal.

What is Nmap

Nmap is an abbreviation for Network Mapper. It is an open-source Linux command-line tool used to scan IP addresses and ports on a network and to detect installed applications. With Nmap, network administrators can find which devices are running on their network, discover open ports and services, and detect vulnerabilities.

Gordon Lyon (pseudonym Fyodor) wrote Nmap as a tool to easily map an entire network and find the open ports and services. Nmap has become extremely popular and has been featured in films such as The Matrix and the hit series Mr. Robot.

How to use the Nmap command generator tool

Time needed: 1 minute.

This is a quick guide on how to use the Nmap command generator tool.

  1. Provide the IP address

    If you want to scan a specific IP or range, then make sure that you add the IP address in the provided field. If this is not done, the default IP address ‘1.1.1.1’ will be used. This can of course be replaced.

  2. Make your choice

    Navigate to the drop down menu and select the type of Nmap scan you want to perform. The query for that scan will be given to you. If an IP address is provided, that IP address will be used in creation of the query.

  3. Copy and paste

    Copy and paste the generated Nmap query into your terminal and enjoy the results of your Nmap scan.

Screenshot of the Nmap command generator tool

Will you perform the scan?

No, this is just a quick command generator tool, I will not perform any Nmap action provided with the data.

Disclaimer

The commands are provided as is, you are responsible for your actions performed with these commands. I personally just like to create these type of tools.

Nmap Cheatsheet

Specific IP or Host queries

Scan a single IPnmap 192.168.1.1
Scan a hostnmap www.cyberwarzone.com
Scan a range of IPsnmap 192.168.1.1-20
Scan a subnetnmap 192.168.1.0/24
Scan targets from a text filenmap -iL my-nmap-ips.txt
Some queries you can use to scan an IP address or a specific host

Specific port queries

Scan a single Portnmap -p 22 192.168.1.1
Scan a range of portsnmap -p 1-100 192.168.1.1
Scan 100 most common ports (Fast)nmap -F 192.168.1.1
Scan all 65535 portsnmap -p- 192.168.1.1
Nmap queries to perform port scans

Specific scanning profiles for Nmap

Scan using TCP connectnmap -sT 192.168.1.1
Scan using TCP SYN scan (default)nmap -sS 192.168.1.1
Scan UDP portsnmap -sU -p 123,161,162 192.168.1.1
Scan selected ports – ignore discoverynmap -Pn -F 192.168.1.1
Nmap profile port scans
Share this information