{"id":34,"date":"2022-10-29T22:11:53","date_gmt":"2022-10-29T22:11:53","guid":{"rendered":"https:\/\/smartserverhost.com\/blog\/?p=34"},"modified":"2022-11-07T23:44:42","modified_gmt":"2022-11-07T23:44:42","slug":"17-basic-nmap-commands-for-linux-network","status":"publish","type":"post","link":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/","title":{"rendered":"17 Basic Nmap Commands for Linux Network"},"content":{"rendered":"\n<p>Nmap is one of the oldest and most flexible networking tools. Network administrators use Nmap Commands to discover, analyze, and map networks under various conditions. The feature-rich command-line tool is essential from a security and troubleshooting perspective.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">What is Nmap?<\/mark><\/strong><\/p>\n\n\n\n<p><strong>Nmap<\/strong> (<strong>N<\/strong>etwork <strong>map<\/strong>per) is an open-source Linux tool for network and security auditing. The tool helps network administrators reveal hosts and services on various systems.<\/p>\n\n\n\n<p>Nmap works both locally and remotely. Typical uses include scanning for open ports, discovering vulnerabilities in a network, network mapping, and maintenance. The tool is valuable from both a security and networking standpoint.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Nmap Commands<\/mark><\/strong><\/p>\n\n\n\n<p>The <strong><code>nmap<\/code><\/strong> the command comes with many options and uses cases depending on the situation at hand. Below are some of the most common and useful <strong><code>nmap<\/code> commands in Linux with examples<\/strong>.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Nmap Command to Scan for Open Ports<\/mark><\/strong><\/p>\n\n\n\n<p>When scanning hosts, Nmap commands can use <a href=\"https:\/\/smartserverhost.com\/budget-dedicated-servers\" target=\"_blank\" rel=\"noreferrer noopener\">server<\/a> names, IPV4 addresses, or IPV6 addresses. A basic Nmap command will produce information about the given host.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap subdomain.smartserverhost.com\u200b<\/code><\/pre>\n\n\n\n<p>Without flags, as written above, Nmap reveals open services and ports on the given host or hosts.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap 192.168.0.1<\/code><\/pre>\n\n\n\n<p>Nmap can reveal open services and ports by IP address as well as by domain name.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -F 192.168.0.1<\/code><\/pre>\n\n\n\n<p>If you need to perform a scan quickly, you can use the <strong><code>-F<\/code><\/strong> flag. The <strong><code>-F<\/code><\/strong> the flag will list ports on the <em>Nmap-services<\/em> files. Because the <strong><code>-F<\/code><\/strong> &#8220;Fast Scan&#8221; flag does not scan as many ports, it isn\u2019t as thorough.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Scan Multiple Hosts<\/mark><\/strong><\/p>\n\n\n\n<p>Nmap can scan multiple locations at once rather than scanning a single host at a time. This is useful for more extensive network infrastructures. There are several ways to scan numerous locations at once, depending on how many locations you need to examine.<\/p>\n\n\n\n<p>Add multiple domains or multiple IP addresses in a row to scan multiple hosts at the same time.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap 192.168.0.1 192.168.0.2 192.168.0.3<\/code><\/pre>\n\n\n\n<p>Use the <strong><code>*<\/code><\/strong> wildcard to scan an entire subnet at once.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap 192.168.0.* <\/code><\/pre>\n\n\n\n<p>Separate different address endings with commas rather than typing out the entire IP address.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap 192.168.0.1,2,3<\/code><\/pre>\n\n\n\n<p>Use a hyphen to scan a range of IP addresses.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap 192.168.0.1-4<\/code><\/pre>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Excluding Hosts from Search<\/mark><\/strong><\/p>\n\n\n\n<p>When scanning a network, you may want to select an entire group (such as a whole subnet) while excluding a single host.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap 192.168.0.* --exclude 192.168.0.2<\/code><\/pre>\n\n\n\n<p>You can exclude certain hosts from your search using the <strong><code>-exclude<\/code><\/strong> flag.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap 192.168.0.* --excludefile \/file.txt<\/code><\/pre>\n\n\n\n<p>You can also exclude a list of hosts from your search using the <strong><code>-exclude<\/code><\/strong> flag and linking to a specific file. This is the easiest way to exclude multiple hosts from your search.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Scan to Find out OS Information<\/mark><\/strong><\/p>\n\n\n\n<p>In addition to general information, Nmap can also provide <strong>operating system<\/strong> detection, script scanning, traceroute, and version detection. It\u2019s important to note that Nmap will do its best to identify things like operating systems and versions, but it may not always be entirely accurate.<\/p>\n\n\n\n<p>Add in the <strong><code>-A<\/code><\/strong> flag on your Nmap command, so you can discover the operating system information of the hosts that are mapped.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -A 192.168.0.1<\/code><\/pre>\n\n\n\n<p>The <strong><code>-A<\/code><\/strong> flag can be used in combination with other Nmap commands.<\/p>\n\n\n\n<p>Using the <strong><code>-O<\/code><\/strong> flag on your Nmap command will reveal further operating system information of the mapped hosts. The <strong><code>-O<\/code><\/strong> flag enables OS detection.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -O 192.168.0.1<\/code><\/pre>\n\n\n\n<p>Additional tags include <strong><code>-osscan-limit<\/code><\/strong> and <strong><code>-osscan-guess<\/code><\/strong>.<\/p>\n\n\n\n<p>The <strong><code>-osscan-limit<\/code><\/strong> the command will only guess easy operating system targets. The <strong><code>-osscan-guess<\/code><\/strong> command will be more aggressive about guessing operating systems. <mark class=\"annotation-text annotation-text-yoast\" id=\"annotation-text-89535bfa-8835-47f8-b46a-378d4883386b\"><\/mark><mark>Again, operating systems are detected based on certain hallmarks: it isn\u2019t a certainty that the information is accurate.<\/mark><\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Scan to Detect Firewall Settings<\/mark><\/strong><\/p>\n\n\n\n<p>Detecting firewall settings can be useful during penetration testing and vulnerability scans. Several functions can be used to detect firewall settings across the given hosts, but the -sA flag is the most common.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -sA 192.168.0.1<\/code><\/pre>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Find Information About Service Versions<\/mark><\/strong><\/p>\n\n\n\n<p>At times, you may need to detect service and version information from open ports. This is useful for troubleshooting, scanning for vulnerabilities, or locating services that need to be updated.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -sV 192.168.0.1<\/code><\/pre>\n\n\n\n<p>This will give you the necessary information regarding the services across the given host.<\/p>\n\n\n\n<p>You can use <strong><code>--version-intensity<\/code><\/strong> levels from 0 to 9 to determine the intensity level of this search. You can also use &#8211;version-trace to show more detailed information about the scan if the scan does not come out with the results that you would ordinarily expect.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Scan for Ports<\/mark><\/strong><\/p>\n\n\n\n<p>Port scanning is one of the basic utilities that Nmap offers and consequently, there are a few ways that this command can be customized.<\/p>\n\n\n\n<p>With the <strong><code>-p<\/code><\/strong> flag followed by a port, you can scan for information regarding a specific port on a host.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -p 443 192.168.0.1<\/code><\/pre>\n\n\n\n<p>By adding a type of port before the port itself, you can scan for information regarding a specific type of connection.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -p T:8888,443 192.168.0.1<\/code><\/pre>\n\n\n\n<p>You can scan for multiple ports with the <strong><code>-p<\/code><\/strong> flag by separating them with a comma.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -p 80,443 192.168.0.1<\/code><\/pre>\n\n\n\n<p>You can also scan for multiple ports with the <strong><code>-p<\/code><\/strong> flag by marking a range with the hyphen.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -p 80-443 192.168.0.1<\/code><\/pre>\n\n\n\n<p>To scan ports in order rather than randomly, add the flag -r to the command. You can also use the command &#8211;top-ports followed by a number to find the most common ports, up to that amount.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Complete a Scan in Stealth Mode<\/mark><\/strong><\/p>\n\n\n\n<p>If it is necessary to complete a stealthy scan, use the following Nmap command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -sS 192.168.0.1<\/code><\/pre>\n\n\n\n<p>Using the <strong><code>-sS<\/code><\/strong> flag will initiate a stealth scan with TCP SYN. The <strong><code>-sS<\/code><\/strong> flag can be used in conjunction with other types of Nmap commands. However, this type of scan is slower and may not be as aggressive as other options.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Identify Hostnames<\/mark><\/strong><\/p>\n\n\n\n<p>There are a few ways you can implement host discovery through Nmap. The most common of which is through <strong><code>-sL<\/code><\/strong>. For example:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -sL 192.168.0.1<\/code><\/pre>\n\n\n\n<p>The <strong><code>-sL<\/code><\/strong> flag will find the hostnames for the given host, completing a DNS query for each one. Additionally, the <strong><code>-n<\/code><\/strong> option can be used to skip DNS resolution, while the <strong><code>-R<\/code><\/strong> flag can be used to always resolve DNS. The <strong><code>-Pn<\/code><\/strong> flag will skip host discovery entirely, instead of treating hosts as though they are online regardless.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Scan from a File<\/mark><\/strong><\/p>\n\n\n\n<p>If you have a long list of addresses that you need to scan, you can import a file directly through the command line.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -iL \/file.txt<\/code><\/pre>\n\n\n\n<p>This will produce a scan for the given IP addresses. In addition to scanning those IP addresses, you can also add other commands and flags. This is useful if there is a set of hosts that you often need to reference.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Get More Information with Verbose<\/mark><\/strong><\/p>\n\n\n\n<p>A verbose output generally gives you far more information regarding a command. Sometimes this output is unnecessary. However, if you\u2019re debugging a particularly tricky situation or you want more information, you can set the given command to verbose mode.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -v 192.168.0.1<\/code><\/pre>\n\n\n\n<p>The <strong><code>-v<\/code><\/strong> flag will provide additional information about a completed scan. It can be added to most commands to give more information. Without the <strong><code>-v<\/code><\/strong> flag, Nmap will generally return only the critical information available.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Scan IPv6 Addresses<\/mark><\/strong><\/p>\n\n\n\n<p>IPv6 is becoming more commonplace, and Nmap supports it just as it supports domains and older IP addresses. IPv6 works with any of the available Nmap commands. But, a flag is required to tell Nmap that an IPv6 address is being referenced.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -6 ::ffff:c0a8:1<\/code><\/pre>\n\n\n\n<p>Use the <strong><code>-6<\/code><\/strong> option with other flags to perform more complicated Nmap functions with IPv6.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Scan to See Which Servers are Active<\/mark><\/strong><\/p>\n\n\n\n<p>One of the most simple abilities for Nmap is the ability to ping active machines. The <strong><code>-sP<\/code><\/strong> command locates machines, makes sure that machines are responding or identifies unexpected machines across a network.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -sP 192.168.0.0\/24<\/code><\/pre>\n\n\n\n<p>The <strong><code>-sP<\/code><\/strong> the command will produce a list of which machines are active and available.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Find Host Interfaces, Routes, and Packets<\/mark><\/strong><\/p>\n\n\n\n<p>It may become necessary to find host interfaces, print interfaces, and routes to debug.<\/p>\n\n\n\n<p>To do this, use the <strong><code>--iflist<\/code><\/strong> command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap --iflist<\/code><\/pre>\n\n\n\n<p>The <strong><code>--iflist<\/code><\/strong> the command will produce a list of the relevant interfaces and routes.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap --packet-trace<\/code><\/pre>\n\n\n\n<p>Similarly, <strong><code>--packet-trace<\/code><\/strong> will show packets sent and received, providing similar values for debugging.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Aggressive Scans and Timings<\/mark><\/strong><\/p>\n\n\n\n<p>Sometimes you may need to scan more aggressively or want to run a quick scan. You can control this through the use of timing mechanisms. In Nmap, timing controls both the speed and the depth of the scan.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -T5 192.168.0.1<\/code><\/pre>\n\n\n\n<p>An aggressive scan is going to be faster, but it also could be more disruptive and inaccurate. There are other options such as <strong><code>T1<\/code><\/strong>, <strong><code>T2<\/code><\/strong>, <strong><code>T3<\/code><\/strong>, and <strong><code>T4<\/code><\/strong> scans. For most scans, <strong><code>T3<\/code><\/strong> and <strong><code>T4<\/code><\/strong> timings are sufficient.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Get Some Help<\/mark><\/strong><\/p>\n\n\n\n<p>If you have any questions about Nmap or any of the given commands, you can use a tag to get context-based information.<\/p>\n\n\n\n<pre id=\"block-4b15b27d-cc18-42b1-bfee-c5bb0badaeac\" class=\"wp-block-code\"><code>nmap -h<\/code><\/pre>\n\n\n\n<p>The <strong><code>-h<\/code><\/strong> the tag will show the help screen for <a href=\"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/\">Nmap commands<\/a>, including giving information regarding the available flags.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Create Decoys While Scanning<\/mark><\/strong><\/p>\n\n\n\n<p>Nmap can also be used to create decoys, which are intended to fool firewalls. While decoys can be used for nefarious purposes, it\u2019s generally used to debug.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -D 192.168.0.1,192.168.0.2,...<\/code><\/pre>\n\n\n\n<p>When using the <strong><code>-D<\/code><\/strong> command, you can follow the command with a list of decoy addresses. These decoy addresses will also show as though they are scanning the network, to obfuscate the scan that is actually being done.<\/p>\n\n\n\n<p>Similarly, it\u2019s possible to use commands such as <strong><code>--spoof-mac<\/code><\/strong> to spoof a Nmap MAC address, as well as the command <strong><code>-S<\/code><\/strong> to spoof a source address.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">Conclusion<\/mark><\/strong><\/p>\n\n\n\n<p>With the right Nmap commands, you can quickly find out information about ports, routes, and firewalls.<\/p>\n\n\n\n<p>Nmap has several settings and flags for a system administrator to explore. In addition to being able to run in a cloaked mode, initiate decoys, and aggressively and quickly scan for potential vulnerabilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nmap is one of the oldest and most flexible networking tools. Network administrators use Nmap Commands to discover, analyze, and map networks under various conditions. The feature-rich command-line tool is essential from a security and troubleshooting perspective. What is Nmap?<\/p>\n","protected":false},"author":1,"featured_media":35,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-34","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>17 Basic Nmap Commands for Linux Network - SmartServerHost<\/title>\n<meta name=\"description\" content=\"Network administrators use Nmap commands to discover, analyze, and map networks under various conditions. The feature-rich command-line tool\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"17 Basic Nmap Commands for Linux Network - SmartServerHost\" \/>\n<meta property=\"og:description\" content=\"Network administrators use Nmap commands to discover, analyze, and map networks under various conditions. The feature-rich command-line tool\" \/>\n<meta property=\"og:url\" content=\"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/\" \/>\n<meta property=\"og:site_name\" content=\"SmartServerHost\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/smartserverhost\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-29T22:11:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-07T23:44:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/smartserverhost.com\/blog\/wp-content\/uploads\/2022\/10\/nmap-command-examples-for-linux-and-network-admins.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adam\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@smartserverhost\" \/>\n<meta name=\"twitter:site\" content=\"@smartserverhost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/\"},\"author\":{\"name\":\"Adam\",\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/ab21bff2d23cbbfbcd8065b41da2dcc6\"},\"headline\":\"17 Basic Nmap Commands for Linux Network\",\"datePublished\":\"2022-10-29T22:11:53+00:00\",\"dateModified\":\"2022-11-07T23:44:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/\"},\"wordCount\":1527,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/nmap-command-examples-for-linux-and-network-admins.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/\",\"url\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/\",\"name\":\"17 Basic Nmap Commands for Linux Network - SmartServerHost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/nmap-command-examples-for-linux-and-network-admins.png\",\"datePublished\":\"2022-10-29T22:11:53+00:00\",\"dateModified\":\"2022-11-07T23:44:42+00:00\",\"description\":\"Network administrators use Nmap commands to discover, analyze, and map networks under various conditions. The feature-rich command-line tool\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/#primaryimage\",\"url\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/nmap-command-examples-for-linux-and-network-admins.png\",\"contentUrl\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/nmap-command-examples-for-linux-and-network-admins.png\",\"width\":800,\"height\":400,\"caption\":\"nmap-command-examples-for-linux-and-network-admins\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/17-basic-nmap-commands-for-linux-network\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"17 Basic Nmap Commands for Linux Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/\",\"name\":\"SmartServerHost\",\"description\":\"Reliable Network Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/#organization\",\"name\":\"SmartServerHost\",\"url\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/cropped-site_logo.webp\",\"contentUrl\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/cropped-site_logo.webp\",\"width\":263,\"height\":50,\"caption\":\"SmartServerHost\"},\"image\":{\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/smartserverhost\",\"https:\\\/\\\/x.com\\\/smartserverhost\",\"https:\\\/\\\/www.instagram.com\\\/smartserverhost\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/ab21bff2d23cbbfbcd8065b41da2dcc6\",\"name\":\"Adam\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/891734c8740f86e3c3ecdb7f0d3065fc76775a6c3b679c5be1d84a74d8cd3167?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/891734c8740f86e3c3ecdb7f0d3065fc76775a6c3b679c5be1d84a74d8cd3167?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/891734c8740f86e3c3ecdb7f0d3065fc76775a6c3b679c5be1d84a74d8cd3167?s=96&d=mm&r=g\",\"caption\":\"Adam\"},\"sameAs\":[\"https:\\\/\\\/smartserverhost.com\\\/\"],\"url\":\"https:\\\/\\\/smartserverhost.com\\\/blog\\\/author\\\/samar\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"17 Basic Nmap Commands for Linux Network - SmartServerHost","description":"Network administrators use Nmap commands to discover, analyze, and map networks under various conditions. The feature-rich command-line tool","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/","og_locale":"en_US","og_type":"article","og_title":"17 Basic Nmap Commands for Linux Network - SmartServerHost","og_description":"Network administrators use Nmap commands to discover, analyze, and map networks under various conditions. The feature-rich command-line tool","og_url":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/","og_site_name":"SmartServerHost","article_publisher":"https:\/\/www.facebook.com\/smartserverhost","article_published_time":"2022-10-29T22:11:53+00:00","article_modified_time":"2022-11-07T23:44:42+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/smartserverhost.com\/blog\/wp-content\/uploads\/2022\/10\/nmap-command-examples-for-linux-and-network-admins.png","type":"image\/png"}],"author":"Adam","twitter_card":"summary_large_image","twitter_creator":"@smartserverhost","twitter_site":"@smartserverhost","twitter_misc":{"Written by":"Adam","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/#article","isPartOf":{"@id":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/"},"author":{"name":"Adam","@id":"https:\/\/smartserverhost.com\/blog\/#\/schema\/person\/ab21bff2d23cbbfbcd8065b41da2dcc6"},"headline":"17 Basic Nmap Commands for Linux Network","datePublished":"2022-10-29T22:11:53+00:00","dateModified":"2022-11-07T23:44:42+00:00","mainEntityOfPage":{"@id":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/"},"wordCount":1527,"commentCount":0,"publisher":{"@id":"https:\/\/smartserverhost.com\/blog\/#organization"},"image":{"@id":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/#primaryimage"},"thumbnailUrl":"https:\/\/smartserverhost.com\/blog\/wp-content\/uploads\/2022\/10\/nmap-command-examples-for-linux-and-network-admins.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/","url":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/","name":"17 Basic Nmap Commands for Linux Network - SmartServerHost","isPartOf":{"@id":"https:\/\/smartserverhost.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/#primaryimage"},"image":{"@id":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/#primaryimage"},"thumbnailUrl":"https:\/\/smartserverhost.com\/blog\/wp-content\/uploads\/2022\/10\/nmap-command-examples-for-linux-and-network-admins.png","datePublished":"2022-10-29T22:11:53+00:00","dateModified":"2022-11-07T23:44:42+00:00","description":"Network administrators use Nmap commands to discover, analyze, and map networks under various conditions. The feature-rich command-line tool","breadcrumb":{"@id":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/#primaryimage","url":"https:\/\/smartserverhost.com\/blog\/wp-content\/uploads\/2022\/10\/nmap-command-examples-for-linux-and-network-admins.png","contentUrl":"https:\/\/smartserverhost.com\/blog\/wp-content\/uploads\/2022\/10\/nmap-command-examples-for-linux-and-network-admins.png","width":800,"height":400,"caption":"nmap-command-examples-for-linux-and-network-admins"},{"@type":"BreadcrumbList","@id":"https:\/\/smartserverhost.com\/blog\/17-basic-nmap-commands-for-linux-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/smartserverhost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"17 Basic Nmap Commands for Linux Network"}]},{"@type":"WebSite","@id":"https:\/\/smartserverhost.com\/blog\/#website","url":"https:\/\/smartserverhost.com\/blog\/","name":"SmartServerHost","description":"Reliable Network Solutions","publisher":{"@id":"https:\/\/smartserverhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/smartserverhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/smartserverhost.com\/blog\/#organization","name":"SmartServerHost","url":"https:\/\/smartserverhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/smartserverhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/smartserverhost.com\/blog\/wp-content\/uploads\/2022\/10\/cropped-site_logo.webp","contentUrl":"https:\/\/smartserverhost.com\/blog\/wp-content\/uploads\/2022\/10\/cropped-site_logo.webp","width":263,"height":50,"caption":"SmartServerHost"},"image":{"@id":"https:\/\/smartserverhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/smartserverhost","https:\/\/x.com\/smartserverhost","https:\/\/www.instagram.com\/smartserverhost\/"]},{"@type":"Person","@id":"https:\/\/smartserverhost.com\/blog\/#\/schema\/person\/ab21bff2d23cbbfbcd8065b41da2dcc6","name":"Adam","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/891734c8740f86e3c3ecdb7f0d3065fc76775a6c3b679c5be1d84a74d8cd3167?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/891734c8740f86e3c3ecdb7f0d3065fc76775a6c3b679c5be1d84a74d8cd3167?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/891734c8740f86e3c3ecdb7f0d3065fc76775a6c3b679c5be1d84a74d8cd3167?s=96&d=mm&r=g","caption":"Adam"},"sameAs":["https:\/\/smartserverhost.com\/"],"url":"https:\/\/smartserverhost.com\/blog\/author\/samar\/"}]}},"_links":{"self":[{"href":"https:\/\/smartserverhost.com\/blog\/wp-json\/wp\/v2\/posts\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartserverhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smartserverhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smartserverhost.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smartserverhost.com\/blog\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":0,"href":"https:\/\/smartserverhost.com\/blog\/wp-json\/wp\/v2\/posts\/34\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smartserverhost.com\/blog\/wp-json\/wp\/v2\/media\/35"}],"wp:attachment":[{"href":"https:\/\/smartserverhost.com\/blog\/wp-json\/wp\/v2\/media?parent=34"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smartserverhost.com\/blog\/wp-json\/wp\/v2\/categories?post=34"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smartserverhost.com\/blog\/wp-json\/wp\/v2\/tags?post=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}