Nmap Scanner
Scan networks and discover open ports with this user-friendly Nmap interface. No technical knowledge required.
Developed byGordon LyonView on GitHub
How to Use Nmap Scanner
Step 1: Enter the target IP address or hostname you want to scan.
Step 2: Select a scan type based on what information you need:
- Basic Scan: Quick check for the most common open ports.
- Comprehensive Scan: Thorough scan of all 65,535 ports (takes longer).
- Aggressive Scan: Complete reconnaissance including OS detection, service versions, scripts, and traceroute.
- OS Detection: Attempts to determine the operating system of the target.
- Service Detection: Identifies what services are running on open ports.
Step 3: Choose a timing template:
- T0-T1: Very slow and stealthy - use for heavily monitored networks.
- T2: Polite scanning - slower but less likely to trigger alarms.
- T3: Normal speed (default) - best balance of speed and reliability.
- T4: Aggressive timing - faster scans for most situations.
Step 4: Click "Start Scan" and wait for the results.
Important Notes:
- Aggressive scans can take several minutes and may trigger security systems.
- T0-T2 timing templates are very slow but stealthy - use for sensitive targets.
- OS Detection and Aggressive scans require root/administrator privileges for best results.
- Always ensure you have permission to scan the target system.
- Unauthorized scanning may be illegal in some jurisdictions.