Nmap Scanner

Scan networks and discover open ports with this user-friendly Nmap interface. No technical knowledge required.

Developed byGordon LyonView on GitHub
Tip: Use T0-T2 for stealthy scans, T3 (default) for balanced performance, T4 for faster scans.
Scan results will appear here...

How to Use Nmap Scanner

Step 1: Enter the target IP address or hostname you want to scan.

Step 2: Select a scan type based on what information you need:

  • Basic Scan: Quick check for the most common open ports.
  • Comprehensive Scan: Thorough scan of all 65,535 ports (takes longer).
  • Aggressive Scan: Complete reconnaissance including OS detection, service versions, scripts, and traceroute.
  • OS Detection: Attempts to determine the operating system of the target.
  • Service Detection: Identifies what services are running on open ports.

Step 3: Choose a timing template:

  • T0-T1: Very slow and stealthy - use for heavily monitored networks.
  • T2: Polite scanning - slower but less likely to trigger alarms.
  • T3: Normal speed (default) - best balance of speed and reliability.
  • T4: Aggressive timing - faster scans for most situations.

Step 4: Click "Start Scan" and wait for the results.

Important Notes:

  • Aggressive scans can take several minutes and may trigger security systems.
  • T0-T2 timing templates are very slow but stealthy - use for sensitive targets.
  • OS Detection and Aggressive scans require root/administrator privileges for best results.
  • Always ensure you have permission to scan the target system.
  • Unauthorized scanning may be illegal in some jurisdictions.