# nmap 192.168.41.41 -p1-50 Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-26 16:37 CST Nmap scan report for bogon (192.168.41.41) Host is up (0.0038s latency). Not shown: 46 closed ports PORT STATE SERVICE 5/tcp filtered rje 21/tcp filtered ftp 23/tcp open telnet 27/tcp filtered nsw-fe MAC Address: 00:11:22:33:44:41 (Cimsys)
Nmap done: 1 IP address (1 host up) scanned in 7.99 seconds
4、Nmap 指定端口扫描
1 2 3 4 5 6 7 8 9 10 11 12
$ nmap -p(port1,port2,port3,...) <target ip>
$ nmap -p23 192.168.41.41 Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-26 16:44 CST Nmap scan report for bogon (192.168.41.41) Host is up (0.0083s latency).
PORT STATE SERVICE 23/tcp open telnet MAC Address: 00:11:22:33:44:41 (Cimsys)
Nmap done: 1 IP address (1 host up) scanned in 0.04 seconds
$ nmap --traceroute <target ip> $ nmap --traceroute 119.29.29.29 Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-2616:50 CST Nmap scan report for pdns.dnspod.cn (119.29.29.29) Host is up (0.019s latency). Not shown: 998 filtered ports PORT STATE SERVICE 53/tcp open domain 80/tcp open http
$ nmap -O <target ip> $ nmap -O 119.29.29.29 Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-2616:59 CST Nmap scan report for pdns.dnspod.cn (119.29.29.29) Host isup (0.021s latency). Not shown: 998 filtered ports PORT STATE SERVICE 53/tcp open domain 80/tcp open http Warning: OSScan results may be unreliable because we could not find at least 1openand1 closed port Device type: specialized|media device|WAP Running (JUST GUESSING): Linux 2.6.X|3.X (88%), Hikvision embedded (88%) OS CPE: cpe:/o:linux:linux_kernel:2.6.10 cpe:/h:hikvision:ds-7600 cpe:/o:linux:linux_kernel:3.0 cpe:/o:linux:linux_kernel:3.10 Aggressive OS guesses: HIKVISION DS-7600 Linux Embedded NVR (Linux 2.6.10) (88%), Linux 3.0 (88%), DD-WRT v24-sp2 (Linux 3.10) (87%) No exact OS matches for host (test conditions non-ideal).
OS detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 8.49 seconds
$ nmap -vv -p1-1000 -O <target ip> $ nmap -vv -p1-50 -O 192.168.41.41 Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-2617:12 CST Initiating ARP Ping Scan at 17:12 Scanning 192.168.41.41 [1 port] Completed ARP Ping Scan at 17:12, 0.01s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:12 Completed Parallel DNS resolution of 1 host. at 17:12, 0.00s elapsed Initiating SYN Stealth Scan at 17:12 Scanning bogon (192.168.41.41) [50 ports] Discovered open port 23/tcp on 192.168.41.41 Increasing send delay for192.168.41.41 from 0 to 5 due to 13 out of 43 dropped probes since last increase. Completed SYN Stealth Scan at 17:12, 4.52s elapsed (50 total ports) Initiating OS detection (try #1) against bogon (192.168.41.41) Retrying OS detection (try #2) against bogon (192.168.41.41) Retrying OS detection (try #3) against bogon (192.168.41.41) Retrying OS detection (try #4) against bogon (192.168.41.41) Retrying OS detection (try #5) against bogon (192.168.41.41) Nmap scan report for bogon (192.168.41.41) Host is up, received arp-response (0.0030s latency). Scanned at 2021-01-2617:12:37 CST for16s
Uptime guess: 34.815 days (since Tue Dec 2221:38:452020) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=261 (Good luck!) IP ID Sequence Generation: All zeros
Read data files from: /usr/bin/../share/nmap OS detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 15.95 seconds Raw packets sent: 187 (12.130KB) | Rcvd: 159 (10.202KB)