[Nmap] Nmap detects the open status of the target host port

Nmap detects the target host port open status

  • nmap 192.168.73.139 (host port scan)
  • nmap -p 80 192.168.73.139 (host port 80 scan)
  • nmap -p 80,443 192.168.73.139 (scanning ports 80 and 443)
  • nmap -p 80-443 192.168.73.139 (scan port 80-443)
  • nmap -p 1-65535 192.168.73.139 (full port scan)
  • nmap -sU -p U:445 192.168.73.139 (scan the Udp protocol of 445)
  • nmap -sT -p T:445 192.168.73.139 (scan the tcp protocol of 445)
  • nmap -sS -p T:445,U:135 192.168.73.139 (multi-protocol scan)
  • nmap –top-ports 10 192.168.73.139 (scanning the 10 most commonly used ports)
  • nmap –port-ratio 0 192.168.73.139 (use port scan with low probability)

nmap 192.168.73.139 (host port scan)

└─# nmap 192.168.73.139
Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:19 EDT
Nmap scan report for 192.168.73.139
Host is up (0.0016s latency).
Not shown: 977 closed tcp ports (reset)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
53/tcp open domain
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
512/tcpopenexec
513/tcp open login
514/tcp open shell
1099/tcp open rmiregistry
1524/tcp open ingreslock
2049/tcp open nfs
2121/tcp open ccproxy-ftp
3306/tcp open mysql
5432/tcp open postgresql
5900/tcp open vnc
6000/tcp openX11
6667/tcp openirc
8009/tcpopenajp13
8180/tcp open unknown
MAC Address: 00:0C:29:4F:35:A4 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 0.42 seconds

nmap -p 80 192.168.73.139 (host port 80 scan)

Specify port 80 for scanning

┌──(root?kali)-[~]
└─# nmap -p 80 192.168.73.139
Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:20 EDT
Nmap scan report for 192.168.73.139
Host is up (0.00028s latency).

PORT STATE SERVICE
80/tcp open http
MAC Address: 00:0C:29:4F:35:A4 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 0.30 seconds
                                                               

nmap -p 80,443 192.168.73.139 (scan port 80, 443)

┌──(root?kali)-[~]
└─# nmap -p 80,443 192.168.73.139
Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:20 EDT
Nmap scan report for 192.168.73.139
Host is up (0.00057s latency).

PORT STATE SERVICE
80/tcp open http
443/tcp closed https
MAC Address: 00:0C:29:4F:35:A4 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 8.29 seconds

nmap -p 80-443 192.168.73.139 (scan port 80-443)

└─# nmap -p 80-443 192.168.73.139
Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:21 EDT
Nmap scan report for 192.168.73.139
Host is up (0.0023s latency).
Not shown: 361 closed tcp ports (reset)
PORT STATE SERVICE
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
MAC Address: 00:0C:29:4F:35:A4 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 0.32 seconds

nmap -p 1-65535 192.168.73.139 (full port scan)

└─# nmap -p 1-65535 192.168.73.139
Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:22 EDT
Nmap scan report for 192.168.73.139
Host is up (0.0028s latency).
Not shown: 65505 closed tcp ports (reset)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
53/tcp open domain
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
512/tcpopenexec
513/tcp open login
514/tcp open shell
1099/tcp open rmiregistry
1524/tcp open ingreslock
2049/tcp open nfs
2121/tcp open ccproxy-ftp
3306/tcp open mysql
3632/tcp open distccd
5432/tcp open postgresql
5900/tcp open vnc
6000/tcp openX11
6667/tcp openirc
6697/tcp openircs-u
8009/tcpopenajp13
8180/tcp open unknown
8787/tcp open msgsrvr
44342/tcp open unknown
46882/tcp open unknown
55382/tcp open unknown
57276/tcp open unknown
MAC Address: 00:0C:29:4F:35:A4 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 7.16 seconds
                                                                  

nmap -sU -p U:445 192.168.73.139 (Scan the Udp protocol of 445)

└─# nmap -sU -p U:445 192.168.73.139
Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:27 EDT
Nmap scan report for 192.168.73.139
Host is up (0.00035s latency).

PORT STATE SERVICE
445/udp open|filtered microsoft-ds
MAC Address: 00:0C:29:4F:35:A4 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 13.41 seconds


nmap -sT -p T:445 192.168.73.139 (scan the tcp protocol of 445)

└─# nmap -sT -p T:445 192.168.73.139
Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:28 EDT
Nmap scan report for 192.168.73.139
Host is up (0.00047s latency).

PORT STATE SERVICE
445/tcp open microsoft-ds
MAC Address: 00:0C:29:4F:35:A4 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 13.12 seconds


nmap -sS -p T:445,U:135 192.168.73.139 (multi-protocol scan)

└─# nmap -sS -p T:445,U:135 192.168.73.139
Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:28 EDT
WARNING: Your ports include "U:" but you haven't specified UDP scan with -sU.
Nmap scan report for 192.168.73.139
Host is up (0.00031s latency).

PORT STATE SERVICE
445/tcp open microsoft-ds
MAC Address: 00:0C:29:4F:35:A4 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 13.19 seconds
                                                                   

nmap –top-ports 10 192.168.73.139 (scanning the 10 most commonly used ports)

└─# nmap --top-ports 10 192.168.73.139
Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:31 EDT
Nmap scan report for 192.168.73.139
Host is up (0.00027s latency).

PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
80/tcp open http
110/tcp closed pop3
139/tcp open netbios-ssn
443/tcp closedhttps
445/tcp open microsoft-ds
3389/tcp closed ms-wbt-server
MAC Address: 00:0C:29:4F:35:A4 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 13.22 seconds

nmap –port-ratio 0 192.168.73.139 (port scan with low probability of use)

Probability range 0-1 0.2 means 20%

└─# nmap --port-ratio 0 192.168.73.139
Starting Nmap 7.92 ( https://nmap.org ) at 2023-11-04 08:33 EDT
Nmap scan report for 192.168.73.139
Host is up (0.0035s latency).
Not shown: 8324 closed tcp ports (reset)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
53/tcp open domain
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
512/tcpopenexec
513/tcp open login
514/tcp open shell
1099/tcp open rmiregistry
1524/tcp open ingreslock
2049/tcp open nfs
2121/tcp open ccproxy-ftp
3306/tcp open mysql
3632/tcp open distccd
5432/tcp open postgresql
5900/tcp open vnc
6000/tcp openX11
6667/tcp openirc
6697/tcp openircs-u
8009/tcpopenajp13
8180/tcp open unknown
8787/tcp open msgsrvr
55382/tcp open unknown
MAC Address: 00:0C:29:4F:35:A4 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 14.02 seconds