Target Configuration
Examples: 192.168.1.1, 10.0.0.0/24, example.com, 192.168.1.1-20
Quick Presets
Scan Type
Port Configuration
Detection & Enumeration
Timing Template
NSE Scripts
Additional Options
Generated Command
Elevated privileges requiredsudo nmap [options] <target>Legal Notice
Only use nmap on systems you own or have explicit written permission to scan. Unauthorized port scanning may be illegal in your jurisdiction.
Need Professional Security Services?
Our cybersecurity experts can help protect your business with comprehensive security solutions.
How the Nmap Command Builder Works
The Nmap Command Builder provides a visual interface to construct complex nmap commands without memorizing syntax. It includes two powerful features:
1. Command Builder
Select scan options visually and the tool generates the complete nmap command. Features include:
- Quick Presets - One-click templates for common scan scenarios
- Scan Type Selection - TCP SYN, TCP Connect, UDP, and more
- Port Configuration - Default, top ports, all ports, or specific ranges
- Detection Options - Service version, OS detection, NSE scripts
- Timing Control - From paranoid (T0) to insane (T5)
2. Results Parser
Paste nmap output to get structured analysis with security insights:
- Host Information - IP addresses, hostnames, status
- Port Analysis - Open ports organized by service
- Security Insights - Automatic detection of dangerous services
- OS Detection - Operating system identification
Common Nmap Scan Types
| Scan Type | Flag | Description | Use Case |
|---|---|---|---|
| TCP SYN | -sS | Stealth scan, doesn't complete handshake | Most common, requires sudo |
| TCP Connect | -sT | Full TCP connection | No privileges required |
| UDP Scan | -sU | Scan UDP ports | DNS, DHCP, SNMP services |
| TCP ACK | -sA | Map firewall rulesets | Firewall testing |
| Ping Scan | -sn | Host discovery only | Network mapping |
Nmap Best Practices
✅ Do's
- • Obtain written authorization before scanning
- • Scan your own networks during maintenance windows
- • Use appropriate timing templates (T3 or T4)
- • Document scan scope and findings
- • Keep nmap updated to latest version
- • Save output with -oA for later analysis
❌ Don'ts
- • Never scan networks without permission
- • Don't use T5 (Insane) on production networks
- • Avoid aggressive scans during business hours
- • Don't scan critical infrastructure without approval
- • Never ignore false positives without verification
- • Don't skip legal and compliance reviews
Quick Command Reference
nmap -T4 -F 192.168.1.1nmap -T4 -A -v 192.168.1.1nmap -sS -p- -T4 192.168.1.1nmap -sV --script vuln 192.168.1.1nmap -sn 192.168.1.0/24⚖️ Legal Reminder
Unauthorized port scanning is illegal in many jurisdictions. This tool is intended for authorized security testing, network administration, and educational purposes only. Always obtain explicit written permission before scanning any network or system you don't own or have authority to test.
Frequently Asked Questions
Common questions about the Nmap Command Builder & Results Parser
Nmap (Network Mapper) is a free, open-source network scanner used to discover hosts and services on a network. It sends specially crafted packets and analyzes responses to determine open ports, running services, operating systems, and other network characteristics. Security professionals use it for network inventory, security auditing, and vulnerability assessment.
Explore More Tools
Continue with these related tools
Password Strength Checker
Test your password strength and get recommendations for improvement
Password Generator
Generate secure random passwords with customizable options
CVE Vulnerability Search
Search and analyze CVE vulnerabilities with CVSS calculator
⚠️ Security Notice
This tool is provided for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or networks you do not own. Unauthorized access or security testing may be illegal in your jurisdiction. All processing happens client-side in your browser - no data is sent to our servers.