The most basic type of scan is done with the command-line interface (CLI) command
nmap with just a target specified. The target is the IP address or domain name being scanned. It should be a domain the user owns or one the user has written permission to scan.
target is the IP address or domain name being scanned. The command by itself scans 1,000 TCP ports on the target host.
Nmap divides ports into one of six states:
open: The port is open and actively accepting connections.
closed: The port is accessible, but no application is accepting connections through it.
filtered: Nmap can’t tell if the port is open because a firewall or other packet filtering is preventing access.
unfiltered: The port is accessible, but Nmap cannot determine if the port is open or closed.
open|filtered: Nmap cannot tell if a port is open or filtered.
closed|filtered: Nmap cannot tell if a port is closed or filtered.
scanme.nmap.orgis a domain set up explicitly for people to test Nmap with.
The output of this command looks like this:
Starting Nmap 7.93 ( https://nmap.org ) at 2022-10-25 12:22 Eastern Daylight TimeNmap scan report for scanme.nmap.org (220.127.116.11)Host is up (0.086s latency).Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2fNot shown: 992 closed tcp ports (reset)PORT STATE SERVICE22/tcp open ssh25/tcp filtered smtp80/tcp open http135/tcp filtered msrpc139/tcp filtered netbios-ssn445/tcp filtered microsoft-ds9929/tcp open nping-echo31337/tcp open EliteNmap done: 1 IP address (1 host up) scanned in 18.26 seconds