No Port Scan

Published Dec 20, 2022
Contribute to Docs

A no port scan prevents Nmap from doing a port scan after host discovery. It is specified with the -sn option. Used by itself, it is also known as a “ping” scan. It is less intrusive and attracts less attention than a full port scan.

Note: This option is often combined with a no ping scan (-Pn).


nmap -sn <target>

This performs a scan of <target> without doing a port scan.


The following example runs a no ping scan on the site

nmap -sn

Note: is a domain set up explicitly for people to test Nmap with.

This results in the following output:

Starting Nmap 7.93 ( ) at 2022-11-29 12:45 Eastern Standard Time
Nmap scan report for (
Host is up (0.093s latency).
Other addresses for (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
Nmap done: 1 IP address (1 host up) scanned in 11.48 seconds

All contributors

Looking to contribute?

Learn Cybersecurity on Codecademy