Scan a Range of IP Addresses
A range of IP addresses can be used for target specification as demonstrated in the
example below.
Usage syntax: nmap [Range of IP addresses]
Scanning a range of IP addresses
In this example Nmap is instructed to scan the range of IP addresses from
192.168.10.1 through 192.168.10.100. You can also use ranges to scan multiple
networks/subnets. For example typing nmap 192.168.1-100.* would scan the class
C IP networks of 192.168.1.* through 192.168.100.*.
NOTE
The asterisk is a wildcard character which represents all valid ranges from 0-255
A range of IP addresses can be used for target specification as demonstrated in the
example below.
Usage syntax: nmap [Range of IP addresses]
$ nmap 192.168.10.1-100
Starting Nmap 5.00 ( http://nmap.org ) at 2009-08-07 20:40 CDT
Interesting ports on 192.168.10.1:
Not shown: 997 filtered ports
PORT
STATE
SERVICE
20/tcp closed ftp-data
21/tcp closed ftp
80/tcp open
http
Interesting ports on 192.168.10.100:
Not shown: 995 closed ports
PORT STATE SERVICE
22/tcp open ssh
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
Nmap done: 100 IP addresses (2 hosts up) scanned in 25.84 seconds
Scanning a range of IP addresses
In this example Nmap is instructed to scan the range of IP addresses from
192.168.10.1 through 192.168.10.100. You can also use ranges to scan multiple
networks/subnets. For example typing nmap 192.168.1-100.* would scan the class
C IP networks of 192.168.1.* through 192.168.100.*.
NOTE
The asterisk is a wildcard character which represents all valid ranges from 0-255