Skip to main content

NMAP: how to scan range of IP Addresses (part-3)

Scan a Range of IP Addresses
 

A range of IP addresses can be used for target specification as demonstrated in the

example below.

Usage syntax: nmap [Range of IP addresses]


$ nmap 192.168.10.1-100
Starting Nmap 5.00 ( http://nmap.org ) at 2009-08-07 20:40 CDT
Interesting ports on 192.168.10.1:
Not shown: 997 filtered ports
PORT
STATE
SERVICE
20/tcp closed ftp-data
21/tcp closed ftp
80/tcp open
http
Interesting ports on 192.168.10.100:
Not shown: 995 closed ports
PORT STATE SERVICE
22/tcp open ssh
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
Nmap done: 100 IP addresses (2 hosts up) scanned in 25.84 seconds

Scanning a range of IP addresses

In this example Nmap is instructed to scan the range of IP addresses from
192.168.10.1 through 192.168.10.100. You can also use ranges to scan multiple
networks/subnets. For example typing nmap 192.168.1-100.* would scan the class
C IP networks of 192.168.1.* through 192.168.100.*.





NOTE
The asterisk is a wildcard character which represents all valid ranges from 0-255