![zenmap scan subnet zenmap scan subnet](https://hackertarget.com/wp-content/uploads/2018/05/nmap-windows-install.png)
Nmap done: 256 IP addresses (4 hosts up) scanned in 2.41 seconds Nmap scan report for ubuntu (192.168.1.5) Nmap scan report for hpprinter (192.168.1.2) For each device that responds to the ping, the output shows the hostname and IP address like so: Starting Nmap 6.40 ( ) at 12:46 GMT Ping scan just pings all the IP addresses to see if they respond. Now use the nmap command with the -sn flag (ping scan) on the whole subnet range. Now you have the IP address of your computer, you will scan the whole subnet for other devices.
#Zenmap scan subnet install#
#Zenmap scan subnet free#
The output of the command can then be viewed with the command less Nmap_results ( Figure A).The nmap command (Network Mapper) is a free and open-source tool for network discovery, available for Linux, macOS, and Windows. If you want to view the output of the Nmap command at a later time (or send it to someone), you run the command like so: nmap -sn 192.168.1.0/24 > nmap_results
![zenmap scan subnet zenmap scan subnet](https://nmap.org/book/images/zenmap-multi-scaled-915x525.png)
Where FILENAME is the name of the host list file.
![zenmap scan subnet zenmap scan subnet](https://uwnthesis.files.wordpress.com/2014/07/scanme-zen-gui1.jpg)
Save that file (name it whatever you like) and have Nmap refer to it with the command: nmap -iL FILENAME -sn To do this, create a new file and enter specific hosts (or ranges of hosts), separated by spaces, tabs, or newlines. This makes it easy to create a list of hosts (or multiple lists of hosts), which can be quickly checked. You can also define your hosts in a file. For example, if you're only looking for what's available on 192.168.1.100 through 192.168.1.200, you can issue the same scan like so: nmap -sn 192.168.1.100-200 You can also narrow your IP address range. The scan will report hostnames and IP addresses of all hosts on the network (that respond to ICMP echo requests) and will detect both wired and wireless hosts (so long as they are on the network scanned). This command runs a simple ping sweep, which doesn't include a port scan after host discovery (as that takes considerably more time). Make sure to modify the IP address/netmask to match your network topography. Go back to your open terminal and type: nmap -sn 192.168.1.0/24 The command to discover hosts on your network is easy.
![zenmap scan subnet zenmap scan subnet](https://www.networkstraining.com/wp-content/uploads/2016/04/Scan-an-IP-Range-with-NMAP.jpg)
If you use a Red Hat-based Linux distribution, the installation command is: sudo yum install nmap -y