👾

nmap.monster

Network Reconnaissance Playground

Explore Nmap scanning techniques in a safe, simulated environment.
No real network activity — pure educational aesthetics.

terminal — nmap@monster
Welcome to nmap.monster — Network reconnaissance playground
Click a command below to run a simulated scan...

Quick commands:

Scan Presets

Nmap Cheat Sheet

Scan Types

-sSTCP SYN scan (stealth, requires root)
-sTTCP connect scan (no root needed)
-sUUDP scan (slow but thorough)
-sATCP ACK scan (firewall mapping)
-sVService/version detection
-OOS detection
-AAggressive: OS + version + scripts + traceroute

Target Specification

192.168.1.1Single IP
192.168.1.1-254IP range
192.168.1.0/24CIDR notation
scanme.nmap.orgHostname
-iL targets.txtRead targets from file
--exclude 192.168.1.5Exclude specific host

Port Specification

-p 22Specific port
-p 22,80,443Multiple ports
-p 1-1000Port range
-p-All 65535 ports
--top-ports 100Scan top N most common ports
-FFast mode (100 most common ports)

Host Discovery

-PnSkip host discovery (assume all hosts up)
-PS22,80,443TCP SYN ping on specific ports
-PA80TCP ACK ping
-PU53UDP ping
-PRARP ping (local network)
-nNo DNS resolution (faster)

Timing & Performance

-T0Paranoid (IDS evasion, very slow)
-T1Sneaky (IDS evasion, slow)
-T2Polite (less bandwidth)
-T3Normal (default)
-T4Aggressive (fast, assumes good network)
-T5Insane (extremely fast, may miss results)

NSE Scripts

--script vulnRun vulnerability detection scripts
--script defaultRun default scripts
--script http-enumEnumerate web directories
--script ssh-bruteSSH brute force
--script-argsPass arguments to scripts
--script-help <name>Show script documentation

Output Options

-oN file.txtNormal output to file
-oX file.xmlXML output
-oG file.txtGrepable output
-oA basenameOutput in all formats
-vVerbose output
-vvVery verbose

Firewall Evasion

-fFragment packets
--mtu 24Set custom MTU
-D RND:10Use decoy IPs
--source-port 53Spoof source port
--data-length 200Append random data
--randomize-hostsRandomize target order

NOTE: This is a simulated environment. All scans are purely visual and educational. No actual network requests are performed.