Skip to main content

Scanning Ports With nmap

Nmap is an open source utility for network discovery and security auditing. Learn how to scan specific or multiple or all ports with nmap.

Team LHB

Warp Terminal

Nmap is an open source utility for network discovery and security auditing. You can use it for penetration testing, network analyzing and more.

It is a utility with vast options but the goal of this tutorial is to show you various ways of scanning ports.

Note: Most of the time in this tutorial, I will use the Nmap provided website as our target for scanning.

Basic scan for open ports

With the -sT parameter, nmap can do a simple TCP scan to look for open ports:

nmap -sT
TCp scan with nmap

You can see that there are two important open ports on the target  – 22 and 80.

These ports are used by SSH and HTTP services respectively. If these ports were not active earlier, you should check the system logs of the target system for a possible security breach.

In case you are looking for a UDP port scan for servers that run on UDP ports, use:

sudo nmap -sU
UDP scan with nmap

Also, it is important to note that, unlike TCP, for scanning UDP ports, you need to have root privileges.

Scanning a specific port

At its most basic, Nmap can scan a single port by just specifying the target port number with the -p option.

Let’s see some popular port scan examples:

Apache Port 80 and 443: Port 80 is the default port number for HTTP requests on Apache. You can scan it with Nmap as:

nmap -p 80

Similarly, for https traffic on port 443 (the default port number), you can use the Nmap scanning as:

nmap -p 443
Scanning specific port number 443

The default port number for SSH connection is 22, so in this case the Nmap scanning command will be:

nmap -p 22

One thing to note here is that you can also use the name of the port instead of its number; for example, for SSH scanning, you can use:

nmap -p ssh
Scan for SSH ports

These are only two examples to show you how Nmap scanning works on a protocol with a given protocol number. You can use other protocol numbers in the same way.

A brief list of some of the commonly used ports and protocols is given below:

  • 20: FTP data
  • 21: FTP control port
  • 22: SSH
  • 23: Telnet (Insecure, not recommended for most uses)
  • 25: SMTP
  • 53: DNS services
  • 67: DHCP server port
  • 68: DHCP client port
  • 80: HTTP - Unencrypted Web traffic
  • 143: IMAP mail port
  • 161: SNMP
  • 443: HTTPS - Secure web traffic
  • 587: SMTP - message submission port

Scanning multiple ports

To scan multiple ports, you need to separate them with commas as shown here:

nmap -p 22,25,80
Scanning multiple ports with nmap

Specify multiple ranges.

nmap -p 80-85,130-140,22
Scan multiple ports with nmap

You can do further customization to port ranges. For example, you can remove the starting port to start scanning from port one:

nmap -p -22
Scanning range of ports

Similarly, you can exclude the last port to scan up to the last possible port:

nmap -p 65255-
nmap scan ports from 65525 to last

Using Wildcards with Nmap

Using wildcards can also simplify a scanning task. Suppose you want to scan all http-related ports:

nmap -p http*
Use wildcards while port scanning with nmap

Scanning the top-ports

Scanning all the 65,536 ports of each protocol is a time-consuming task. However, most of these ports are hardly open. Nmap developer Fyodor, a big applause to him for his excellent tool, has reduced the headache of scanning this huge range of ports.

He has picked up the most prevalent TCP and UDP ports by researching millions of IP addresses and exploring many enterprise networks.

In a nutshell, based on his research, to cover 90% of the open ports, you need to target only 576 TCP ports and 11,307 UDP ports. The --top-ports option scans only the most common ports.

nmap --top-ports 1000
Scanning top 1000 ports with nmap

The -F option scans only the top 100 ports.

There are several ways to execute port scanning using Nmap. The most commonly used are these:

For scanning TCP connection, you can use the -sT flag:

sudo nmap -sT

For scanning UDP connection, you can use the -sU flag:

sudo nmap -sU

For scanning both the TCP and UDP open ports, you can use:

sudo nmap -n -PN -sT -sU -p-

For scanning SYN packets, you can use the -sS flag:

sudo nmap -sS


In this article, I have shown you how to use Nmap for scanning ports on a server. You can also use netstat and ps commands in parallel with Nmap to identify services using the scanned ports.

Team LHB