Nmap
11 min
this connector performs network scans and gather information about hosts on a network capabilities actions allow to pass arguments to nmap the following table lists the available arguments and their description note that arguments are case sensitive and it is allowed to combine multiple arguments in a single action nmap arguments scan type this argument specifies the type of scan to be performed nmap offers various types of scans such as tcp, udp, syn, fin, xmas, null, and others for example, ss will perform a syn scan service and version detection this argument attempts to detect the type of service running on a given port and the version of the service for example, sv will attempt to identify the service and version running on open ports operating system detection this argument attempts to identify the operating system running on the scanned hosts for example, o will attempt to identify the operating system timing and performance this argument allows users to adjust the timing and performance of the scan for example, nmap t4 will set the timing template to aggressive scan firewall/ids evasion and spoofing this argument allows users to bypass firewall and ids detection mechanisms by spoofing packets for example, s spoofed ip will send packets with a spoofed ip address scripting this argument allows users to use custom scripts to automate the scanning process or perform advanced tasks for example, script smb os discovery nse will use the smb os discovery script aggressive scanning this argument enables aggressive scanning, which can speed up the scanning process and detect more hosts and services for example, a will enable aggressive scanning ping options this argument allows users to configure the ping options used by nmap for example, pn will disable ping scanning, while pe will use icmp echo requests for ping scanning timing template this argument allows users to set the timing template used by nmap for scanning for example, t4 will set the timing template to aggressive scan traceroute this argument performs a traceroute to the scanned hosts for example, traceroute will perform a traceroute ipv6 scanning this argument enables ipv6 scanning for example, 6 will enable ipv6 scanning dns resolution this argument performs dns resolution of hostnames to ip addresses for example, r will perform dns resolution firewall detection this argument detects whether a firewall is present and active on the scanned hosts for example, sa will perform an ack scan to detect firewalls os detection this argument attempts to detect the operating system running on the scanned hosts for example, o will attempt to identify the operating system scripting engine this argument allows users to run scripts to automate or customize the scanning process for example, script=default will run the default nmap scripts exclude hosts this argument excludes specified hosts from the scan for example, exclude 192 168 1 10 will exclude the host with ip address 192 168 1 10 from the scan actions check network status check the status of hosts endpoint method get input argument name type required description args string optional arguments to pass to nmap defaults to ' n sp pe pa21,23,80,3389' host string required host to scan timeout number optional timeout in seconds defaults to 0 (infinite) raw data boolean optional return raw data input example {"host" "swimlane com","timeout" 0,"raw data"\ true} output parameter type description info array output field info info ip string output field info ip info hostname string name of the resource info status string status value info mac string output field info mac raw data string response data output example {"info" \[{"ip" "104 26 2 130","hostname" "swimlane com","status" "up","mac" "62 26\ ba 0d\ f2 9e"}],"raw data" "b'\<?xml version=\\"1 0\\" encoding=\\"utf 8\\"?>\\\n\<!doctype nmaprun>\\\n\<?xml stylesheet h "} scan ports scan port status endpoint method get input argument name type required description host string required host(s) to scan examples 'scanme nmap org' or '198 116 0 255 1 127' or '216 163 128 20/20' ports string optional port(s) to scan examples '22,53,110,143 4564' default is all ports args string optional additional arguments to pass to nmap examples ' su sx sc' defaults to ' sv' sudo boolean optional run nmap with sudo timeout number optional timeout in seconds defaults to 0 which is infinite raw data boolean optional return raw data from nmap defaults to false input example {"host" "swimlane com","ports" "22,53,110,150 200","args" " sv","sudo"\ false,"timeout" 0,"raw data"\ true} output parameter type description hosts array output field hosts info array output field info info ip string output field info ip info host info object output field info host info info host info command line run string output field info host info command line run info host info scan info object output field info host info scan info info host info scan info tcp object output field info host info scan info tcp info host info scan info tcp method string http method to use info host info scan info tcp services string output field info host info scan info tcp services info host info scan stats object output field info host info scan stats info host info scan stats timestr string output field info host info scan stats timestr info host info scan stats elapsed string output field info host info scan stats elapsed info host info scan stats uphosts string output field info host info scan stats uphosts info host info scan stats downhosts string output field info host info scan stats downhosts info host info scan stats totalhosts string output field info host info scan stats totalhosts info host info host object output field info host info host info host info host hostname string name of the resource info host info host status string status value info host info host addresses object output field info host info host addresses info host info host addresses ipv4 string output field info host info host addresses ipv4 info host info host addresses ipv6 string output field info host info host addresses ipv6 info host info host addresses mac string output field info host info host addresses mac info host info host vendor object output field info host info host vendor info host info host open ports array output field info host info host open ports info host info host open ports protocol string output field info host info host open ports protocol output example {"hosts" \["172 67 74 8"],"info" \[{"ip" "172 67 74 8","host info" {}}],"raw data" "b'\<?xml version=\\"1 0\\" encoding=\\"utf 8\\"?>\\\n\<!doctype nmaprun>\\\n\<?xml stylesheet h "} response headers header description example content type the media type of the resource application/json date the date and time at which the message was originated thu, 01 jan 2024 00 00 00 gmt