Home page logo
Zenmap screenshot
Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
Example Nmap output



Detects the All-Seeing Eye service. Provided by some game servers for querying the server's status.


Gathers information (a list of all server properties) from an AMQP (advanced message queuing protocol) server.


Discovers and enumerates BACNet Devices collects device information based off standard requests. In some cases, devices may not strictly follow the specifications, or may comply with older versions of the specifications, and will result in a BACNET error response. Presence of this error positively identifies the device as a BACNet device, but no enumeration is possible.


Detects the CCcam service (software for sharing subscription TV among multiple receivers).


Connects to the IBM DB2 Administration Server (DAS) on TCP or UDP port 523 and exports the server profile. No authentication is required for this request.


Detects the Docker service version.


Attempts to extract information from database servers supporting the DRDA protocol. The script sends a DRDA EXCSAT (exchange server attributes) command packet and parses the response.


This NSE script is used to send a EtherNet/IP packet to a remote device that has TCP 44818 open. The script will send a Request Identity Packet and once a response is received, it validates that it was a proper response to the command that was sent, and then will parse out the data. Information that is parsed includes Vendor ID, Device Type, Product name, Serial Number, Product code, Revision Number, as well as the Device IP.


Detects the Freelancer game server (FLServer.exe) service by sending a status query UDP probe.


Uses the HTTP Server header for missing version info. This is currently infeasible with version probes because of the need to match non-HTTP services correctly.


Detects the UDP IAX2 service.


Obtains information (such as vendor and device type where available) from an IKE service by sending four packets to the host. This scripts tests with both Main and Aggressive Mode and sends multiple transforms per request.


Detects the Java Debug Wire Protocol. This protocol is used by Java programs to be debugged via the network. It should not be open to the public Internet, as it does not provide any security against malicious attackers who can inject their own bytecode into the debugged process.


Retrieves version and database information from a SAP Max DB database.


Check if ePO agent is running on port 8081 or port identified as ePO Agent port.


Detects the Murmur service (server for the Mumble voice communication client) versions 1.2.X.


Retrieves version information from the remote Network Data Management Protocol (ndmp) service. NDMP is a protocol intended to transport data between a NAS device and the backup device, removing the need for the data to pass through the backup server. The following products are known to support the protocol:

  • Amanda
  • Bacula
  • CA Arcserve
  • CommVault Simpana
  • EMC Networker
  • Hitachi Data Systems
  • IBM Tivoli
  • Quest Software Netvault Backup
  • Symantec Netbackup
  • Symantec Backup Exec


Extends version detection to detect NetBuster, a honeypot service that mimes NetBus.


This NSE script is used to send a FINS packet to a remote device. The script will send a Controller Data Read Command and once a response is received, it validates that it was a proper response to the command that was sent, and then will parse out the data.


Parses and displays the banner information of an OpenLookup (network key-value store) server.


Detects the version of an Oracle Virtual Server Agent by fingerprinting responses to an HTTP GET request and an XML-RPC method call.


Attempts to extract system information from the point-to-point tunneling protocol (PPTP) service.


Extracts information from Quake game servers and other game servers which use the same protocol.


Extracts information from a Quake3 game server and other games which use the same protocol.


Retrieves the day and time from the Time service.


Fingerprints the target RPC port to extract the target service, RPC number and version.


Enumerates Siemens S7 PLC Devices and collects their device information. This script is based off PLCScan that was developed by Positive Research and Scadastrangelove (https://code.google.com/p/plcscan/). This script is meant to provide the same functionality as PLCScan inside of Nmap. Some of the information that is collected by PLCScan was not ported over; this information can be parsed out of the packets that are received.


Detects the Skype version 2 service.


Extracts basic information from an SNMPv3 GET request. The same probe is used here as in the service version detection scan.


Sends a binding request to the server and attempts to extract version information from the response, if the server attribute is present.


Detects the TeamSpeak 2 voice communication server and attempts to determine version and configuration information.


Detects the Ventrilo voice communication server service versions 2.1.2 and above and tries to determine version and configuration information. Some of the older versions (pre 3.0.0) may not have the UDP service that this probe relies on enabled by default.


Detects vulnerabilities and gathers information (such as version numbers and hardware support) from VxWorks Wind DeBug agents.


Detect the T3 RMI protocol and Weblogic version


Connects to XMPP server (port 5222) and collects server information such as: supported auth mechanisms, compression methods, whether TLS is supported and mandatory, stream management, language, support of In-Band registration, server capabilities. If possible, studies server vendor.

Nmap Site Navigation

Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]