NMAP

Check Open Ports

NMAP GitHub Action Link - https://github.com/0chain/zus-cicd/actions/workflows/nmap.yaml

INTRODUCTION

Nmap, which stands for Network Mapper, is a robust open-source network scanning and security auditing application. Its purpose is to discover hosts and services on a network, resulting in a map of the network topology.

Nmap analyzes raw IP packets to discover which hosts are available on the network, what services those hosts provide, what operating systems they run, and what types of packet filters and firewalls are in use.

It has numerous applications. Nmap is used by system administrators to maintain network inventory, monitor host or service uptime, and detect unwanted devices. It is used by security professionals to examine vulnerabilities, discover potential entry points for attackers, and comprehend a network's security posture.

Nmap also assists in diagnosing network faults, adjusting firewall rules, and assessing overall network health and performance. Its versatility makes it a must-have tool for network research and security.

GITHUB ACTION

  • Input nmap command in run command text field. Here, x.x.x.x is IP of your server.

nmap -p- x.x.x.x
  • Used to run this github action for the server on which received Hetzner Netscan Issue for having open ports in servers.

For more understanding of nmap read this blog.

Last updated