How To Exclude Hosts From Nmap Scan?


Nmap is a very useful tool for network administration and security. It is the most used tool in these areas. But a lot of people use it with very basic means. Here we will look more sophisticated usage of Nmap step by step in this ant further posts.

Target Hosts

Create a text file and add hosts/networks to it and then use this file with Nmap. You can use network blocks like 192.168.122.0/24 or ranges 192.168.122.10-20.

Start Scan

We will start the scan with the -iL option by providing the target host file.

$ cat ismailbaydan.txt
192.168.122.0/24
192.168.43.0/24
8.8.8.8
192.168.122.10-20

$ sudo nmap -iL ismailbaydan.txt

Starting Nmap 6.45 ( http://nmap.org ) at 2014-08-01 10:19 EEST
Nmap scan report for openstack (192.168.122.146)
Host is up (0.000074s latency).
Not shown: 996 closed ports
PORT   STATE SERVICE
22/tcp open  ssh
25/tcp open  smtp
49/tcp open  tacacs
80/tcp open  http
MAC Address: 52:54:00:0D:B8:D7 (QEMU Virtual NIC)

...

Specify Exclude Hosts

Exclude some hosts with the same syntax used above. You can read them from file or specify by option. -v option is used for verbose output. We will use --exclude command by providing the IP address 192.168.122.254`

$ cat ismailbaydan-exclude.txt
192.168.122.0-128

$ sudo nmap -iL ismailbaydan.txt --excludefile ismailbaydan-exclude.txt -v --exclude 192.168.122.254

Starting Nmap 6.45 ( http://nmap.org ) at 2014-08-01 10:23 EEST
Initiating ARP Ping Scan at 10:23
Scanning 127 hosts [1 port/host]
Completed ARP Ping Scan at 10:23, 1.42s elapsed (127 total hosts)
Nmap scan report for 192.168.122.129 [host down]
Nmap scan report for 192.168.122.130 [host down]
Nmap scan report for 192.168.122.131 [host down]
Nmap scan report for 192.168.122.132 [host down]

We can also use hostname but name resolving must be available.

$ sudo nmap ismailbaydan.com

LEARN MORE  How To Generate Ssh Key With ssh-keygen In Linux?

Leave a Comment