

In the cheat sheet article here and also in the use cases here and here, I’m describing how I use this tool in my professional environment.Īs shown on the screenshot above, I have run a very basic nmap scan against IP address 192.168.0.1. If you are looking for an accredited, powerful and reliable port scanner, then NMAP is going to be it, having won several awards from the likes of Linux Journal, Info World, and Codetalker Digest. It can also handle scanning hundreds of thousands of machines if you are searching for a port scanner for business purposes. NMAP is designed to be flexible and is able to handle IP filters, firewall evasion, multiple scanning techniques, reporting results in various formats, customization, discovery of operating systems and service versions running on hosts etc. This is the de facto tool used by almost every security professional in a network discovery task. It runs on both Windows and Linux machines and is very reliable.
#Download ip scanner free#
NMAP is a free and open-source port scanner that is designed for versatility combined with ease of use.

Here are 12 free (and some open source) IP port scanners that can help with both Windows and Linux and are meant specifically to help with network discovery and security evaluation. Therefore, a port scanner utility is essential to evaluate Windows and Linux target machines for both security and network admin professionals. Moreover, scanning for open ports can help you check whether a firewall is correctly configured and that it does not allow unnecessary services to be visible/exposed on the public Internet. This means scanning the target network to see which hosts are live and which TCP/UDP ports are open on the remote hosts.īy getting as much knowledge as possible about the open ports (i.e which services are running on the remote hosts) you can proceed with finding possible vulnerabilities, misconfigured services etc. The first phase of a security assessment job is to discover your possible targets over the network. One of the tasks I’m responsible to do in my work environment is to either coordinate or perform network assessment projects on my own.Ī major part of a network security assessment is vulnerability discovery and penetration testing to identify weaknesses and possible exposures of systems to security threats. Although I have been a TCP/IP networking professional for decades, in the last 10 years I’m also involved in network security as well.
