nmap
Verified for current stable LTS
Nmap Command: Scan Specific List Of Ports
Use for scan specific list of ports with Nmap. Exact CLI syntax to scan specific list of ports using Nmap.
When to use this: Use for scan specific list of ports with Nmap.
Command Syntax
nmap -p <port1,port2,...> <ip_or_host1,ip_or_host2,...> nmap -p <port1,port2,...> <ip_or_host1,ip_or_host2,...> Command Breakdown
-p- Command Option
- Tool-specific option used by this command invocation.
FAQ
Purpose: Exact syntax to scan specific list of ports using Nmap.
Test path: Replace placeholders and run destructive commands in a disposable workspace first.
Flag behavior: Tool version, platform, and shell can change behavior.
Improve This Command
Suggest a correction, safer default, or version-specific note for this entry.
Related Operations
Nmap Command: Enable Os Detection And Traceroute From File
sudo nmap -A -iL <path/to/file.txt> Nmap Command: Evade Ids Ips With Slow Scan sudo nmap -T0 -D <decoy_ip1,decoy_ip2,...> --source-port <53> -f --data-length <16> -Pn <ip_or_host> Nmap Command: Ping Sweep Subnet Aggressively nmap -T5 -sn <192.168.0.0/24|ip_or_hostname1,ip_or_hostname2,...> Nmap Command: Scan Carefully With Default And Safe Scripts nmap --script "default and safe" <ip_or_host1,ip_or_host2,...> Nmap Command: Scan For Web Servers On Standard Ports nmap --script "http-*" <ip_or_host1,ip_or_host2,...> -p 80,443