Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 740

Nmap

What is Nmap?

NmapAn open-source network scanner used to map hosts, enumerate open ports and services, and fingerprint operating systems on IP networks.


Nmap (Network Mapper) is a free, open-source utility created by Gordon Lyon (Fyodor) in 1997 for network discovery and security auditing. It sends crafted IP, TCP, UDP, and ICMP probes to identify live hosts, open ports, running services, software versions, and operating systems, and supports scripted detection through the Nmap Scripting Engine (NSE). Penetration testers, network admins, blue teams, and attackers all rely on Nmap, so its fingerprintable scans are also a useful detection signal. Scanning systems without authorization can be illegal and is routinely flagged by IDS/IPS sensors and CSPM tools, so engagement scoping is critical.

Examples

  1. 01

    Running nmap -sV -p- against a scoped pentest range to enumerate service versions.

  2. 02

    Detecting an Nmap SYN scan via Snort signatures on a perimeter sensor.

Frequently asked questions

What is Nmap?

An open-source network scanner used to map hosts, enumerate open ports and services, and fingerprint operating systems on IP networks. It belongs to the Defense & Operations category of cybersecurity.

What does Nmap mean?

An open-source network scanner used to map hosts, enumerate open ports and services, and fingerprint operating systems on IP networks.

How does Nmap work?

Nmap (Network Mapper) is a free, open-source utility created by Gordon Lyon (Fyodor) in 1997 for network discovery and security auditing. It sends crafted IP, TCP, UDP, and ICMP probes to identify live hosts, open ports, running services, software versions, and operating systems, and supports scripted detection through the Nmap Scripting Engine (NSE). Penetration testers, network admins, blue teams, and attackers all rely on Nmap, so its fingerprintable scans are also a useful detection signal. Scanning systems without authorization can be illegal and is routinely flagged by IDS/IPS sensors and CSPM tools, so engagement scoping is critical.

How do you defend against Nmap?

Defences for Nmap typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Nmap?

Common alternative names include: Network Mapper.

Related terms

See also