How to Install Nmap Network Scanner on Linux


Network Mapper (Nmap) is a free, open-source network security scanning tool. By sending IP packets and analyzing the responses, Nmap provides information about hosts and services on remote computer networks. It can also audit device security, identify network vulnerabilities, or perform an inventory check.

This tutorial shows how to install Nmap on Linux and explains Nmap's most important features.

A tutorial for installing and using the Nmap tool in Linux.


  • A user account with root privileges.
  • Access to the terminal (Ctrl + Alt + T).

Installing Nmap on Linux

Nmap comes preinstalled on Kali Linux, a distribution specifically designed for penetration testing that includes a wide range of security tools, including Nmap. If you are using a Debian Linux distro, then you need to install Nmap to use it on your system.

Depending on your needs and preferences, you can choose one of four ways to install Nmap:

The sections below cover each method and provide the necessary steps for installing the utility.

Note: This guide was made using Ubuntu 22.04, and therefore contains images showing the process of installing Nmap on Ubuntu. However, the guide applies to all Linux distributions.

Install NMAP via Package Manager/Command Line

Installing Nmap via the CLI is the easiest and most straightforward method. It involves running a few commands. Follow the steps below:

1. Update your system package repository information to ensure you install the latest Nmap version:

sudo apt update

2. Install Nmap by running the following command:

sudo apt install nmap -y
Installing Nmap from the official Ubuntu repository.

3. Verify that Nmap has been installed by running:

nmap --version

If everything installed correctly, the output prints the Nmap utility version:

Checking the Nmap version to verify installation on Ubuntu.

Install NMAP via GUI

You can use the Ubuntu Software tool to install Nmap via the GUI. The GUI option is intuitive and useful for people who are not well-versed in using the terminal. Follow the steps below:

1. Click the grid button in Ubuntu to show all apps, and type ubuntu software in the search bar. From the result list, select the Ubuntu Software app.

Opening Ubuntu Software.

2. When Ubuntu Software opens, click the search icon and type nmap.

Searching for nmap in Ubuntu software.

3. From the search results, select the Nmap utility and click the Install button.

Installing Nmap using the GUI.

Provide your administrator password when prompted and wait for the process to finish.

Install NMAP by Compiling Source Code

Installing something by compiling it from source code means taking the human-readable source code of a program and converting it into machine-readable binary code that the computer can execute.

Compiling from source often gives access to the latest features and updates before they are packaged into official releases. However, it can be complex, may lack official support, and require knowledge of dependencies and build tools.

If you decide to install Nmap by compiling it from the source code, follow the steps below:

1. Open the terminal and run the following command to install the packages required for compiling Nmap:

sudo apt install build-essential libssl-dev

2. Using a browser, navigate to the official Nmap website and download the latest tarball from the Source Code Distribution section. You can either download it using the browser or by copying the download link in the wget command as follows:


3. After the download completes, extract the tarball using the tar command:

tar jxvf nmap-[version].tar.bz2

Replace [version] with the exact program version you downloaded.

4. Use the cd command to move to the extracted directory.

5. Run the following command to compile the source code:

./configure && make && sudo make install
Compiling Nmap from the source code.

Wait for the process to complete. Compiling from source code usually takes longer than installing a package using the package manager, so give it time to finish.

Install NMAP in Docker

Docker is a platform that enables users to package, distribute, and run applications in lightweight, isolated containers. If you want to use Nmap without installing it on your system, you can install it in a Docker container to run it in a separate, isolated environment. This method requires a working Docker installation.

Note: For more information on how to install Docker, refer to our guides:

Follow the steps below:

1. Open the terminal and pull the Nmap Docker image using the following command:

sudo docker pull instrumentisto/nmap
Pulling the Nmap image in Docker.

2. After pulling the image, run Nmap in Docker with the following command:

docker run -it --rm instrumentisto/nmap -v
Running Nmap in docker.

When the process completes, your Docker container will run Nmap without installing it directly on your system. This method is useful if you suspect Nmap could interfere with other software.

How to Use NMAP Security Scanner on Linux

Running Nmap provides a list of scanned targets along with supplemental information based on the options and arguments used. This section covers the basic options this tool has to offer. For a full list of options, visit the Nmap official page or access the manual from your command line using the man command:

man nmap

Warning: Aggressive port scanning to find open ports without permission can be interpreted as malicious by third-party organizations.


You can access the Nmap built-in help command to list all the options that the command accepts. Since it has a lot of available options, the help command is useful when you need to refresh your memory:

nmap -h
Printing the Nmap help file.

Basic Scans

The basic scan is a fundamental Nmap feature that serves as a quick and efficient method for discovering active devices on a network. There are two types of basic scan:

  • Ping Scan. Scans the list of devices active on a given subnet. It is the easiest way to detect hosts on a network. To perform a ping scan, specify the -sp options. For example:
nmap -sp

In the example above, Nmap will perform a ping scan on all IP addresses in the subnet to determine which hosts are online and responding to ICMP echo requests.

  • Host Scan. Scans a given IP address or host for 1000 well-known ports. These ports are used by services such as SQL, SNTP, Apache, etc. For example:

In the example above, Nmap scans the specified target It attempts to identify open ports, running services, and potentially other information about the host's network configuration and services.

Port Scanning

Nmap recognizes six port states:

  • Open. Actively accepting TCP connections, UDP datagrams, or SCTP associations.
  • Closed. Accessible, but no application is listening on the port.
  • Filtered. Nmap cannot determine whether the port is open due to packet filtering.
  • Unfiltered. The port is accessible, but Nmap is unable to determine if it is open or closed.
  • Open|filtered. Nmap cannot determine if a port is open or filtered.
  • Closed|filtered. Nmap cannot determine if a port is closed or filtered.

By default, Nmap scans the thousand most common ports for each protocol. However, it also provides options for specifying which ports to scan and whether the scan should be randomized or ordered.

Port scanning in Nmap can be performed in various ways:

  • Using the -p parameter to specify a single port:
nmap -p 973
  • By specifying the port type, such as TCP, to scan for information about a specific type of connection:
nmap -p T:7777,973
  • By scanning a range of ports separated by a hyphen:
nmap -p 76-973
  • Utilizing the --top-ports flag to specify the top n ports to scan:
nmap --top-ports 10

The command above scans the top 10 ports on the host.

Host Scanning

Nmap is a powerful tool that can scan multiple hosts simultaneously, making it invaluable for managing extensive network infrastructure.

There are various approaches for scanning multiple hosts:

  • Writing all the IP addresses in a single row allows you to scan all hosts simultaneously. For example:
  • Using the asterisk (*) enables scanning all subnets at once:
nmap 192.164.1.*
  • Adding commas to separate address endings allows for efficient scanning of multiple hosts:
  • Specifying a range of IP addresses using a hyphen streamlines the scanning processes:

Furthermore, Nmap provides options to enhance scanning capabilities. For instance, scan speed designations range from -T0 to -T5, with higher speeds being more aggressive. The -v option increases verbosity, providing more detailed information about the scan.

Additionally, the -A option enables comprehensive scan features, including OS detection, version scanning, script scanning, and traceroute.

Combining multiple options further enhances scanning efficiency. For example, using -A and -T4 together enables faster execution. The -Pn options instruct Nmap not to initiate a ping scan, which can be useful in certain scenarios.

For example:

sudo nmap -A -T4 -v -Pn

This command executes Nmap with comprehensive scanning options on the specified target,, without performing a ping scan:

Combining different options in Nmap.

Stealth Scanning

A stealth scan, or a TCP SYN scan, is performed by sending a SYN packet and then analyzing the response. If Nmap receives SYN/ACK, the port is open, and you can establish a TCP connection. Since this type of scan never completes TCP connections, it is often referred to as half-open scanning.

To perform a stealth scan, specify the -sS flag:

nmap -sS

Note that stealth scanning is slower and less aggressive than other types of scanning, so it may take some time to get a response.

Version Scanning

Another useful Nmap feature is that it allows you to see application versions. It represents a key part of penetration testing since it reveals existing vulnerabilities from the Common Vulnerabilities and Exposures (CVE) database for a particular version of the service.

To perform a version scan, specify the -sV options, followed by the target machine/domain:

nmap -sV

The is a website provided by the Nmap creator for testing purposes.

NMAP Outputs & Exporting

You can export Nmap scan results in several ways, depending on your needs and preferences. This section explores different formats for exporting Nmap scan results.

Default Output

By default, Nmap prints its output in the terminal. You can specify the -v option to get a verbose output, which provides additional information about the scan. Verbose output helps monitor the process step by step. For example:

nmap -v
Instructing Nmap to print a verbose output.

Text File Output

If you want to export the results of an Nmap scan, one of the options is to save it in a text file. The output is slightly different from the output in the terminal, but it includes all the essential information.

To save the output in a text file, use the following syntax:

nmap -oN [output_file_name] [domain/IP]

For example:

nmap -oN output.txt

XML Output

XML is another format that Nmap supports for exporting its scan results. At the same time, XML is also the preferred file format for most penetration testing tools because it is easily parsable when importing the results. The syntax for exporting to XML is:

nmap -oX [output_file_name] [domain/IP]

For example:

nmap -oX output.xml

Grepable Output

Grepable format (gnmap) is designed for compatibility with grep and other Unix utilities, allowing for easy parsing and manipulation of the scan results. Specify the -oG option followed by the file name to export results in grepable format:

nmap -oG [output_file_name] [domain/IP]

For example:

nmap -oG scan_results.gnmap

Export to All Formats

You can also simultaneously export the scan results in all supported formats by specifying the -oA command. For example:

nmap -oA output

The above command exports the scan results in three files: output.xml, output.gnmap, and output.txt.

How to Uninstall NMAP on Linux

Depending on how you installed NMAP, select one of the two methods for removing the utility from your system:

Remove Nmap Using the CLI

To remove Nmap from your system using the command line, open the terminal and run the following command:

sudo apt remove nmap -y
Uninstalling Nmap using the CLI.

The command removes Nmap from your system.

Remove Nmap Using the GUI

If you installed Nmap using Ubuntu Software, you can also remove it the same way.

1. Find the app in the software list and select it.

2. Click the Delete icon to remove Nmap.

Uninstalling Nmap using the GUI.

3. When prompted, provide the administrator password and wait for the process to complete.


Now you know how to install and use Nmap on your Linux system. Nmap has many available options and can be a powerful and versatile scanning tool for discovering network vulnerabilities.

Next, check out 17 essential Nmap commands.

Was this article helpful?
Bosko Marijan
Having worked as an educator and content writer, combined with his lifelong passion for all things high-tech, Bosko strives to simplify intricate concepts and make them user-friendly. That has led him to technical writing at PhoenixNAP, where he continues his mission of spreading knowledge.
Next you should read
How to Install NMAP on Ubuntu
April 8, 2024

This article will help you how to install Nmap on Ubuntu as well as explore some of the options it has...
Read more
21 Server Security Tips to Secure Your Server
April 8, 2024

Hackers are always on the lookout for server vulnerabilities. Minimize risks and be confident your data is...
Read more
How to Set up & Configure ModSecurity on Apache
March 11, 2019

ModSecurity is an Open-source firewall application for Apache. Learn how to Setup & Configure ModSecurity on...
Read more
How to Scan & Find All Open Ports with Nmap
April 5, 2024

The Nmap hosted security tool can help you determine how well your firewall and security configuration is...
Read more