nmap.org · 5,232
Nmap, also known as the Network Mapper, is a powerful tool used for network exploration and security auditing. It is widely used by network administrators, security professionals, and hackers alike. Nmap can scan large networks, discover hosts, services, and vulnerabilities, and generate useful reports. It is available for Linux, Windows, UNIX, FreeBSD, and other operating systems. In addition to the core Nmap tool, there are related projects like Npcap for packet capture, security lists, and security tools. The Nmap website (nmap.org) provides resources such as a reference guide, documentation, and the Zenmap GUI. Nmap has been featured in movies and is a popular choice for network security testing. You can download the latest version, Nmap 7.95, from the official website. Stay updated with release announcements, download pages, and release notes. Explore the original Phrack #51 article and celebrate #Nmap20.
nmap.org · years statistic
2000
1 | 0 |
2 | 0 |
3 | 0 |
4 | 0 |
5 | 0 |
6 | 0 |
7 | 0 |
8 | 1 |
9 | 0 |
10 | 2 |
11 | 0 |
12 | 1 |
2001
1 | 1 |
2 | 3 |
3 | 2 |
4 | 0 |
5 | 0 |
6 | 1 |
7 | 1 |
8 | 0 |
9 | 1 |
10 | 0 |
11 | 1 |
12 | 0 |
2002
1 | 1 |
2 | 0 |
3 | 2 |
4 | 0 |
5 | 2 |
6 | 2 |
7 | 0 |
8 | 0 |
9 | 2 |
10 | 0 |
11 | 3 |
12 | 0 |
2003
1 | 0 |
2 | 4 |
3 | 1 |
4 | 3 |
5 | 1 |
6 | 1 |
7 | 1 |
8 | 1 |
9 | 2 |
10 | 2 |
11 | 2 |
12 | 4 |
2004
1 | 0 |
2 | 0 |
3 | 0 |
4 | 2 |
5 | 2 |
6 | 3 |
7 | 1 |
8 | 1 |
9 | 4 |
10 | 0 |
11 | 2 |
12 | 0 |
2005
1 | 0 |
2 | 2 |
3 | 1 |
4 | 0 |
5 | 0 |
6 | 0 |
7 | 0 |
8 | 0 |
9 | 0 |
10 | 0 |
11 | 2 |
12 | 7 |
2006
1 | 15 |
2 | 1 |
3 | 1 |
4 | 1 |
5 | 0 |
6 | 0 |
7 | 1 |
8 | 1 |
9 | 2 |
10 | 0 |
11 | 0 |
12 | 0 |
2007
1 | 0 |
2 | 0 |
3 | 0 |
4 | 0 |
5 | 0 |
6 | 0 |
7 | 1 |
8 | 0 |
9 | 0 |
10 | 0 |
11 | 0 |
12 | 0 |
2008
1 | 0 |
2 | 0 |
3 | 0 |
4 | 0 |
5 | 1 |
6 | 0 |
7 | 0 |
8 | 1 |
9 | 0 |
10 | 0 |
11 | 0 |
12 | 0 |
2010
1 | 1 |
2 | 0 |
3 | 1 |
4 | 0 |
5 | 2 |
6 | 0 |
7 | 3 |
8 | 0 |
9 | 0 |
10 | 2 |
11 | 0 |
12 | 4 |
2011
1 | 9 |
2 | 21 |
3 | 1 |
4 | 4 |
5 | 0 |
6 | 1 |
7 | 7 |
8 | 4 |
9 | 3 |
10 | 6 |
11 | 1 |
12 | 2 |
2012
1 | 8 |
2 | 4 |
3 | 5 |
4 | 5 |
5 | 11 |
6 | 4 |
7 | 3 |
8 | 0 |
9 | 19 |
10 | 33 |
11 | 3 |
12 | 10 |
2013
1 | 10 |
2 | 2 |
3 | 2 |
4 | 5 |
5 | 10 |
6 | 2 |
7 | 2 |
8 | 7 |
9 | 7 |
10 | 6 |
11 | 15 |
12 | 29 |
2014
1 | 29 |
2 | 11 |
3 | 3 |
4 | 8 |
5 | 9 |
6 | 7 |
7 | 12 |
8 | 18 |
9 | 17 |
10 | 19 |
11 | 14 |
12 | 15 |
2015
1 | 14 |
2 | 9 |
3 | 14 |
4 | 13 |
5 | 14 |
6 | 16 |
7 | 18 |
8 | 24 |
9 | 39 |
10 | 27 |
11 | 28 |
12 | 15 |
2016
1 | 23 |
2 | 33 |
3 | 32 |
4 | 20 |
5 | 35 |
6 | 20 |
7 | 19 |
8 | 10 |
9 | 13 |
10 | 19 |
11 | 7 |
12 | 19 |
2017
1 | 17 |
2 | 21 |
3 | 27 |
4 | 13 |
5 | 16 |
6 | 67 |
7 | 34 |
8 | 31 |
9 | 17 |
10 | 17 |
11 | 21 |
12 | 35 |
2018
1 | 15 |
2 | 10 |
3 | 10 |
4 | 36 |
5 | 39 |
6 | 24 |
7 | 15 |
8 | 35 |
9 | 15 |
10 | 33 |
11 | 25 |
12 | 45 |
2019
1 | 52 |
2 | 68 |
3 | 28 |
4 | 48 |
5 | 41 |
6 | 28 |
7 | 41 |
8 | 71 |
9 | 35 |
10 | 30 |
11 | 23 |
12 | 26 |
2020
1 | 16 |
2 | 34 |
3 | 20 |
4 | 23 |
5 | 27 |
6 | 43 |
7 | 35 |
8 | 35 |
9 | 48 |
10 | 25 |
11 | 25 |
12 | 40 |
2021
1 | 31 |
2 | 18 |
3 | 52 |
4 | 47 |
5 | 39 |
6 | 26 |
7 | 31 |
8 | 23 |
9 | 29 |
10 | 35 |
11 | 40 |
12 | 31 |
2022
1 | 47 |
2 | 26 |
3 | 66 |
4 | 78 |
5 | 60 |
6 | 34 |
7 | 35 |
8 | 25 |
9 | 39 |
10 | 24 |
11 | 35 |
12 | 39 |
2023
1 | 34 |
2 | 61 |
3 | 97 |
4 | 78 |
5 | 177 |
6 | 129 |
7 | 115 |
8 | 199 |
9 | 135 |
10 | 98 |
11 | 112 |
12 | 148 |
2024
1 | 148 |
2 | 107 |
3 | 90 |
4 | 97 |
5 | 0 |
6 | 0 |
7 | 0 |
8 | 0 |
9 | 0 |
10 | 0 |
11 | 0 |
12 | 0 |
nmap.org · links
Technology
United States
English
acsac.org
2,228
Annual Computer Security Applications Conference (ACSAC)