Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards
- Network mapping (18)9.595%
- Network monitoring (13)9.090%
- Automated network device discovery (13)8.585%
- Customizable reports (11)4.646%
Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of Nmap, and make your voice heard!
Nmap OEM Small/Startup Company Redistribution License - Quarterly Term Maintenance Fee
Nmap OEM Mid-Sized Company Redistribution License - Quarterly Term Maintenance Fee
Nmap OEM Enterprise Redistribution License - Quarterly Term Maintenance Fee
Entry-level set up fee?
- No setup fee
- Free Trial
- Free/Freemium Version
- Premium Consulting / Integration Services
Starting price (does not include set up fee)
- $49,980 one-time fee
- Comprehensive port scanning of both TCP and UDP ports.
- Clever 'interrogation' of services listening on open ports. It will use all sorts of techniques to try and work out what service is listening on a port, and potentially even version and host information, etc.
- Very configurable. You can choose exactly what you want to scan for, limit to port ranges, protocols, IPs, etc.
- Very scriptable. Being a command-line utility (check out Zenmap if you want a GUI), you can call it from your own scripts, automation pipelines, etc.
- Not a problem with Nmap, per se, but the related Zenmap GUI could do with some love! It does the job perfectly well so I shouldn't complain, but it would benefit from a modern makeover.
- It is open source, so you can verify how it works
- It is very extensive, with lots of advanced networking features
- It is very lightweight and easy to start up
- The learning curve is quite steep
- On Windows, not all functions are available
- If you do not limit your scan range, a command can take a really long time to complete
- Scanning multiple IPs for open ports
- very lightweight and not heavy
- First step in auditing, pentesting, etc.
- Bit of a learning curve
- Syntax can be confusing
Also, when we set up a new product or do a proof-of-concept of a software we're looking into, we like to scan it and see what ports may be used and open and then bring it up with our sales engineers.
- Nmap is fast and flexible, It allows me to perform custom scan across my network(s)
- Nmap provides crucial OS information when possible
- comes in GUI and command-line versions
- allows me to scan individual IP, ranges and full subnets
- The ability to throttle the scan progress helps me to avoid triggering alarms
- exporting, There's a serious lack of ability to export the information in a readable format to present to VPs and such. I always find myself doing a lot of data massaging to get it in a pretty format
- some scans can trigger sensitive IDS/IPS
- SYN scans can be particularly aggressive and cause problems on remote systems.
Exporting the results from these scans do not always format nicely when imported into spreadsheet programs. much data manipulation is required.
- Ease of use
- Good interface
- Lots of options
- Curve of learning
- Fluent design
- Better docs
- Nmap is great at finding live hosts on the network
- Nmap is great for teaching new cyber specialist how network reconnaissance works
- Nmap is built into every major recon tool on the market, it just works when it comes to scanning
- There could be more built in tools for further vulnerability scanning
- command line Nmap should store recent scans automatically
- More detail in the help menu for what some of the triggers actually do
- Open/Closed ports.
- OS detection.
- I would it say it's hard for new people using it as the there are too many switches.
- Better/faster udp scanning. I know that udp is best effort but something better would be great instead of waiting for timeouts.
If you get into OS detection and mass port scanning of a large network it does slow down a far bit.
- Very user-intuitive.
- Built-in scripts allow for vulnerability testing.
- Better GUI for ZenMap.
- Can be difficult to learn and master.
- It's quick (and depending on the options and your preferences for scanning can be made to run even quicker)
- Huge amount of options
- User community support is ubiquitous
- Hardly anything to mention
- Open port scanning is a great tool to ensure your internal and external networks are secured.
- being able to identify endpoints and ensuring they are configured correctly.
- Great to be able to script within NMAP. It truly can be tailored to your exact needs
- Wish it had a gui and a better UI experience.
- Even though it's free an enterprise support option would be great.
- Highly accurate endpoint identification
- Vulnerability scanning is detailed and clear.
- Easily scripted and analyzed
- CLI only; there is an unofficial graphical interface (but it isn't too great)
- Not supported by a vendor
- Somewhat steep learning curve
- Port Scanning
- Network scans
- Vulnerability checks
- They do not make modules fast enough! More more more!
- Detects open ports
- IDs hosts
- Checking firewall rules
- Maybe take some of the features of Zenmap and bake them in?
- Include fancy extra graphical results charts or graphs or something to show people who you want to convey info too but have no idea what Nmap is actually doing.
- I don't really think I'd change a lot actually.
- Nmap is an network mapper
- Finding the open ports is very easy using the Nmap
- I recommended this tool all the other employees .
- If there is no network we cannot use this tool
- I recommended to use this tool
- The GUI is very helpful for those that don't like the classic way.
- Intensive Scan, Ping and port scans
- Make a little topology of the Host found.
- Does not work all the time depending on the network and the security on it.
- Network monitoring
- Port Scanning
- Service enumeration.
- It works perfectly as it is where features are concerned. If it is combined with Zenmap for those preferring a GUI, it's invaluable.
- Scans for open ports, giving you the option of how aggressively or lightly to scan.
- Can help determine which OS and services are running on a device, again, giving the option of how aggressively to scan a device.
- There is something of a learning curve in using the tool. A number of shortcuts and GUI options are available in Zenmap to simplify the process, but perhaps a more visual interface can help simplify the selection process prior to executing the Nmap command.
- Nmap has a unique process of fingerprinting applications/devices to help us identify their communications patterns quicker.
- Nmap can be used for network auditing by specifying whole subnets that you would like to scan for open/closed ports.
- Nmap has a diverse presence and can be used from most operating systems.
- Since Nmap is a free software, new and updated versions don't pop up regularly. It's rather complete as it is, but technologies advance quickly and it would benefit NMAP to try to keep up.
- Nmap is currently offered as graphical and command line programs. Not sure if a web-based version would be something the developers would consider.
- Nmap does not appear to offer commercial support so you are at the mercy of the community and developers if you have a particular problem you need to find a resolution for in a short amount of time.
- Nmap allows you to search IP ranges that you as the user determine
- Nmap gives you a detailed list of utilized IP addresses in the range that you have identified
- Nmap provides what type of device is utilizing an IP address
- When scanning, you have to put in the exact numbers for it to scan, which can be annoying
- Nmap is very simple and just pings IP ranges, I wish it could do more
- NMap provides a very fast and a very thorough network "sweep" that allows you to quickly map out exactly what's on your network.
- NMap is highly configurable. The "canned" choices are very good in most instances, but using various switches and options, you can create a very specific scan and get exactly the results you're looking for.
- NMap is easy to use. Even a new administrator will be able to use the graphical version (Zenmap) with efficiency right away.
- Running stealthier scans would be a bonus. Current scans are pretty noisy.
- Scans run fast, which sometimes can make it look like a system is being attacked. There is a slow, comprehensive scan option, though.
- NMap scripts are written in Lua, which is not a mainstream language.