Usages
OS Detection
sudo nmap -O -v 192.168.1.236
Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-30 17:40 EST Initiating ARP Ping Scan at 17:40 Scanning 192.168.1.236 [1 port] Completed ARP Ping Scan at 17:40, 0.34s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:40 Completed Parallel DNS resolution of 1 host. at 17:40, 0.17s elapsed Initiating SYN Stealth Scan at 17:40 Scanning 192.168.1.236 [1000 ports] Stats: 0:00:06 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 1.50% done; ETC: 17:47 (0:06:34 remaining) SYN Stealth Scan Timing: About 11.50% done; ETC: 17:45 (0:04:45 remaining) SYN Stealth Scan Timing: About 21.00% done; ETC: 17:45 (0:04:16 remaining) SYN Stealth Scan Timing: About 30.50% done; ETC: 17:45 (0:03:43 remaining) SYN Stealth Scan Timing: About 39.55% done; ETC: 17:46 (0:03:17 remaining) SYN Stealth Scan Timing: About 49.05% done; ETC: 17:45 (0:02:45 remaining) SYN Stealth Scan Timing: About 58.50% done; ETC: 17:45 (0:02:14 remaining) SYN Stealth Scan Timing: About 67.55% done; ETC: 17:45 (0:01:45 remaining) SYN Stealth Scan Timing: About 77.05% done; ETC: 17:45 (0:01:14 remaining) SYN Stealth Scan Timing: About 86.55% done; ETC: 17:45 (0:00:44 remaining) Completed SYN Stealth Scan at 17:45, 323.61s elapsed (1000 total ports) Initiating OS detection (try #1) against 192.168.1.236 Retrying OS detection (try #2) against 192.168.1.236 Nmap scan report for 192.168.1.236 Host is up (0.32s latency). All 1000 scanned ports on 192.168.1.236 are filtered MAC Address: 34:2F:BD:28:86:A5 (Nintendo) Too many fingerprints match this host to give specific OS details Network Distance: 1 hop