

MAC Address: 40:DD:DD:8F:FF:F5 (Asustek Computer) MAC Address: 5C:DD:DD:FF:FF:B5 (Texas Instruments) Nmap scan report for SoundTouch-Kitchen.lan (192.168.0.160) MAC Address: 88:DD:EA:DD:CE:37 (Texas Instruments)

MAC Address: 50:C7:FF:FF:15:FF (Tp-link Technologies) The output of the above command produces something like: # nmap -sn 192.168.0.0/24 If we want to run a quick scan of machines in our network without trying to see if any port is open, we run: # nmap -sn 192.168.0.0/24 Multiple networks can be scanned at once. MAC Address: 50:ff:BF:ff:ff:AC (Tp-link Technologies) Nmap scan report for Archer.lan (192.168.0.1)

Running a scan without any argument except the network address yields the following: # nmap 192.168.0.0/24 Let's assume your local network is 192.168.0.0/24, and you want to run a scan on this network. You also should consult the Nmap man page by running man nmap. After installing Nmap, you can run the nmap command without arguments to display all of its options. Substitute dnf for yum if you are on Red Hat Enterprise Linux 7 or newer. To install Nmap on Red Hat Enterprise Linux 8 or Fedora, you'd run: # dnf -y install nmap In the following post, we'll walk you through on how to install Nmap, use it, and, most important, get more to know about your network.

