LinuxCommandLibrary

naabu

fast port scanner written in Go

TLDR

Scan target for open ports

$ naabu -host [example.com]
copy
Scan specific ports
$ naabu -host [example.com] -p [80,443,8080]
copy
Scan port range
$ naabu -host [example.com] -p [1-1000]
copy
Scan top ports
$ naabu -host [example.com] -top-ports [100]
copy
Scan from file
$ naabu -list [targets.txt]
copy
Output to file
$ naabu -host [example.com] -o [results.txt]
copy
Scan with rate limit
$ naabu -host [example.com] -rate [1000]
copy
JSON output
$ naabu -host [example.com] -json
copy

SYNOPSIS

naabu [-host target] [-p ports] [-top-ports n] [-o file] [options]

DESCRIPTION

naabu is a fast port scanner written in Go. It uses SYN scanning for speed while maintaining accuracy through verification.
The scanner optimizes for speed with configurable rate limiting. It can scan thousands of hosts quickly while respecting network constraints.
Top ports mode scans the most commonly open ports, focusing resources on likely targets. Custom port lists target specific services.
Nmap integration hands off discovered ports for service detection. This combines naabu's speed with nmap's detailed fingerprinting.
Output formats include plain text, JSON, and nmap-compatible results. Integration with other security tools is straightforward.
The tool is designed for security professionals performing authorized assessments.

PARAMETERS

-host TARGET

Target to scan.
-list FILE
File with targets.
-p PORTS
Ports to scan.
-top-ports N
Scan top N ports.
-exclude-ports PORTS
Ports to exclude.
-o FILE
Output file.
-json
JSON output.
-rate N
Packets per second.
-c N
Concurrent hosts.
-timeout MS
Timeout in milliseconds.
-retries N
Retry count.
-verify
Verify open ports.
-nmap
Run nmap on discovered ports.
-silent
Silent mode.
-v
Verbose output.

CAVEATS

SYN scanning requires root/admin privileges. Aggressive scanning may trigger IDS/IPS. Only use on authorized targets. Rate limiting important on production networks.

HISTORY

naabu was developed by ProjectDiscovery as part of their security tooling suite. It complements their other tools like nuclei, httpx, and subfinder for comprehensive security testing workflows.

SEE ALSO

nmap(1), masscan(1), rustscan(1), zmap(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community