zmap
Fast internet-wide network scanner
TLDR
Scan port 80 on a network
SYNOPSIS
zmap [-p port] [-o outfile] [-b blacklist] [options] [target]
DESCRIPTION
ZMap is a fast network scanner designed for internet-wide surveys. It can scan the entire IPv4 address space in under 45 minutes from a single machine, using optimized packet generation and stateless scanning.
Unlike nmap which maintains connection state, ZMap sends probes and separately listens for responses, enabling much higher throughput. It uses a cyclic multiplicative group to randomize scan order, avoiding network hotspots.
ZMap supports various probe types through modules (TCP SYN, ICMP, UDP) and output formats. It's commonly used for security research, measuring internet-wide vulnerability exposure, and census-style studies.
PARAMETERS
-p, --target-port port
Port to scan-o, --output-file file
Output results to file-b, --blacklist-file file
File of addresses to exclude-w, --whitelist-file file
File of addresses to include (only scan these)-r, --rate pps
Packets per second (default: unlimited)-B, --bandwidth bps
Bandwidth limit (e.g., 10M, 1G)-i, --interface iface
Network interface-G, --gateway-mac mac
Gateway MAC address-O, --output-module module
Output format (csv, json, extended_file)-f, --output-fields fields
Comma-separated fields to output-n, --max-targets n
Maximum targets to scan-N, --max-results n
Stop after N results
CAVEATS
WARNING: Scanning networks without authorization is illegal in many jurisdictions. Only scan networks you own or have explicit permission to test.
Requires root/CAPNETRAW for raw socket access.
High scan rates can overwhelm networks or trigger security alerts. Use rate limiting and respect network policies.
Always use a blacklist to exclude sensitive addresses (RFC 1918, military, critical infrastructure).
SEE ALSO
nmap(1), masscan(1), unicornscan(1)
