LinuxCommandLibrary

zmap

Fast internet-wide network scanner

TLDR

Scan port 80 on a network

$ sudo zmap -p [80] [192.168.1.0/24]
copy
Scan entire internet on specific port
$ sudo zmap -p [443] -o [results.txt]
copy
Scan with rate limit
$ sudo zmap -p [22] -r [10000] [10.0.0.0/8]
copy
Scan with bandwidth limit
$ sudo zmap -p [80] -B [10M] [target_subnet]
copy
Use specific interface
$ sudo zmap -p [80] -i [eth0] [target]
copy
Output as CSV
$ sudo zmap -p [80] -o [results.csv] -O csv [target]
copy

SYNOPSIS

zmap [-p port] [-o outfile] [-b blacklist] [options] [target]

DESCRIPTION

ZMap is a fast network scanner designed for internet-wide surveys. It can scan the entire IPv4 address space in under 45 minutes from a single machine, using optimized packet generation and stateless scanning.
Unlike nmap which maintains connection state, ZMap sends probes and separately listens for responses, enabling much higher throughput. It uses a cyclic multiplicative group to randomize scan order, avoiding network hotspots.
ZMap supports various probe types through modules (TCP SYN, ICMP, UDP) and output formats. It's commonly used for security research, measuring internet-wide vulnerability exposure, and census-style studies.

PARAMETERS

-p, --target-port port

Port to scan
-o, --output-file file
Output results to file
-b, --blacklist-file file
File of addresses to exclude
-w, --whitelist-file file
File of addresses to include (only scan these)
-r, --rate pps
Packets per second (default: unlimited)
-B, --bandwidth bps
Bandwidth limit (e.g., 10M, 1G)
-i, --interface iface
Network interface
-G, --gateway-mac mac
Gateway MAC address
-O, --output-module module
Output format (csv, json, extended_file)
-f, --output-fields fields
Comma-separated fields to output
-n, --max-targets n
Maximum targets to scan
-N, --max-results n
Stop after N results

CAVEATS

WARNING: Scanning networks without authorization is illegal in many jurisdictions. Only scan networks you own or have explicit permission to test.
Requires root/CAPNETRAW for raw socket access.
High scan rates can overwhelm networks or trigger security alerts. Use rate limiting and respect network policies.
Always use a blacklist to exclude sensitive addresses (RFC 1918, military, critical infrastructure).

SEE ALSO

nmap(1), masscan(1), unicornscan(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community