nmap - Network Port Scanner & Service Detection avatar

nmap - Network Port Scanner & Service Detection

Pricing

$5.00 / 1,000 scan records

Go to Apify Store
nmap - Network Port Scanner & Service Detection

nmap - Network Port Scanner & Service Detection

Cloud-hosted nmap (industry-standard network scanner by Fyodor). TCP connect port scans, service/version detection, NSE scripts. Results streamed as structured dataset records โ€” one row per discovered port. $0.005 per record. Authorize scans before running.

Pricing

$5.00 / 1,000 scan records

Rating

0.0

(0)

Developer

Anshuman Atrey

Anshuman Atrey

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

a day ago

Last modified

Share

nmap โ€” Network Port Scanner & Service Detection

๐Ÿ“ฆ Open source ยท MIT: github.com/AnshumanAtrey/nmap-scanner

Cloud-hosted nmap (the industry-standard network scanner by Fyodor / Insecure.Com). Run port scans, service/version detection, OS fingerprinting (limited), and the full library of Nmap Scripting Engine (NSE) scripts against any target you're authorized to scan.

Results are streamed into the Apify dataset as structured records โ€” one row per open port, one per host, one per NSE script result, plus a summary. The raw nmap XML is also saved to the key-value store for downstream tooling.

Authorization disclaimer

You must be authorized to scan the target. Port scanning unowned hosts without permission may violate the Computer Fraud and Abuse Act (US) and equivalent laws elsewhere. Use this actor for: your own infrastructure, bug bounty targets within scope, lawful penetration tests, security research, and the official permitted target scanme.nmap.org.

Quick start

{
"target": "scanme.nmap.org",
"scanProfile": "standard"
}

This scans the top 1000 TCP ports with service/version detection. Takes ~30-60 seconds.

Apify sandbox constraints

Apify containers run unprivileged โ€” no root, no CAP_NET_RAW. This means:

Scan typeAvailable?Reason
TCP Connect (-sT)โœ… Yes (default)Standard sockets work fine
TCP SYN (-sS)โŒ NoRequires raw sockets / root
UDP (-sU)โŒ NoRequires raw sockets / root
Service detection (-sV)โœ… YesWorks over TCP connect
Default scripts (-sC)โœ… YesMost NSE scripts work unprivileged
Vuln scripts (--script vuln)โœ… YesSame as above
OS detection (-O)โŒ NoRequires raw sockets / root

If you need SYN/UDP/OS scans, run nmap locally with sudo โ€” this actor is for the unprivileged scan types that cover ~80% of real-world use cases.

Scan profiles

ProfileWhat it runsUse when
quick--top-ports 100Fast triage
standard (default)--top-ports 1000 -sVMost use cases
thorough-p- -sV -sC (all 65535 ports + scripts)Full asset inventory
webHTTP ports + http-* NSE scriptsWeb app recon
vuln-sV --script vulnVulnerability sweep
customUse ports/customScripts/customArgsPower users

Output structure

Each scan produces multiple dataset records with a recordType discriminator:

recordTypeFieldsWhen
porthost, address, port, protocol, state, service, product, versionOne per port scanned
hosthost, address, hostname, status, openPortsOne per scanned host
scripthost, port, scriptId, outputOne per NSE script result
summaryhostsUp, openPortsTotal, scanDuration, cmd, ...Always last record

Filter by recordType in the Apify Console table view to see one category at a time.

The raw nmap XML is saved to the key-value store as nmap-output.xml โ€” drop into your own XML parser, Metasploit's db_import, or any nmap-aware tool.

Pricing

$0.005 per dataset record produced. A typical standard scan against a host with ~20 open services produces ~22 records ($0.11).

FAQ

Why can't I run SYN or UDP scans?

Apify containers run unprivileged (no root, no CAP_NET_RAW). SYN/UDP/OS-detection all need raw sockets which require root. The TCP-connect path covers ~80% of real-world use cases โ€” for the other 20%, run nmap locally with sudo.

Can I scan my home network?

Only if your home network is reachable from the public internet โ€” nmap on Apify is a cloud scanner, not a LAN scanner. For internal scans, use the Apify Proxy to route through a residential IP, or run nmap on a private box.

What's the difference between standard and thorough?

standard scans the top 1000 TCP ports with version detection โ€” completes in ~1 minute and catches 95% of services. thorough hits all 65535 ports plus default scripts โ€” takes 15-45 minutes per host. Use thorough only when you genuinely need a complete inventory.

Will Apify block my port scans?

Apify allows outbound port scans, but the target may block you. Apify Residential Proxy rotates IPs to mitigate this. Some firewalls also fingerprint nmap traffic specifically โ€” to bypass, use customArgs with --scan-delay 1s -T2 (slower but stealthier).

Can I import the XML into Metasploit / Greenbone / Nessus?

Yes โ€” the raw nmap XML is saved to the key-value store as nmap-output.xml. Download it and db_import nmap-output.xml in msfconsole, or import into Greenbone/Nessus directly.

Pairs nicely with

Bundle for full attack-surface recon:

  • theHarvester โ€” Discover subdomains first, then port-scan each one with nmap
  • NetIntel โ€” WHOIS, DNS, GeoIP, SSL context for every IP nmap finds
  • Bug Bounty Finder โ€” Confirm the target has a bounty program before sending vuln reports
  • Holehe Email OSINT โ€” OSINT the email addresses on services nmap discovers
  • Social Analyzer โ€” Find usernames of admins/developers exposed in service banners
  • Zomato Restaurant Scraper โ€” Restaurant lead lists (separate B2B use case)

Credits

Built on top of nmap by Gordon Lyon (Fyodor). nmap is licensed under the Nmap Public Source License Version 0.95 โ€” please review before commercial use.