Skip to main content
Glama

kali_network_nmap_scan

Perform network port scanning to discover hosts, services, and potential vulnerabilities using Nmap capabilities including TCP/UDP scans, service detection, and OS fingerprinting.

Instructions

Perform network port scanning using Nmap.

Nmap (Network Mapper) is a powerful network scanner for discovering hosts, services, and potential vulnerabilities.

Capabilities:

  • TCP SYN, Connect, UDP, and stealth scans

  • Service version detection (-sV)

  • OS fingerprinting (-O, requires root)

  • NSE script execution

  • Multiple output formats

Usage Notes:

  • TCP SYN scan requires root privileges

  • Use appropriate timing for stealth vs speed

  • Large port ranges increase scan time significantly

Example:

  • Quick scan: target="192.168.1.1", ports="22,80,443"

  • Full scan: target="10.0.0.0/24", ports="-", timing="aggressive"

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
targetYesTarget IP address, hostname, or CIDR range (e.g., '192.168.1.1', 'example.com', '10.0.0.0/24')
portsNoPort specification (e.g., '22', '1-1000', '22,80,443', '-' for all ports). Default: top 1000 ports
scan_typeNoNmap scan type (tcp_syn requires root)tcp_syn
timingNoTiming template: paranoid (T0) to insane (T5)normal
os_detectionNoEnable OS detection (-O, requires root)
service_versionNoProbe for service versions (-sV)
script_scanNoNSE script(s) to run (e.g., 'vuln', 'default', 'http-*')
aggressiveNoEnable aggressive scan (-A: OS, version, script, traceroute)
output_formatNoOutput formattext
timeoutNoScan timeout in seconds

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/azza39925/kali-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server