Provided by: nbtscan_1.6-1_amd64 bug

NAME

       nbtscan - scan networks for NetBIOS name information

SYNOPSIS

       nbtscan [-v] [-d] [-e] [-l] [-t timeout] [-b bandwidth] [-r] [-q]
               [-s separator] [-h] [-m retransmits] [-f filename | target]

DESCRIPTION

       NBTscan is a program for scanning IP networks for NetBIOS name information. It sends NetBIOS status query
       to  each  address  in  supplied  range  and  lists  received information in human readable form. For each
       responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address  (such  as
       Ethernet).

       NBTscan produces a report like that:

           IP address       NetBIOS Name     Server    User             MAC address
           ------------------------------------------------------------------------------
           192.168.1.2      MYCOMPUTER                 JDOE             00-a0-c9-12-34-56
           192.168.1.5      WIN98COMP        <server>  RROE             00-a0-c9-78-90-00
           192.168.1.123    DPTSERVER        <server>  ADMINISTRATOR    08-00-09-12-34-56

       First  column  lists IP address of responded host. Second column is computer name. Third column indicates
       if this computer shares or is able to share files or printers.  For  NT  machine  it  means  that  Server
       Service  is  running  on  this  computer.  For Windows 95 it means that "I want to be able to give others
       access to my files" or "I want to be able to allow others to print on my printer(s)" checkbox  is  ticked
       (in  Control  Panel/Network/File and Print Sharing). Most often it means that this computer shares files.
       Third column shows user name. If no one is logged on from this computer it is same as computer name. Last
       column shows adapter MAC address.

       If run with -v switch NBTscan lists whole NetBIOS name table for each responded address. The output looks
       like that:

           NetBIOS Name Table for Host 192.168.1.123:

           Name             Service          Type
           ----------------------------------------
           DPTSERVER        <00>             UNIQUE
           DPTSERVER        <20>             UNIQUE
           DEPARTMENT       <00>             GROUP
           DEPARTMENT       <1c>             GROUP
           DEPARTMENT       <1b>             UNIQUE
           DEPARTMENT       <1e>             GROUP
           DPTSERVER        <03>             UNIQUE
           DEPARTMENT       <1d>             UNIQUE
           ??__MSBROWSE__?  <01>             GROUP
           INet~Services    <1c>             GROUP
           IS~DPTSERVER     <00>             UNIQUE
           DPTSERVER        <01>             UNIQUE

           Adapter address: 00-a0-c9-12-34-56
           ----------------------------------------

OPTIONS

       A summary of options is included below.

       -v     Verbose output. Print all names received from each host.

       -d     Dump packets. Print whole packet contents. Cannot be used with -v, -s or -h options.

       -e     Format output in /etc/hosts format.

       -l     Format output in lmhosts format.

       -t <timeout>
              Wait timeout seconds for response. Default 1.

       -b <bandwidth>
              Output  throttling. Slow down output so that it uses no more that bandwidth bps.  Useful  on  slow
              links, so that outgoing queries don't get dropped.

       -r     Use  local  port  137 for scans. Win95 boxes respond to this only. You need to be root to use this
              option.

       -q     Suppress banners and error messages.

       -s <separator>
              Script-friendly output. Don't print column and record headers, separate fields with separator.

       -h     Print human-readable names for services. Can only be used with -v option.

       -m <retransmits>
              Number of retransmits. Default 0.

       -f <filename>
              Take IP addresses to scan from file "filename"

       target NBTscan is a command-line tool. You have to supply at least one argument, the  address  range,  in
              one of three forms:

              xxx.xxx.xxx.xxx
                     Single IP in dotted-decimal notation. Example: 192.168.1.1

              xxx.xxx.xxx.xxx/xx
                     Net address and subnet mask. Example: 192.168.1.0/24

              xxx.xxx.xxx.xxx-xxx
                     Address  range.  Example: 192.168.1.1-127. This will scan all addresses from 192.168.1.1 to
                     192.168.1.127

EXAMPLES

       Scans the whole C-class network:

           nbtscan -r 192.168.1.0/24

       Scans a range from 192.168.1.25 to 192.168.1.137:

           nbtscan 192.168.1.25-137

       Scans C-class network. Prints results in script-friendly format using colon as field separator:

           nbtscan -v -s : 192.168.1.0/24

       The last command produces output like that:

           192.168.0.1:NT_SERVER:00U
           192.168.0.1:MY_DOMAIN:00G
           192.168.0.1:ADMINISTRATOR:03U
           192.168.0.2:OTHER_BOX:00U
           ...

       Scans IP addresses specified in file iplist:

           nbtscan -f iplist

NETBIOS SUFFIXES

       NetBIOS Suffix, aka NetBIOS End Character (endchar), indicates service type for the registered name.  The
       most known codes are listed below. (U = Unique Name, G = Group Name)

           Name                Number(h)  Type  Usage
           --------------------------------------------------------------------------

           <computername>         00       U    Workstation Service
           <computername>         01       U    Messenger Service
           <\--__MSBROWSE__>      01       G    Master Browser
           <computername>         03       U    Messenger Service
           <computername>         06       U    RAS Server Service
           <computername>         1F       U    NetDDE Service
           <computername>         20       U    File Server Service
           <computername>         21       U    RAS Client Service
           <computername>         22       U    Exchange Interchange(MSMail Connector)
           <computername>         23       U    Exchange Store
           <computername>         24       U    Exchange Directory
           <computername>         30       U    Modem Sharing Server Service
           <computername>         31       U    Modem Sharing Client Service
           <computername>         43       U    SMS Clients Remote Control
           <computername>         44       U    SMS Administrators Remote Control Tool
           <computername>         45       U    SMS Clients Remote Chat
           <computername>         46       U    SMS Clients Remote Transfer
           <computername>         87       U    Microsoft Exchange MTA
           <computername>         6A       U    Microsoft Exchange IMC
           <computername>         BE       U    Network Monitor Agent
           <computername>         BF       U    Network Monitor Application
           <username>             03       U    Messenger Service
           <domain>               00       G    Domain Name
           <domain>               1B       U    Domain Master Browser
           <domain>               1C       G    Domain Controllers
           <domain>               1D       U    Master Browser
           <domain>               1E       G    Browser Service Elections
           <INet~Services>        1C       G    IIS
           <IS~computer name>     00       U    IIS

FAQ

       1.  NBTscan lists my Windows boxes just fine but does not list my Unixes or routers. Why?

       R:  That  is  the  way  it  is  supposed  to  work. NBTscan uses NetBIOS for scanning and NetBIOS is only
       implemented by Windows (and some software on Unix such as Samba).

       2.  Why do I get "Connection reset by peer" errors on Windows 2000?

       R: NBTscan uses port 137 UDP for sending queries. If the port is closed on destination  host  destination
       will  reply with ICMP "Port unreachable" message. Most operating system will ignore this message. Windows
       2000 reports it to the application as "Connection reset by peer" error. Just ignore it.

       3.  Why NBTscan doesn't scan for shares? Are you going to add share scanning to NBTscan?

       R: No. NBTscan uses UDP for what it does. That makes it very fast. Share scanning requires TCP.  For  one
       thing,  it  will  make  nbtscan  more  slow. Also adding share scanning means adding a lot of new code to
       nbtscan. There is a lot of good share scanners around, so there is no reason to duplicate that work.

       4.  Why do I get 00-00-00-00-00-00 instead of MAC address when I scan a Samba box?

       R: Because that's what Samba send in response to the query. Nbtscan just prints out what it gets.

AUTHOR

       NBTscan was created by Alla Bezroutchko <alla@inetcat.org>. Currently is maintained by some volunteers at
       https://github.com/resurrecting-open-source-projects/nbtscan

       This manual page was written for the first time by Ryszard  Lach  <rla@debian.org>  and  rewritten,  from
       scratch,  by  Joao  Eriberto Mota Filho <eriberto@debian.org> for the Debian GNU/Linux system (but may be
       used by others).

nbtscan-1.6                                        14 Nov 2019                                        nbtscan(1)