Provided by: zmap_1.1.0-1_amd64 bug

NAME

       zmap - A fast Internet-wide scanner

SYNOPSIS

       zmap [ OPTIONS ...  ]

DESCRIPTION

       ZMap is a network tool for scanning the entire Internet (or large samples).

OPTIONS

   Basic options
       -p, --target-port=port
              TCP port number to scan (for SYN scans)

       -o, --output-file=name
              When  using  an output module that uses a file (such as the default), write results
              to this file. Use - for stdout.

       -b, --blacklist-file=path
              File of subnets to exclude, in CIDR notation (e.g. 192.168.0.0/16),  one-per  line.
              It  is  recommended  you  use  this  to exclude RFC 1918 addresses, multicast, IANA
              reserved space, and other IANA special-purpose addresses. An example blacklist file
              is provided in conf/blacklist.conf for this purpose.

       -w, --whitelist-file=path
              File of subnets to constrain scan to, in CIDR notation, e.g. 192.168.0.0/16

   Scan options
       -n, --max-targets=n
              Cap number of targets to probe (as a number or a percentage of the address space)

       -N, --max-results=n
              Cap number of results to return

       -t, --max-runtime=secs
              Cap length of time for sending packets

       -r, --rate=pps
              Set send rate in packets/sec

       -B, --bandwidth=bps
              Set  send  rate  in  bits/second (supports suffixes G, M and K). This overrides the
              --rate flag.

       -c, --cooldown-time=secs
              How long to continue receiving after sending last probe  (default=8)

       -e, --seed=n
              Seed used to select address permutation.  Specify the same seed in  order  to  scan
              the same sample repeatedly.

       -T, --sender-threads=n
              Threads used to send packets  (default=1)

       -P, --probes=n
              Number of probes to send to each IP (default=1)

       -d, --dryrun
              Print  out  each  packet  to  stdout  instead  of  sending  it.  (May be useful for
              debugging.)

   Network options
       -s, --source-port=port|range
              Source port(s) for scan packets

       -S, --source-ip=ip|range
              Source address(es) for scan packets

       -G, --gateway-mac=addr
              Specify gateway MAC address. All packets will be sent to this Ethernet address.

       -i, --interface=name
              Specify network interface to use.

       -X, --vpn
              If using ZMap through a VPN, use this  option.  Instead  of  sending  raw  Ethernet
              frames,  ZMap  will  send  IP packets. When using this option, it is generally also
              necessary to provide the interface (through the -i flag).

   Advanced options
       -M, --probe-module=name
              Select probe module  (default=tcp_synscan)

       -O, --output-module=name
              Select output module  (default=simple_file)

       -f, --output-fields=fields
              Fields that should be output in result set; see --list-output-fields

       --probe-args=args
              Arguments to pass to probe module

       --output-args=args
              Arguments to pass to output module

       --list-output-modules
              List available output modules

       --list-probe-modules
              List available probe modules

       --list-output-fields
              List all fields that can be output  (using  --output-fields  )  by  selected  probe
              module

   Additional options
       -C, --config=filename
              Read   a   configuration   file,   which   can   specify   any   of  these  options
              (default=/etc/zmap/zmap.conf)

       -q, --quiet
              Do not print status updates

       -g, --summary
              Print configuration and summary at end of scan

       -v, --verbosity=n
              Level of log detail (0-5)  (default=3)

       -h, --help
              Print help and exit

       -V, --version
              Print version and exit

EXAMPLES

       Scan the whole Internet for hosts with port 443 open (results discarded):

       zmap -p 443

       Find 5 HTTP servers (port 80), scanning at 10 Mb/s, print the results to stdout:

       zmap -N 5 -B 10M -p 80 -o -

WARNING

       By default, ZMap attempts to scan at the line speed of your  Ethernet  interface  and  can
       easily  use  1  Gbit/second  of  bandwidth. If your network is not able to support sending
       packets this quickly, your  local  network  may  become  congested,  causing  connectivity
       problems  for  you  and  those  around you.  Use the -B (--bandwidth) option to set ZMap's
       maximum bandwidth to an appropriate limit for your network and upstream connection.

AUTHOR

       Zakir Durumeric, Eric Wustrow, J. Alex Halderman (https://www.zmap.io)