Zenmap Translation - es
Spanish-language translation of Zenmap. Work-in-progress.
POT-Creation-Date: 2014-10-23 15:14+0000
Contents
- 1 Translators
- 2 Strings
- 2.1 done: Unknown Host
- 2.2 done: unknown
- 2.3 done: Unknown version
- 2.4 done: Unknown
- 2.5 done: %s on %s
- 2.6 done: No module named dbapi2.pysqlite2 or sqlite3
- 2.7 done: Use DIR as the user configuration directory. Default: %default
- 2.8 done: Specify a scan result file in Nmap XML output format. Can be used more than once to specify several scan result files.
- 2.9 done: Run %s with the specified args.
- 2.10 done: Begin with the specified profile selected. If combined with the -t (--target) option, automatically run the profile against the specified target.
- 2.11 done: Specify a target to be used along with other options. If specified alone, open with the target field filled with the specified target
- 2.12 done: Increase verbosity of the output. May be used more than once to get even more verbosity
- 2.13 done: Python 2.4 or later is required.
- 2.14 done: There was an error getting the list of scripts from Nmap. Try upgrading Nmap.
- 2.15 done: List of scripts\n\nA list of all installed scripts. Activate or deactivate a script by clicking the box next to the script name.
- 2.16 done: Description\n\nThis box shows the categories a script belongs to. In addition, it gives a detailed description of the script which is present in script. A URL points to online NSEDoc documentation.
- 2.17 done: Arguments\n\nA list of arguments that affect the selected script. Enter a value by clicking in the value field beside the argument name.
- 2.18 Please wait.
- 2.19 Names
- 2.20 Arguments
- 2.21 Select script files
- 2.22 Host Filter:
- 2.23 Entering the text into the search performs a <b>keyword search</b> - the search string is matched against every aspect of the host.\n\nTo refine the search, you can use <b>operators</b> to search only specific fields within a host. Most operators have a short form, listed. \n<b>target: (t:)</b> - User-supplied target, or a rDNS result.\n<b>os:</b> - All OS-related fields.\n<b>open: (op:)</b> - Open ports discovered in a scan.\n<b>closed: (cp:)</b> - Closed ports discovered in a scan.\n<b>filtered: (fp:)</b> - Filtered ports discovered in scan.\n<b>unfiltered: (ufp:)</b> - Unfiltered ports found in a scan (using, for example, an ACK scan).\n<b>open|filtered: (ofp:)</b> - Ports in the \"open|filtered\" state.\n<b>closed|filtered: (cfp:)</b> - Ports in the \"closed|filtered\" state.\n<b>service: (s:)</b> - All service-related fields.\n<b>inroute: (ir:)</b> - Matches a router in the scan's traceroute output.\n
- 2.24 Hosts
- 2.25 Services
- 2.26 OS
- 2.27 Host
- 2.28 done: Service
- 2.29 done: Scan Output
- 2.30 done: Select Scan Result
- 2.31 Error parsing file
- 2.32 The file is not an Nmap XML output file. The parsing error that occurred was\n%s
- 2.33 done: Cannot open selected file
- 2.34 done: This error occurred while trying to open the file:\n %s
- 2.35 Compare Results
- 2.36 done: A Scan
- 2.37 done: B Scan
- 2.38 done: Error running ndiff
- 2.39 done: There was an error running the ndiff program.\n\n
- 2.40 Error parsing ndiff output
- 2.41 done: The ndiff process terminated with status code %d.
- 2.42 Command:
- 2.43 done: Scan
- 2.44 done: Cancel
- 2.45 done: Target:
- 2.46 done: Profile:
- 2.47 Sc_an
- 2.48 _Save Scan
- 2.49 done: Save current scan results
- 2.50 Save All Scans to _Directory
- 2.51 done: Save all scans into a directory
- 2.52 _Open Scan
- 2.53 Open the results of a previous scan
- 2.54 _Open Scan in This Window
- 2.55 Append a saved scan to the list of scans in this window.
- 2.56 _Tools
- 2.57 _New Window
- 2.58 Open a new scan window
- 2.59 Close Window
- 2.60 Close this scan window
- 2.61 Print...
- 2.62 Print the current scan
- 2.63 done: Quit
- 2.64 done: Quit the application
- 2.65 New _Profile or Command
- 2.66 Create a new scan profile using the current command
- 2.67 Search Scan Results
- 2.68 Search for a scan result
- 2.69 Filter Hosts
- 2.70 Search for host by criteria
- 2.71 _Edit Selected Profile
- 2.72 Edit selected scan profile
- 2.73 _Profile
- 2.74 Compare Scan Results using Diffies
- 2.75 _Help
- 2.76 _Report a bug
- 2.77 Report a bug
- 2.78 _About
- 2.79 About %s
- 2.80 Shows the application help
- 2.81 Can't save to database
- 2.82 Can't store unsaved scans to the recent scans database:\n%s
- 2.83 done: Error loading file
- 2.84 done: Nothing to save
- 2.85 done: There are no scans with results to be saved. Run a scan with the \"Scan\" button first.
- 2.86 There is a scan still running. Wait until it finishes and then save.
- 2.87 There are %u scans still running. Wait until they finish and then save.
- 2.88 Scan is running
- 2.89 Save Scan
- 2.90 This scan has not been run yet. Start the scan with the \"Scan\" button first.
- 2.91 Choose a directory to save scans into
- 2.92 Can't save file
- 2.93 Can't open file to write.\n%s
- 2.94 Close anyway
- 2.95 Unsaved changes
- 2.96 The given scan has unsaved changes.\nWhat do you want to do?
- 2.97 Trying to close
- 2.98 The window you are trying to close has a scan running in the background.\nWhat do you want to do?
- 2.99 Can't find documentation files
- 2.100 There was an error loading the documentation file %s (%s). See the online documentation at %s.
- 2.101 Empty Nmap Command
- 2.102 There is no command to execute. Maybe the selected/typed profile doesn't exist. Please check the profile name or type the nmap command you would like to execute.
- 2.103 This means that the nmap executable was not found in your system PATH, which is
- 2.104 <undefined>
- 2.105 plus the extra directory
- 2.106 plus the extra directories
- 2.107 Error executing command
- 2.108 Parse error
- 2.109 There was an error while parsing the XML file generated from the scan:\n\n%s
- 2.110 Cannot merge scan
- 2.111 There was an error while merging the new scan's XML:\n\n%s
- 2.112 %d/%d hosts shown
- 2.113 Nmap Output
- 2.114 Ports / Hosts
- 2.115 Topology
- 2.116 Host Details
- 2.117 Scans
- 2.118 No host selected.
- 2.119 Port
- 2.120 Protocol
- 2.121 State
- 2.122 Version
- 2.123 Hostname
- 2.124 How to Report a Bug
- 2.125 <big><b>How to report a bug</b></big>\n\nLike their author, %(nmap)s and %(app)s aren't perfect. But you can help make it better by sending bug reports or even writing patches. If %(nmap)s doesn't behave the way you expect, first upgrade to the latest version available from <b>%(nmap_web)s</b>. If the problem persists, do some research to determine whether it has already been discovered and addressed. Try Googling the error message or browsing the nmap-dev archives at http://seclists.org/. Read the full manual page as well. If nothing comes of this, mail a bug report to <b><dev@nmap.org></b>. Please include everything you have learned about the problem, as well as what version of Nmap you are running and what operating system version it is running on. Problem reports and %(nmap)s usage questions sent to dev@nmap.org are far more likely to be answered than those sent to Fyodor directly.\n\nCode patches to fix bugs are even better than bug reports. Basic instructions for creating patch files with your changes are available at http://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) or to Fyodor directly.\n
- 2.126 Search:
- 2.127 Expressions
- 2.128 Date
- 2.129 No search method selected!
- 2.130 %s can search results on directories or inside its own database. Please select a method by choosing a directory or by checking the search data base option in the 'Search options' tab before starting a search
- 2.131 Entering the text into the search performs a <b>keyword search</b> - the search string is matched against the entire output of each scan.\n\nTo refine the search, you can use <b>operators</b> to search only within a specific part of a scan. Operators can be added to the search interactively if you click on the <b>Expressions</b> button, or you can enter them manually into the search field. Most operators have a short form, listed.\n\n<b>profile: (pr:)</b> - Profile used.\n<b>target: (t:)</b> - User-supplied target, or a rDNS result.\n<b>option: (o:)</b> - Scan options.\n<b>date: (d:)</b> - The date when scan was performed. Fuzzy matching is possible using the \"~\" suffix. Each \"~\" broadens the search by one day on \"each side\" of the date. In addition, it is possible to use the \"date:-n\" notation which means \"n days ago\".\n<b>after: (a:)</b> - Matches scans made after the supplied date (<i>YYYY-MM-DD</i> or <i>-n</i>).\n<b>before (b:)</b> - Matches scans made before the supplied date(<i>YYYY-MM-DD</i> or <i>-n</i>).\n<b>os:</b> - All OS-related fields.\n<b>scanned: (sp:)</b> - Matches a port if it was among those scanned.\n<b>open: (op:)</b> - Open ports discovered in a scan.\n<b>closed: (cp:)</b> - Closed ports discovered in a scan.\n<b>filtered: (fp:)</b> - Filtered ports discovered in scan.\n<b>unfiltered: (ufp:)</b> - Unfiltered ports found in a scan (using, for example, an ACK scan).\n<b>open|filtered: (ofp:)</b> - Ports in the \"open|filtered\" state.\n<b>closed|filtered: (cfp:)</b> - Ports in the \"closed|filtered\" state.\n<b>service: (s:)</b> - All service-related fields.\n<b>inroute: (ir:)</b> - Matches a router in the scan's traceroute output.\n
- 2.132 Not available
- 2.133 Nmap Version:
- 2.134 Verbosity level:
- 2.135 Debug level:
- 2.136 Command Info
- 2.137 Started on:
- 2.138 Finished on:
- 2.139 Hosts up:
- 2.140 Hosts down:
- 2.141 Hosts scanned:
- 2.142 Open ports:
- 2.143 done: Filtered ports:
- 2.144 done: Closed ports:
- 2.145 done: General Info
- 2.146 Scan Info
- 2.147 Scan type:
- 2.148 done: Protocol:
- 2.149 done: # scanned ports:
- 2.150 Services:
- 2.151 Crash Report
- 2.152 An unexpected error has crashed %(app_name)s. Please copy the stack trace below and send it to the <a href=\"mailto:dev@nmap.org\">dev@nmap.org</a> mailing list. (<a href=\"http://seclists.org/nmap-dev/\">More about the list.</a>) The developers will see your report and try to fix the problem.
- 2.153 <b>Copy and email to <a href=\"mailto:dev@nmap.org\">dev@nmap.org</a>:</b>
- 2.154 done: Details
- 2.155 Nmap Output Properties
- 2.156 done: details
- 2.157 port listing title
- 2.158 open port
- 2.159 closed port
- 2.160 filtered port
- 2.161 date
- 2.162 hostname
- 2.163 ip
- 2.164 Highlight definitions
- 2.165 Text
- 2.166 Highlight
- 2.167 text color
- 2.168 highlight color
- 2.169 About %s and %s
- 2.170 %s is a free and open source utility for network exploration and security auditing.
- 2.171 %s is a multi-platform graphical %s frontend and results viewer. It was originally derived from %s.
- 2.172 %s is an %s GUI created as part of the Nmap/Google Summer of Code program.
- 2.173 %s credits
- 2.174 Written by
- 2.175 Design
- 2.176 SoC 2007
- 2.177 Contributors
- 2.178 Translation
- 2.179 Maemo
- 2.180 Running
- 2.181 Unsaved
- 2.182 Failed
- 2.183 Canceled
- 2.184 Status
- 2.185 Command
- 2.186 Append Scan
- 2.187 Remove Scan
- 2.188 Cancel Scan
- 2.189 Show the topology anyway
- 2.190 Topology is disabled because too many hosts can cause it\nto run slowly. The limit is %d hosts and there are %d.
- 2.191 All files (%s)
- 2.192 Nmap XML files (%s)
- 2.193 NSE scripts (%s)
- 2.194 By extension
- 2.195 Nmap XML format (.xml)
- 2.196 Nmap text format (.nmap)
- 2.197 Select File Type:
- 2.198 Choose file
- 2.199 Profile Editor
- 2.200 Profile Information
- 2.201 Profile name
- 2.202 Description
- 2.203 Save Changes
- 2.204 Help
- 2.205 Profile
- 2.206 Unnamed profile
- 2.207 You must provide a name for this profile.
- 2.208 Disallowed profile name
- 2.209 Sorry, the name \"%s\" is not allowed due to technical limitations. (The underlying ConfigParser used to store profiles does not allow it.) Choose a different name.
- 2.210 Deleting Profile
- 2.211 Your profile is going to be deleted! ClickOk to continue, or Cancel to go back to Profile Editor.
- 2.212 Search Scans
- 2.213 Append
- 2.214 Import error
- 2.215 A required module was not found.\n\n
- 2.216 Error creating the per-user configuration directory
- 2.217 There was an error creating the directory %s or one of the files in it. The directory is created by copying the contents of %s. The specific error was\n\n%s\n\n%s needs to create this directory to store information such as the list of scan profiles. Check for access to the directory and try again.
- 2.218 Error parsing the configuration file
- 2.219 There was an error parsing the configuration file %s. The specific error was\n\n%s\n\n%s can continue without this file but any information in it will be ignored until it is repaired.
- 2.220 You are trying to run %s with a non-root user!\n\nSome %s options need root privileges to work.
- 2.221 Non-root user
- 2.222 Host Status
- 2.223 Addresses
- 2.224 Hostnames
- 2.225 Operating System
- 2.226 Ports used
- 2.227 OS Classes
- 2.228 TCP Sequence
- 2.229 IP ID Sequence
- 2.230 TCP TS Sequence
- 2.231 Comments
- 2.232 State:
- 2.233 Scanned ports:
- 2.234 Up time:
- 2.235 Last boot:
- 2.236 IPv4:
- 2.237 IPv6:
- 2.238 MAC:
- 2.239 Vendor:
- 2.240 Name - Type:
- 2.241 Not Available
- 2.242 Name:
- 2.243 Accuracy:
- 2.244 Port-Protocol-State:
- 2.245 Type
- 2.246 Vendor
- 2.247 OS Family
- 2.248 OS Generation
- 2.249 Accuracy
- 2.250 Difficulty:
- 2.251 Index:
- 2.252 Values:
- 2.253 Class:
- 2.254 Hosts viewer
- 2.255 Save Graphic
- 2.256 Hosts Viewer
- 2.257 Controls
- 2.258 Fisheye
- 2.259 Error saving snapshot
- 2.260 Method
- 2.261 Count
- 2.262 Reasons
- 2.263 TTL
- 2.264 RTT
- 2.265 IP
- 2.266 Traceroute on port <b>%s/%s</b> totalized <b>%d</b> known hops.
- 2.267 No traceroute information available.
- 2.268 Name
- 2.269 DB Line
- 2.270 Family
- 2.271 <b>*</b> TCP sequence <i>index</i> equal to %d and <i>difficulty</i> is \"%s\".
- 2.272 General
- 2.273 Traceroute
- 2.274 Ports (%s)
- 2.275 <unknown>
- 2.276 <none>
- 2.277 [%d] service: %s
- 2.278 <special field>
- 2.279 Extraports (%s)
- 2.280 Special fields
- 2.281 General information
- 2.282 Sequences
- 2.283 No sequence information.
- 2.284 No OS information.
- 2.285 Address:
- 2.286 Hostname:
- 2.287 %s (%s seconds).
- 2.288 Match
- 2.289 Class
- 2.290 Used ports:
- 2.291 Fingerprint
- 2.292 Values
- 2.293 TCP *
- 2.294 IP ID
- 2.295 TCP Timestamp
- 2.296 PDF
- 2.297 PNG
- 2.298 PostScript
- 2.299 SVG
- 2.300 Save Topology
- 2.301 No filename extension
- 2.302 The filename \"%s\" does not have an extension, and no specific file type was chosen.\nEnter a known extension or select the file type from the list.
- 2.303 Unknown filename extension
- 2.304 There is no file type known for the filename extension \"%s\".\nEnter a known extension or select the file type from the list.
- 2.305 Action
- 2.306 Info
- 2.307 done: Red
- 2.308 done: Yellow
- 2.309 done: Green
- 2.310 <b>Fisheye</b> on ring
- 2.311 with interest factor
- 2.312 and spread factor
- 2.313 Interpolation
- 2.314 Cartesian
- 2.315 Polar
- 2.316 Frames
- 2.317 Layout
- 2.318 Symmetric
- 2.319 Weighted
- 2.320 Ring gap
- 2.321 Lower ring gap
- 2.322 View
- 2.323 Zoom
- 2.324 Navigation
- 2.325 No node selected
- 2.326 Alert
- 2.327 Ping
- 2.328 Scripting
- 2.329 Target
- 2.330 Source
- 2.331 Other
- 2.332 Timing
- 2.333 Scan options
- 2.334 Targets (optional):
- 2.335 TCP scan:
- 2.336 None
- 2.337 Send probes with the ACK flag set. Ports will be marked \"filtered\" or \"unfiltered\". Use ACK scan to map out firewall rulesets.
- 2.338 ACK scan
- 2.339 Send probes with the FIN bit set. FIN scan can differentiate \"closed\" and \"open|filtered\" ports on some systems.
- 2.340 FIN scan
- 2.341 Send probes with the FIN and ACK bits set. Against some BSD-derived systems this can differentiate between \"closed\" and \"open|filtered\" ports.
- 2.342 Maimon scan
- 2.343 Send probes with no flags set (TCP flag header is 0). Null scan can differentiate \"closed\" and \"open|filtered\" ports on some systems.
- 2.344 Null scan
- 2.345 Send probes with the SYN flag set. This is the most popular scan and the most generally useful. It is known as a \"stealth\" scan because it avoids making a full TCP connection.
- 2.346 TCP SYN scan
- 2.347 Scan using the connect system call. This is like SYN scan but less stealthy because it makes a full TCP connection. It is the default when a user does not have raw packet privileges or is scanning IPv6 networks.
- 2.348 TCP connect scan
- 2.349 Same as ACK scan except that it exploits an implementation detail of certain systems to differentiate open ports from closed ones, rather than always printing \"unfiltered\" when a RST is returned.
- 2.350 Window scan
- 2.351 Send probes with the FIN, PSH, and URG flags set, lighting the packets up like a Christmas tree. Xmas tree scan can differentiate \"closed\" and \"open|filtered\" ports on some systems.
- 2.352 Xmas Tree scan
- 2.353 Non-TCP scans:
- 2.354 Scan UDP ports. UDP is in general slower and more difficult to scan than TCP, and is often ignored by security auditors.
- 2.355 UDP scan
- 2.356 Scan IP protocols (TCP, ICMP, IGMP, etc.) to find which are supported by target machines.
- 2.357 IP protocol scan
- 2.358 Do not scan any targets, just list which ones would be scanned (with reverse DNS names if available).
- 2.359 List scan
- 2.360 Skip the port scanning phase. Other phases (host discovery, script scan, traceroute) may still run.
- 2.361 No port scan
- 2.362 SCTP is a layer 4 protocol used mostly for telephony related applications. This is the SCTP equivalent of a TCP SYN stealth scan.
- 2.363 SCTP INIT port scan
- 2.364 SCTP is a layer 4 protocol used mostly for telephony related applications.
- 2.365 SCTP cookie-echo port scan
- 2.366 Timing template:
- 2.367 Set the timing template for IDS evasion.
- 2.368 Paranoid
- 2.369 Sneaky
- 2.370 Set the timing template to slow down the scan to use less bandwidth and target machine resources.
- 2.371 Polite
- 2.372 Set the timing template to not modify the default Nmap value.
- 2.373 Normal
- 2.374 Set the timing template for faster scan. Used when on a reasonably fast and reliable network.
- 2.375 Aggressive
- 2.376 Set the timing template for the fastest scan. Used when on a fast network or when willing to sacrifice accuracy for speed.
- 2.377 Insane
- 2.378 Enable OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute).
- 2.379 Enable all advanced/aggressive options
- 2.380 Attempt to discover the operating system running on remote systems.
- 2.381 Operating system detection
- 2.382 Attempt to discover the version number of services running on remote ports.
- 2.383 Version detection
- 2.384 Scan by spoofing packets from a zombie computer so that the targets receive no packets from your IP address. The zombie must meet certain conditions which Nmap will check before scanning.
- 2.385 Idle Scan (Zombie)
- 2.386 Use an FTP server to port scan other hosts by sending a file to each interesting port of a target host.
- 2.387 FTP bounce attack
- 2.388 Never do reverse DNS. This can slash scanning times.
- 2.389 Disable reverse DNS resolution
- 2.390 Enable IPv6 scanning.
- 2.391 IPv6 support
- 2.392 Ping options
- 2.393 Don't check if targets are up before scanning them. Scan every target listed.
- 2.394 Don't ping before scanning
- 2.395 Send an ICMP echo request (ping) probe to see if targets are up.
- 2.396 ICMP ping
- 2.397 Send an ICMP timestamp probe to see if targets are up.
- 2.398 ICMP timestamp request
- 2.399 Send an ICMP address mask request probe to see if targets are up.
- 2.400 ICMP netmask request
- 2.401 Send one or more ACK probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port.
- 2.402 ACK ping
- 2.403 Send one or more SYN probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port.
- 2.404 SYN ping
- 2.405 Send one or more UDP probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port.
- 2.406 UDP probes
- 2.407 Send one or more raw IP protocol probes to see if targets are up. Give a list of protocols or leave the argument blank to use a default list
- 2.408 IPProto probes
- 2.409 Send SCTP INIT chunk packets to see if targets are up. Give a list of ports or leave the argument blank to use a default port.
- 2.410 SCTP INIT ping probes
- 2.411 Scripting options (NSE)
- 2.412 Use the Nmap Scripting Engine to gain more information about targets after scanning them.
- 2.413 Script scan
- 2.414 Run the given scripts. Give script names, directory names, or category names. Categories are \"safe\", \"intrusive\", \"malware\", \"discovery\", \"vuln\", \"auth\", \"external\", \"default\", and \"all\". If blank, scripts in the \"default\" category are run.
- 2.415 Scripts to run
- 2.416 Give arguments to certain scripts that use them. Arguments are <name>=<value> pairs, separated by commas. Values may be Lua tables.
- 2.417 Script arguments
- 2.418 Show all information sent and received by the scripting engine.
- 2.419 Trace script execution
- 2.420 Target options
- 2.421 Specifies a comma-separated list of targets to exclude from the scan.
- 2.422 Excluded hosts/networks
- 2.423 Specifies a newline-, space-, or tab-delimited file of targets to exclude from the scan.
- 2.424 Exclusion file
- 2.425 Reads target list specification from an input file.
- 2.426 Target list file
- 2.427 Option to choose targets at random. Tells Nmap how many IPs to generate. 0 is used for a never-ending scan.
- 2.428 Scan random hosts
- 2.429 This option specifies which ports you want to scan and overrides the default.
- 2.430 Ports to scan
- 2.431 Only scan ports named in the nmap-services file which comes with Nmap (or nmap-protocols file for -sO).
- 2.432 Fast scan
- 2.433 Source options
- 2.434 Send fake decoy probes from spoofed addresses to hide your own address. Give a list of addresses separated by commas. Use RND for a random address and ME to set the position of your address.
- 2.435 Use decoys to hide identity
- 2.436 Specify the IP address of the interface you wish to send packets through.
- 2.437 Set source IP address
- 2.438 Provide a port number and Nmap will send packets from that port where possible.
- 2.439 Set source port
- 2.440 Tells Nmap what interface to send and receive packets on.
- 2.441 Set network interface
- 2.442 Other options
- 2.443 Any extra options to add to the command line.
- 2.444 Extra options defined by user
- 2.445 Set the IPv4 time-to-live field in sent packets to the given value.
- 2.446 Set IPv4 time to live (ttl)
- 2.447 Causes the requested scan (including ping scans) to split up TCP headers over several packets.
- 2.448 Fragment IP packets
- 2.449 Print more information about the scan in progress. Open ports are shown as they are found as well as completion time estimates.
- 2.450 Verbosity level
- 2.451 When even verbose mode doesn't provide sufficient data for you, debugging level is available to show more detailed output.
- 2.452 Debugging level
- 2.453 Print a summary of every packet sent or received.
- 2.454 Packet trace
- 2.455 Scan ports in order instead of randomizing them.
- 2.456 Disable randomizing scanned ports
- 2.457 Trace the network path to each target after scanning. This works with all scan types except connect scan (-sT) and idle scan (-sI).
- 2.458 Trace routes to targets
- 2.459 Try sending a probe to each port no more than this many times before giving up.
- 2.460 Max Retries
- 2.461 Timing and performance
- 2.462 Give up on a host if it has not finished being scanning in this long. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.
- 2.463 Max time to scan a target
- 2.464 Wait no longer than this for a probe response before giving up or retransmitting the probe. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.
- 2.465 Max probe timeout
- 2.466 Wait at least this long for a probe response before giving up or retransmitting the probe. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.
- 2.467 Min probe timeout
- 2.468 Use the time given as the initial estimate of round-trip time. This can speed up scans if you know a good time for the network you're scanning.
- 2.469 Initial probe timeout
- 2.470 Scan no more than this many hosts in parallel.
- 2.471 Max hosts in parallel
- 2.472 Scan at least this many hosts in parallel.
- 2.473 Min hosts in parallel
- 2.474 Never allow more than the given number of probes to be outstanding at a time. May be set to 1 to prevent Nmap from sending more than one probe at a time to hosts.
- 2.475 Max outstanding probes
- 2.476 Try to maintain at least the given number of probes outstanding during a scan. Common usage is to set to a number higher than 1 to speed up scans of poorly performing hosts or networks.
- 2.477 Min outstanding probes
- 2.478 Do not allow the scan delay (time delay between successive probes) to grow larger than the given amount of time. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.
- 2.479 Max scan delay
- 2.480 Wait at least the given amount of time between each probe sent to a given host. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.
Translators
Sign your name here.
Miguel Baez Dylan Socolobsky Paulino Calderon
Strings
done: Unknown Host
Ordenador Desconocido
done: unknown
Desconocido
done: Unknown version
Version Desconocida
done: Unknown
Desconocido
- zenmapCore/NmapParser.py:427
- zenmapGUI/ScanOpenPortsPage.py:445
- zenmapGUI/ScanOpenPortsPage.py:459
- zenmapGUI/SearchGUI.py:534
done: %s on %s
%s en %s
done: No module named dbapi2.pysqlite2 or sqlite3
No existe el modulo dbapi2.pysqlite2 o sqlite3
done: Use DIR as the user configuration directory. Default: %default
Usar DIR como el directorio para configuracion del usuario. Original: %default
done: Specify a scan result file in Nmap XML output format. Can be used more than once to specify several scan result files.
Especifica el archivo donde se ha guardado el resultado de tu escaneo en formato XML. Puede ser usado mas de una vez para incluir mas de un archivo.
done: Run %s with the specified args.
Ejecutar %s con los argumentos especificados.
done: Begin with the specified profile selected. If combined with the -t (--target) option, automatically run the profile against the specified target.
Comenzar con el perfil especificado seleccionado. Si se combina con la opción -t (--target), se ejecuta automáticamente el perfil contra el objetivo especificado.
done: Specify a target to be used along with other options. If specified alone, open with the target field filled with the specified target
Especificar un objetivo para ser utilizado con otras opciones. Si se especifica por si solo, abrir con el campo de objetivo relleno con el objetivo especificado
done: Increase verbosity of the output. May be used more than once to get even more verbosity
Aumentar la verbosidad de la salida. Se puede utilizar mas de una vez para obtener aun mas verbosidad
done: Python 2.4 or later is required.
Python 2.4 o mas reciente es requerido.
done: There was an error getting the list of scripts from Nmap. Try upgrading Nmap.
Se produjo un error al recibir la lista de scripts de Nmap. Intente actualizar Nmap
done: List of scripts\n\nA list of all installed scripts. Activate or deactivate a script by clicking the box next to the script name.
Lista de todos los scripts instalados. Active o desactive un script haciendo click en el checkbox junto al nombre del script.
done: Description\n\nThis box shows the categories a script belongs to. In addition, it gives a detailed description of the script which is present in script. A URL points to online NSEDoc documentation.
Descripción\n\nEste campo muestra las categorías a las que pertenece un script. Además, este provee una descripción detallada del script que está presente en el script. La URL apunta a la documentación NSEDoc que está online.
done: Arguments\n\nA list of arguments that affect the selected script. Enter a value by clicking in the value field beside the argument name.
Argumentos\n\nUna lista de argumentos que afectan al script seleccionado. Ingrese un valor haciendo click en el campo del valor junto al nombre del argumento.
Please wait.
untranslated
Names
untranslated
Arguments
untranslated
Select script files
untranslated
Host Filter:
untranslated
untranslated
Hosts
untranslated
Services
untranslated
OS
untranslated
Host
untranslated
done: Service
Servicio
- zenmapGUI/ScanHostsView.py:189
- zenmapGUI/ScanOpenPortsPage.py:235
- zenmapGUI/ScanOpenPortsPage.py:258
- radialnet/gui/NodeNotebook.py:133
done: Scan Output
Resultado del escaneo
done: Select Scan Result
Seleccione el resultado del escaneo
Error parsing file
untranslated
The file is not an Nmap XML output file. The parsing error that occurred was\n%s
untranslated
done: Cannot open selected file
El archivo seleccionado no se puede abrir
done: This error occurred while trying to open the file:\n %s
Este error ha ocurrido al intentar abrir el archivo:\n
Compare Results
untranslated
done: A Scan
Escaneo A
done: B Scan
Escaneo B
done: Error running ndiff
Error al correr ndiff
done: There was an error running the ndiff program.\n\n
Se produjo un error al correr el programa ndiff
Error parsing ndiff output
untranslated
done: The ndiff process terminated with status code %d.
El proceso ndiff ha terminado con un codigo de status %d
Command:
untranslated
done: Scan
Escanear
- zenmapGUI/ScanToolbar.py:173
- zenmapGUI/SearchGUI.py:341
- zenmapGUI/ProfileEditor.py:235
- share/zenmap/misc/profile_editor.xml:8
done: Cancel
Cancelar
done: Target:
Objetivo
done: Profile:
Perfil
Sc_an
untranslated
_Save Scan
untranslated
done: Save current scan results
Guardar los resultados actuales
Save All Scans to _Directory
untranslated
done: Save all scans into a directory
Guardar todos los escaneos en un directorio
_Open Scan
untranslated
Open the results of a previous scan
untranslated
_Open Scan in This Window
untranslated
Append a saved scan to the list of scans in this window.
untranslated
_Tools
untranslated
_New Window
untranslated
Open a new scan window
untranslated
Close Window
untranslated
Close this scan window
untranslated
Print...
untranslated
Print the current scan
untranslated
done: Quit
Salir
done: Quit the application
Salir de la aplicacion
New _Profile or Command
untranslated
Create a new scan profile using the current command
untranslated
Search Scan Results
untranslated
Search for a scan result
untranslated
Filter Hosts
untranslated
Search for host by criteria
untranslated
_Edit Selected Profile
untranslated
Edit selected scan profile
untranslated
_Profile
untranslated
Compare Scan Results using Diffies
untranslated
_Help
untranslated
_Report a bug
untranslated
Report a bug
untranslated
_About
untranslated
About %s
untranslated
Shows the application help
untranslated
Can't save to database
untranslated
Can't store unsaved scans to the recent scans database:\n%s
untranslated
done: Error loading file
Error cargando el archivo
done: Nothing to save
No hay nada que guardar
done: There are no scans with results to be saved. Run a scan with the \"Scan\" button first.
No hay escaneos con resultados para ser guardados. Corra un escaneo con el boton \"Escanear\" primero
There is a scan still running. Wait until it finishes and then save.
untranslated
There are %u scans still running. Wait until they finish and then save.
untranslated
Scan is running
untranslated
Save Scan
untranslated
This scan has not been run yet. Start the scan with the \"Scan\" button first.
untranslated
Choose a directory to save scans into
untranslated
Can't save file
untranslated
Can't open file to write.\n%s
untranslated
Close anyway
untranslated
Unsaved changes
untranslated
The given scan has unsaved changes.\nWhat do you want to do?
untranslated
Trying to close
untranslated
The window you are trying to close has a scan running in the background.\nWhat do you want to do?
untranslated
Can't find documentation files
untranslated
There was an error loading the documentation file %s (%s). See the online documentation at %s.
untranslated
Empty Nmap Command
untranslated
There is no command to execute. Maybe the selected/typed profile doesn't exist. Please check the profile name or type the nmap command you would like to execute.
untranslated
This means that the nmap executable was not found in your system PATH, which is
untranslated
<undefined>
untranslated
plus the extra directory
untranslated
plus the extra directories
untranslated
Error executing command
untranslated
Parse error
untranslated
There was an error while parsing the XML file generated from the scan:\n\n%s
untranslated
Cannot merge scan
untranslated
There was an error while merging the new scan's XML:\n\n%s
untranslated
%d/%d hosts shown
untranslated
Nmap Output
untranslated
Ports / Hosts
untranslated
Topology
untranslated
Host Details
untranslated
Scans
untranslated
No host selected.
untranslated
Port
untranslated
- zenmapGUI/ScanOpenPortsPage.py:232
- zenmapGUI/ScanOpenPortsPage.py:262
- radialnet/gui/NodeNotebook.py:133
Protocol
untranslated
- zenmapGUI/ScanOpenPortsPage.py:233
- zenmapGUI/ScanOpenPortsPage.py:261
- radialnet/gui/NodeNotebook.py:133
State
untranslated
- zenmapGUI/ScanOpenPortsPage.py:234
- zenmapGUI/ScanOpenPortsPage.py:263
- radialnet/gui/NodeNotebook.py:133
- radialnet/gui/NodeNotebook.py:134
Version
untranslated
- zenmapGUI/ScanOpenPortsPage.py:236
- zenmapGUI/ScanOpenPortsPage.py:264
- radialnet/gui/NodeNotebook.py:157
Hostname
untranslated
How to Report a Bug
untranslated
<big><b>How to report a bug</b></big>\n\nLike their author, %(nmap)s and %(app)s aren't perfect. But you can help make it better by sending bug reports or even writing patches. If %(nmap)s doesn't behave the way you expect, first upgrade to the latest version available from <b>%(nmap_web)s</b>. If the problem persists, do some research to determine whether it has already been discovered and addressed. Try Googling the error message or browsing the nmap-dev archives at http://seclists.org/. Read the full manual page as well. If nothing comes of this, mail a bug report to <b><dev@nmap.org></b>. Please include everything you have learned about the problem, as well as what version of Nmap you are running and what operating system version it is running on. Problem reports and %(nmap)s usage questions sent to dev@nmap.org are far more likely to be answered than those sent to Fyodor directly.\n\nCode patches to fix bugs are even better than bug reports. Basic instructions for creating patch files with your changes are available at http://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) or to Fyodor directly.\n
untranslated
Search:
untranslated
Expressions
untranslated
Date
untranslated
No search method selected!
untranslated
%s can search results on directories or inside its own database. Please select a method by choosing a directory or by checking the search data base option in the 'Search options' tab before starting a search
untranslated
untranslated
Not available
untranslated
Nmap Version:
untranslated
Verbosity level:
untranslated
Debug level:
untranslated
Command Info
untranslated
Started on:
untranslated
Finished on:
untranslated
Hosts up:
untranslated
Hosts down:
untranslated
Hosts scanned:
untranslated
Open ports:
untranslated
done: Filtered ports:
Puertos filtrados
done: Closed ports:
Puertos cerrados
done: General Info
Informacion General
Scan Info
untranslated
Scan type:
untranslated
done: Protocol:
Protocolo
done: # scanned ports:
# puertos escaneados
Services:
untranslated
Crash Report
untranslated
An unexpected error has crashed %(app_name)s. Please copy the stack trace below and send it to the <a href=\"mailto:dev@nmap.org\">dev@nmap.org</a> mailing list. (<a href=\"http://seclists.org/nmap-dev/\">More about the list.</a>) The developers will see your report and try to fix the problem.
untranslated
<b>Copy and email to <a href=\"mailto:dev@nmap.org\">dev@nmap.org</a>:</b>
untranslated
done: Details
Detalles
Nmap Output Properties
untranslated
done: details
Detalles
port listing title
untranslated
open port
untranslated
closed port
untranslated
filtered port
untranslated
date
untranslated
hostname
untranslated
ip
untranslated
Highlight definitions
untranslated
Text
untranslated
Highlight
untranslated
text color
untranslated
highlight color
untranslated
About %s and %s
untranslated
%s is a free and open source utility for network exploration and security auditing.
untranslated
%s is a multi-platform graphical %s frontend and results viewer. It was originally derived from %s.
untranslated
%s is an %s GUI created as part of the Nmap/Google Summer of Code program.
untranslated
%s credits
untranslated
Written by
untranslated
Design
untranslated
SoC 2007
untranslated
Contributors
untranslated
Translation
untranslated
Maemo
untranslated
Running
untranslated
Unsaved
untranslated
Failed
untranslated
Canceled
untranslated
Status
untranslated
Command
untranslated
Append Scan
untranslated
Remove Scan
untranslated
Cancel Scan
untranslated
Show the topology anyway
untranslated
Topology is disabled because too many hosts can cause it\nto run slowly. The limit is %d hosts and there are %d.
untranslated
All files (%s)
untranslated
Nmap XML files (%s)
untranslated
NSE scripts (%s)
untranslated
By extension
untranslated
Nmap XML format (.xml)
untranslated
Nmap text format (.nmap)
untranslated
Select File Type:
untranslated
Choose file
untranslated
Profile Editor
untranslated
Profile Information
untranslated
Profile name
untranslated
Description
untranslated
Save Changes
untranslated
Help
untranslated
Profile
untranslated
Unnamed profile
untranslated
You must provide a name for this profile.
untranslated
Disallowed profile name
untranslated
Sorry, the name \"%s\" is not allowed due to technical limitations. (The underlying ConfigParser used to store profiles does not allow it.) Choose a different name.
untranslated
Deleting Profile
untranslated
Your profile is going to be deleted! ClickOk to continue, or Cancel to go back to Profile Editor.
untranslated
Search Scans
untranslated
Append
untranslated
Import error
untranslated
A required module was not found.\n\n
untranslated
Error creating the per-user configuration directory
untranslated
There was an error creating the directory %s or one of the files in it. The directory is created by copying the contents of %s. The specific error was\n\n%s\n\n%s needs to create this directory to store information such as the list of scan profiles. Check for access to the directory and try again.
untranslated
Error parsing the configuration file
untranslated
There was an error parsing the configuration file %s. The specific error was\n\n%s\n\n%s can continue without this file but any information in it will be ignored until it is repaired.
untranslated
You are trying to run %s with a non-root user!\n\nSome %s options need root privileges to work.
untranslated
Non-root user
untranslated
Host Status
untranslated
Addresses
untranslated
Hostnames
untranslated
Operating System
untranslated
Ports used
untranslated
OS Classes
untranslated
TCP Sequence
untranslated
IP ID Sequence
untranslated
TCP TS Sequence
untranslated
Comments
untranslated
State:
untranslated
Scanned ports:
untranslated
Up time:
untranslated
Last boot:
untranslated
IPv4:
untranslated
IPv6:
untranslated
MAC:
untranslated
Vendor:
untranslated
Name - Type:
untranslated
Not Available
untranslated
Name:
untranslated
Accuracy:
untranslated
Port-Protocol-State:
untranslated
Type
untranslated
Vendor
untranslated
OS Family
untranslated
OS Generation
untranslated
Accuracy
untranslated
Difficulty:
untranslated
Index:
untranslated
Values:
untranslated
- zenmapGUI/ScanHostDetailsPage.py:463
- zenmapGUI/ScanHostDetailsPage.py:482
- zenmapGUI/ScanHostDetailsPage.py:501
Class:
untranslated
Hosts viewer
untranslated
Save Graphic
untranslated
Hosts Viewer
untranslated
Controls
untranslated
Fisheye
untranslated
Error saving snapshot
untranslated
Method
untranslated
Count
untranslated
Reasons
untranslated
TTL
untranslated
RTT
untranslated
IP
untranslated
Traceroute on port <b>%s/%s</b> totalized <b>%d</b> known hops.
untranslated
No traceroute information available.
untranslated
Name
untranslated
DB Line
untranslated
Family
untranslated
<b>*</b> TCP sequence <i>index</i> equal to %d and <i>difficulty</i> is \"%s\".
untranslated
General
untranslated
Traceroute
untranslated
Ports (%s)
untranslated
<unknown>
untranslated
<none>
untranslated
[%d] service: %s
untranslated
<special field>
untranslated
Extraports (%s)
untranslated
Special fields
untranslated
General information
untranslated
Sequences
untranslated
No sequence information.
untranslated
No OS information.
untranslated
Address:
untranslated
Hostname:
untranslated
%s (%s seconds).
untranslated
Match
untranslated
Class
untranslated
Used ports:
untranslated
Fingerprint
untranslated
Values
untranslated
TCP *
untranslated
IP ID
untranslated
TCP Timestamp
untranslated
untranslated
PNG
untranslated
PostScript
untranslated
SVG
untranslated
Save Topology
untranslated
No filename extension
untranslated
The filename \"%s\" does not have an extension, and no specific file type was chosen.\nEnter a known extension or select the file type from the list.
untranslated
Unknown filename extension
untranslated
There is no file type known for the filename extension \"%s\".\nEnter a known extension or select the file type from the list.
untranslated
Action
untranslated
Info
untranslated
done: Red
Rojo
done: Yellow
Amarillo
done: Green
Verde
<b>Fisheye</b> on ring
untranslated
with interest factor
untranslated
and spread factor
untranslated
Interpolation
untranslated
Cartesian
untranslated
Polar
untranslated
Frames
untranslated
Layout
untranslated
Symmetric
untranslated
Weighted
untranslated
Ring gap
untranslated
Lower ring gap
untranslated
View
untranslated
Zoom
untranslated
untranslated
No node selected
untranslated
Alert
untranslated
Ping
untranslated
Scripting
untranslated
Target
untranslated
Source
untranslated
Other
untranslated
Timing
untranslated
Scan options
untranslated
Targets (optional):
untranslated
TCP scan:
untranslated
None
untranslated
- share/zenmap/misc/profile_editor.xml:19
- share/zenmap/misc/profile_editor.xml:30
- share/zenmap/misc/profile_editor.xml:40
Send probes with the ACK flag set. Ports will be marked \"filtered\" or \"unfiltered\". Use ACK scan to map out firewall rulesets.
untranslated
ACK scan
untranslated
Send probes with the FIN bit set. FIN scan can differentiate \"closed\" and \"open|filtered\" ports on some systems.
untranslated
FIN scan
untranslated
Send probes with the FIN and ACK bits set. Against some BSD-derived systems this can differentiate between \"closed\" and \"open|filtered\" ports.
untranslated
Maimon scan
untranslated
Send probes with no flags set (TCP flag header is 0). Null scan can differentiate \"closed\" and \"open|filtered\" ports on some systems.
untranslated
Null scan
untranslated
Send probes with the SYN flag set. This is the most popular scan and the most generally useful. It is known as a \"stealth\" scan because it avoids making a full TCP connection.
untranslated
TCP SYN scan
untranslated
Scan using the connect system call. This is like SYN scan but less stealthy because it makes a full TCP connection. It is the default when a user does not have raw packet privileges or is scanning IPv6 networks.
untranslated
TCP connect scan
untranslated
Same as ACK scan except that it exploits an implementation detail of certain systems to differentiate open ports from closed ones, rather than always printing \"unfiltered\" when a RST is returned.
untranslated
Window scan
untranslated
Send probes with the FIN, PSH, and URG flags set, lighting the packets up like a Christmas tree. Xmas tree scan can differentiate \"closed\" and \"open|filtered\" ports on some systems.
untranslated
Xmas Tree scan
untranslated
Non-TCP scans:
untranslated
Scan UDP ports. UDP is in general slower and more difficult to scan than TCP, and is often ignored by security auditors.
untranslated
UDP scan
untranslated
Scan IP protocols (TCP, ICMP, IGMP, etc.) to find which are supported by target machines.
untranslated
IP protocol scan
untranslated
Do not scan any targets, just list which ones would be scanned (with reverse DNS names if available).
untranslated
List scan
untranslated
Skip the port scanning phase. Other phases (host discovery, script scan, traceroute) may still run.
untranslated
No port scan
untranslated
untranslated
SCTP INIT port scan
untranslated
untranslated
SCTP cookie-echo port scan
untranslated
Timing template:
untranslated
Set the timing template for IDS evasion.
untranslated
Paranoid
untranslated
Sneaky
untranslated
Set the timing template to slow down the scan to use less bandwidth and target machine resources.
untranslated
Polite
untranslated
Set the timing template to not modify the default Nmap value.
untranslated
Normal
untranslated
Set the timing template for faster scan. Used when on a reasonably fast and reliable network.
untranslated
Aggressive
untranslated
Set the timing template for the fastest scan. Used when on a fast network or when willing to sacrifice accuracy for speed.
untranslated
Insane
untranslated
Enable OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute).
untranslated
Enable all advanced/aggressive options
untranslated
Attempt to discover the operating system running on remote systems.
untranslated
Operating system detection
untranslated
Attempt to discover the version number of services running on remote ports.
untranslated
Version detection
untranslated
Scan by spoofing packets from a zombie computer so that the targets receive no packets from your IP address. The zombie must meet certain conditions which Nmap will check before scanning.
untranslated
Idle Scan (Zombie)
untranslated
Use an FTP server to port scan other hosts by sending a file to each interesting port of a target host.
untranslated
FTP bounce attack
untranslated
Never do reverse DNS. This can slash scanning times.
untranslated
Disable reverse DNS resolution
untranslated
Enable IPv6 scanning.
untranslated
IPv6 support
untranslated
Ping options
untranslated
Don't check if targets are up before scanning them. Scan every target listed.
untranslated
Don't ping before scanning
untranslated
Send an ICMP echo request (ping) probe to see if targets are up.
untranslated
ICMP ping
untranslated
Send an ICMP timestamp probe to see if targets are up.
untranslated
ICMP timestamp request
untranslated
Send an ICMP address mask request probe to see if targets are up.
untranslated
ICMP netmask request
untranslated
Send one or more ACK probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port.
untranslated
ACK ping
untranslated
Send one or more SYN probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port.
untranslated
SYN ping
untranslated
Send one or more UDP probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port.
untranslated
UDP probes
untranslated
Send one or more raw IP protocol probes to see if targets are up. Give a list of protocols or leave the argument blank to use a default list
untranslated
IPProto probes
untranslated
Send SCTP INIT chunk packets to see if targets are up. Give a list of ports or leave the argument blank to use a default port.
untranslated
SCTP INIT ping probes
untranslated
Scripting options (NSE)
untranslated
Use the Nmap Scripting Engine to gain more information about targets after scanning them.
untranslated
Script scan
untranslated
Run the given scripts. Give script names, directory names, or category names. Categories are \"safe\", \"intrusive\", \"malware\", \"discovery\", \"vuln\", \"auth\", \"external\", \"default\", and \"all\". If blank, scripts in the \"default\" category are run.
untranslated
Scripts to run
untranslated
Give arguments to certain scripts that use them. Arguments are <name>=<value> pairs, separated by commas. Values may be Lua tables.
untranslated
Script arguments
untranslated
Show all information sent and received by the scripting engine.
untranslated
Trace script execution
untranslated
Target options
untranslated
Specifies a comma-separated list of targets to exclude from the scan.
untranslated
Excluded hosts/networks
untranslated
Specifies a newline-, space-, or tab-delimited file of targets to exclude from the scan.
untranslated
Exclusion file
untranslated
Reads target list specification from an input file.
untranslated
Target list file
untranslated
Option to choose targets at random. Tells Nmap how many IPs to generate. 0 is used for a never-ending scan.
untranslated
Scan random hosts
untranslated
This option specifies which ports you want to scan and overrides the default.
untranslated
Ports to scan
untranslated
Only scan ports named in the nmap-services file which comes with Nmap (or nmap-protocols file for -sO).
untranslated
Fast scan
untranslated
Source options
untranslated
Send fake decoy probes from spoofed addresses to hide your own address. Give a list of addresses separated by commas. Use RND for a random address and ME to set the position of your address.
untranslated
Use decoys to hide identity
untranslated
Specify the IP address of the interface you wish to send packets through.
untranslated
Set source IP address
untranslated
Provide a port number and Nmap will send packets from that port where possible.
untranslated
Set source port
untranslated
Tells Nmap what interface to send and receive packets on.
untranslated
Set network interface
untranslated
Other options
untranslated
Any extra options to add to the command line.
untranslated
Extra options defined by user
untranslated
Set the IPv4 time-to-live field in sent packets to the given value.
untranslated
Set IPv4 time to live (ttl)
untranslated
Causes the requested scan (including ping scans) to split up TCP headers over several packets.
untranslated
Fragment IP packets
untranslated
Print more information about the scan in progress. Open ports are shown as they are found as well as completion time estimates.
untranslated
Verbosity level
untranslated
When even verbose mode doesn't provide sufficient data for you, debugging level is available to show more detailed output.
untranslated
Debugging level
untranslated
Print a summary of every packet sent or received.
untranslated
Packet trace
untranslated
Scan ports in order instead of randomizing them.
untranslated
Disable randomizing scanned ports
untranslated
Trace the network path to each target after scanning. This works with all scan types except connect scan (-sT) and idle scan (-sI).
untranslated
Trace routes to targets
untranslated
Try sending a probe to each port no more than this many times before giving up.
untranslated
Max Retries
untranslated
Timing and performance
untranslated
Give up on a host if it has not finished being scanning in this long. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.
untranslated
Max time to scan a target
untranslated
Wait no longer than this for a probe response before giving up or retransmitting the probe. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.
untranslated
Max probe timeout
untranslated
Wait at least this long for a probe response before giving up or retransmitting the probe. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.
untranslated
Min probe timeout
untranslated
Use the time given as the initial estimate of round-trip time. This can speed up scans if you know a good time for the network you're scanning.
untranslated
Initial probe timeout
untranslated
Scan no more than this many hosts in parallel.
untranslated
Max hosts in parallel
untranslated
Scan at least this many hosts in parallel.
untranslated
Min hosts in parallel
untranslated
Never allow more than the given number of probes to be outstanding at a time. May be set to 1 to prevent Nmap from sending more than one probe at a time to hosts.
untranslated
Max outstanding probes
untranslated
Try to maintain at least the given number of probes outstanding during a scan. Common usage is to set to a number higher than 1 to speed up scans of poorly performing hosts or networks.
untranslated
Min outstanding probes
untranslated
Do not allow the scan delay (time delay between successive probes) to grow larger than the given amount of time. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.
untranslated
Max scan delay
untranslated
Wait at least the given amount of time between each probe sent to a given host. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.
untranslated