Zenmap Translation - es

From SecWiki
Jump to: navigation, search

Spanish-language translation of Zenmap. Work-in-progress.

POT-Creation-Date: 2014-10-23 15:14+0000

Contents

Translators

Sign your name here.

Miguel Baez Dylan Socolobsky Paulino Calderon

Strings

done: Unknown Host

Ordenador Desconocido

done: unknown

Desconocido

done: Unknown version

Version Desconocida

done: Unknown

Desconocido

done: %s on %s

%s en %s

done: No module named dbapi2.pysqlite2 or sqlite3

No existe el modulo dbapi2.pysqlite2 o sqlite3

done: Use DIR as the user configuration directory. Default: %default

Usar DIR como el directorio para configuracion del usuario. Original: %default

done: Specify a scan result file in Nmap XML output format. Can be used more than once to specify several scan result files.

Especifica el archivo donde se ha guardado el resultado de tu escaneo en formato XML. Puede ser usado mas de una vez para incluir mas de un archivo.

done: Run %s with the specified args.

Ejecutar %s con los argumentos especificados.

done: Begin with the specified profile selected. If combined with the -t (--target) option, automatically run the profile against the specified target.

Comenzar con el perfil especificado seleccionado. Si se combina con la opción -t (--target), se ejecuta automáticamente el perfil contra el objetivo especificado.

done: Specify a target to be used along with other options. If specified alone, open with the target field filled with the specified target

Especificar un objetivo para ser utilizado con otras opciones. Si se especifica por si solo, abrir con el campo de objetivo relleno con el objetivo especificado

done: Increase verbosity of the output. May be used more than once to get even more verbosity

Aumentar la verbosidad de la salida. Se puede utilizar mas de una vez para obtener aun mas verbosidad

done: Python 2.4 or later is required.

Python 2.4 o mas reciente es requerido.

done: There was an error getting the list of scripts from Nmap. Try upgrading Nmap.

Se produjo un error al recibir la lista de scripts de Nmap. Intente actualizar Nmap

done: List of scripts\n\nA list of all installed scripts. Activate or deactivate a script by clicking the box next to the script name.

Lista de todos los scripts instalados. Active o desactive un script haciendo click en el checkbox junto al nombre del script.

done: Description\n\nThis box shows the categories a script belongs to. In addition, it gives a detailed description of the script which is present in script. A URL points to online NSEDoc documentation.

Descripción\n\nEste campo muestra las categorías a las que pertenece un script. Además, este provee una descripción detallada del script que está presente en el script. La URL apunta a la documentación NSEDoc que está online.

done: Arguments\n\nA list of arguments that affect the selected script. Enter a value by clicking in the value field beside the argument name.

Argumentos\n\nUna lista de argumentos que afectan al script seleccionado. Ingrese un valor haciendo click en el campo del valor junto al nombre del argumento.

Please wait.

untranslated

Names

untranslated

Arguments

untranslated

Select script files

untranslated

Host Filter:

untranslated

Entering the text into the search performs a <b>keyword search</b> - the search string is matched against every aspect of the host.\n\nTo refine the search, you can use <b>operators</b> to search only specific fields within a host. Most operators have a short form, listed. \n<b>target: (t:)</b> - User-supplied target, or a rDNS result.\n<b>os:</b> - All OS-related fields.\n<b>open: (op:)</b> - Open ports discovered in a scan.\n<b>closed: (cp:)</b> - Closed ports discovered in a scan.\n<b>filtered: (fp:)</b> - Filtered ports discovered in scan.\n<b>unfiltered: (ufp:)</b> - Unfiltered ports found in a scan (using, for example, an ACK scan).\n<b>open|filtered: (ofp:)</b> - Ports in the \"open|filtered\" state.\n<b>closed|filtered: (cfp:)</b> - Ports in the \"closed|filtered\" state.\n<b>service: (s:)</b> - All service-related fields.\n<b>inroute: (ir:)</b> - Matches a router in the scan's traceroute output.\n

untranslated

Hosts

untranslated

Services

untranslated

OS

untranslated

Host

untranslated

done: Service

Servicio

done: Scan Output

Resultado del escaneo

done: Select Scan Result

Seleccione el resultado del escaneo

Error parsing file

untranslated

The file is not an Nmap XML output file. The parsing error that occurred was\n%s

untranslated

done: Cannot open selected file

El archivo seleccionado no se puede abrir

done: This error occurred while trying to open the file:\n %s

Este error ha ocurrido al intentar abrir el archivo:\n

Compare Results

untranslated

done: A Scan

Escaneo A

done: B Scan

Escaneo B

done: Error running ndiff

Error al correr ndiff

done: There was an error running the ndiff program.\n\n

Se produjo un error al correr el programa ndiff

Error parsing ndiff output

untranslated

done: The ndiff process terminated with status code %d.

El proceso ndiff ha terminado con un codigo de status %d

Command:

untranslated

done: Scan

Escanear

done: Cancel

Cancelar

done: Target:

Objetivo

done: Profile:

Perfil

Sc_an

untranslated

_Save Scan

untranslated

done: Save current scan results

Guardar los resultados actuales

Save All Scans to _Directory

untranslated

done: Save all scans into a directory

Guardar todos los escaneos en un directorio

_Open Scan

untranslated

Open the results of a previous scan

untranslated

_Open Scan in This Window

untranslated

Append a saved scan to the list of scans in this window.

untranslated

_Tools

untranslated

_New Window

untranslated

Open a new scan window

untranslated

Close Window

untranslated

Close this scan window

untranslated

Print...

untranslated

Print the current scan

untranslated

done: Quit

Salir

done: Quit the application

Salir de la aplicacion

New _Profile or Command

untranslated

Create a new scan profile using the current command

untranslated

Search Scan Results

untranslated

Search for a scan result

untranslated

Filter Hosts

untranslated

Search for host by criteria

untranslated

_Edit Selected Profile

untranslated

Edit selected scan profile

untranslated

_Profile

untranslated

Compare Scan Results using Diffies

untranslated

_Help

untranslated

_Report a bug

untranslated

Report a bug

untranslated

_About

untranslated

About %s

untranslated

Shows the application help

untranslated

Can't save to database

untranslated

Can't store unsaved scans to the recent scans database:\n%s

untranslated

done: Error loading file

Error cargando el archivo

done: Nothing to save

No hay nada que guardar

done: There are no scans with results to be saved. Run a scan with the \"Scan\" button first.

No hay escaneos con resultados para ser guardados. Corra un escaneo con el boton \"Escanear\" primero

There is a scan still running. Wait until it finishes and then save.

untranslated

There are %u scans still running. Wait until they finish and then save.

untranslated

Scan is running

untranslated

Save Scan

untranslated

This scan has not been run yet. Start the scan with the \"Scan\" button first.

untranslated

Choose a directory to save scans into

untranslated

Can't save file

untranslated

Can't open file to write.\n%s

untranslated

Close anyway

untranslated

Unsaved changes

untranslated

The given scan has unsaved changes.\nWhat do you want to do?

untranslated

Trying to close

untranslated

The window you are trying to close has a scan running in the background.\nWhat do you want to do?

untranslated

Can't find documentation files

untranslated

There was an error loading the documentation file %s (%s). See the online documentation at %s.

untranslated

Empty Nmap Command

untranslated

There is no command to execute. Maybe the selected/typed profile doesn't exist. Please check the profile name or type the nmap command you would like to execute.

untranslated

This means that the nmap executable was not found in your system PATH, which is

untranslated

<undefined>

untranslated

plus the extra directory

untranslated

plus the extra directories

untranslated

Error executing command

untranslated

Parse error

untranslated

There was an error while parsing the XML file generated from the scan:\n\n%s

untranslated

Cannot merge scan

untranslated

There was an error while merging the new scan's XML:\n\n%s

untranslated

%d/%d hosts shown

untranslated

Nmap Output

untranslated

Ports / Hosts

untranslated

Topology

untranslated

Host Details

untranslated

Scans

untranslated

No host selected.

untranslated

Port

untranslated

Protocol

untranslated

State

untranslated

Version

untranslated

Hostname

untranslated

How to Report a Bug

untranslated

<big><b>How to report a bug</b></big>\n\nLike their author, %(nmap)s and %(app)s aren't perfect. But you can help make it better by sending bug reports or even writing patches. If %(nmap)s doesn't behave the way you expect, first upgrade to the latest version available from <b>%(nmap_web)s</b>. If the problem persists, do some research to determine whether it has already been discovered and addressed. Try Googling the error message or browsing the nmap-dev archives at http://seclists.org/. Read the full manual page as well. If nothing comes of this, mail a bug report to <b><dev@nmap.org></b>. Please include everything you have learned about the problem, as well as what version of Nmap you are running and what operating system version it is running on. Problem reports and %(nmap)s usage questions sent to dev@nmap.org are far more likely to be answered than those sent to Fyodor directly.\n\nCode patches to fix bugs are even better than bug reports. Basic instructions for creating patch files with your changes are available at http://nmap.org/data/HACKING. Patches may be sent to nmap-dev (recommended) or to Fyodor directly.\n

untranslated

Search:

untranslated

Expressions

untranslated

Date

untranslated

No search method selected!

untranslated

%s can search results on directories or inside its own database. Please select a method by choosing a directory or by checking the search data base option in the 'Search options' tab before starting a search

untranslated

Entering the text into the search performs a <b>keyword search</b> - the search string is matched against the entire output of each scan.\n\nTo refine the search, you can use <b>operators</b> to search only within a specific part of a scan. Operators can be added to the search interactively if you click on the <b>Expressions</b> button, or you can enter them manually into the search field. Most operators have a short form, listed.\n\n<b>profile: (pr:)</b> - Profile used.\n<b>target: (t:)</b> - User-supplied target, or a rDNS result.\n<b>option: (o:)</b> - Scan options.\n<b>date: (d:)</b> - The date when scan was performed. Fuzzy matching is possible using the \"~\" suffix. Each \"~\" broadens the search by one day on \"each side\" of the date. In addition, it is possible to use the \"date:-n\" notation which means \"n days ago\".\n<b>after: (a:)</b> - Matches scans made after the supplied date (<i>YYYY-MM-DD</i> or <i>-n</i>).\n<b>before (b:)</b> - Matches scans made before the supplied date(<i>YYYY-MM-DD</i> or <i>-n</i>).\n<b>os:</b> - All OS-related fields.\n<b>scanned: (sp:)</b> - Matches a port if it was among those scanned.\n<b>open: (op:)</b> - Open ports discovered in a scan.\n<b>closed: (cp:)</b> - Closed ports discovered in a scan.\n<b>filtered: (fp:)</b> - Filtered ports discovered in scan.\n<b>unfiltered: (ufp:)</b> - Unfiltered ports found in a scan (using, for example, an ACK scan).\n<b>open|filtered: (ofp:)</b> - Ports in the \"open|filtered\" state.\n<b>closed|filtered: (cfp:)</b> - Ports in the \"closed|filtered\" state.\n<b>service: (s:)</b> - All service-related fields.\n<b>inroute: (ir:)</b> - Matches a router in the scan's traceroute output.\n

untranslated

Not available

untranslated

Nmap Version:

untranslated

Verbosity level:

untranslated

Debug level:

untranslated

Command Info

untranslated

Started on:

untranslated

Finished on:

untranslated

Hosts up:

untranslated

Hosts down:

untranslated

Hosts scanned:

untranslated

Open ports:

untranslated

done: Filtered ports:

Puertos filtrados

done: Closed ports:

Puertos cerrados

done: General Info

Informacion General

Scan Info

untranslated

Scan type:

untranslated

done: Protocol:

Protocolo

done: # scanned ports:

# puertos escaneados

Services:

untranslated

Crash Report

untranslated

An unexpected error has crashed %(app_name)s. Please copy the stack trace below and send it to the <a href=\"mailto:dev@nmap.org\">dev@nmap.org</a> mailing list. (<a href=\"http://seclists.org/nmap-dev/\">More about the list.</a>) The developers will see your report and try to fix the problem.

untranslated

<b>Copy and email to <a href=\"mailto:dev@nmap.org\">dev@nmap.org</a>:</b>

untranslated

done: Details

Detalles

Nmap Output Properties

untranslated

done: details

Detalles

port listing title

untranslated

open port

untranslated

closed port

untranslated

filtered port

untranslated

date

untranslated

hostname

untranslated

ip

untranslated

Highlight definitions

untranslated

Text

untranslated

Highlight

untranslated

text color

untranslated

highlight color

untranslated

About %s and %s

untranslated

%s is a free and open source utility for network exploration and security auditing.

untranslated

%s is a multi-platform graphical %s frontend and results viewer. It was originally derived from %s.

untranslated

%s is an %s GUI created as part of the Nmap/Google Summer of Code program.

untranslated

%s credits

untranslated

Written by

untranslated

Design

untranslated

SoC 2007

untranslated

Contributors

untranslated

Translation

untranslated

Maemo

untranslated

Running

untranslated

Unsaved

untranslated

Failed

untranslated

Canceled

untranslated

Status

untranslated

Command

untranslated

Append Scan

untranslated

Remove Scan

untranslated

Cancel Scan

untranslated

Show the topology anyway

untranslated

Topology is disabled because too many hosts can cause it\nto run slowly. The limit is %d hosts and there are %d.

untranslated

All files (%s)

untranslated

Nmap XML files (%s)

untranslated

NSE scripts (%s)

untranslated

By extension

untranslated

Nmap XML format (.xml)

untranslated

Nmap text format (.nmap)

untranslated

Select File Type:

untranslated

Choose file

untranslated

Profile Editor

untranslated

Profile Information

untranslated

Profile name

untranslated

Description

untranslated

Save Changes

untranslated

Help

untranslated

Profile

untranslated

Unnamed profile

untranslated

You must provide a name for this profile.

untranslated

Disallowed profile name

untranslated

Sorry, the name \"%s\" is not allowed due to technical limitations. (The underlying ConfigParser used to store profiles does not allow it.) Choose a different name.

untranslated

Deleting Profile

untranslated

Your profile is going to be deleted! ClickOk to continue, or Cancel to go back to Profile Editor.

untranslated

Search Scans

untranslated

Append

untranslated

Import error

untranslated

A required module was not found.\n\n

untranslated

Error creating the per-user configuration directory

untranslated

There was an error creating the directory %s or one of the files in it. The directory is created by copying the contents of %s. The specific error was\n\n%s\n\n%s needs to create this directory to store information such as the list of scan profiles. Check for access to the directory and try again.

untranslated

Error parsing the configuration file

untranslated

There was an error parsing the configuration file %s. The specific error was\n\n%s\n\n%s can continue without this file but any information in it will be ignored until it is repaired.

untranslated

You are trying to run %s with a non-root user!\n\nSome %s options need root privileges to work.

untranslated

Non-root user

untranslated

Host Status

untranslated

Addresses

untranslated

Hostnames

untranslated

Operating System

untranslated

Ports used

untranslated

OS Classes

untranslated

TCP Sequence

untranslated

IP ID Sequence

untranslated

TCP TS Sequence

untranslated

Comments

untranslated

State:

untranslated

Scanned ports:

untranslated

Up time:

untranslated

Last boot:

untranslated

IPv4:

untranslated

IPv6:

untranslated

MAC:

untranslated

Vendor:

untranslated

Name - Type:

untranslated

Not Available

untranslated

Name:

untranslated

Accuracy:

untranslated

Port-Protocol-State:

untranslated

Type

untranslated

Vendor

untranslated

OS Family

untranslated

OS Generation

untranslated

Accuracy

untranslated

Difficulty:

untranslated

Index:

untranslated

Values:

untranslated

Class:

untranslated

Hosts viewer

untranslated

Save Graphic

untranslated

Hosts Viewer

untranslated

Controls

untranslated

Fisheye

untranslated

Error saving snapshot

untranslated

Method

untranslated

Count

untranslated

Reasons

untranslated

TTL

untranslated

RTT

untranslated

IP

untranslated

Traceroute on port <b>%s/%s</b> totalized <b>%d</b> known hops.

untranslated

No traceroute information available.

untranslated

Name

untranslated

DB Line

untranslated

Family

untranslated

<b>*</b> TCP sequence <i>index</i> equal to %d and <i>difficulty</i> is \"%s\".

untranslated

General

untranslated

Traceroute

untranslated

Ports (%s)

untranslated

<unknown>

untranslated

<none>

untranslated

[%d] service: %s

untranslated

<special field>

untranslated

Extraports (%s)

untranslated

Special fields

untranslated

General information

untranslated

Sequences

untranslated

No sequence information.

untranslated

No OS information.

untranslated

Address:

untranslated

Hostname:

untranslated

%s (%s seconds).

untranslated

Match

untranslated

Class

untranslated

Used ports:

untranslated

Fingerprint

untranslated

Values

untranslated

TCP *

untranslated

IP ID

untranslated

TCP Timestamp

untranslated

PDF

untranslated

PNG

untranslated

PostScript

untranslated

SVG

untranslated

Save Topology

untranslated

No filename extension

untranslated

The filename \"%s\" does not have an extension, and no specific file type was chosen.\nEnter a known extension or select the file type from the list.

untranslated

Unknown filename extension

untranslated

There is no file type known for the filename extension \"%s\".\nEnter a known extension or select the file type from the list.

untranslated

Action

untranslated

Info

untranslated

done: Red

Rojo

done: Yellow

Amarillo

done: Green

Verde

<b>Fisheye</b> on ring

untranslated

with interest factor

untranslated

and spread factor

untranslated

Interpolation

untranslated

Cartesian

untranslated

Polar

untranslated

Frames

untranslated

Layout

untranslated

Symmetric

untranslated

Weighted

untranslated

Ring gap

untranslated

Lower ring gap

untranslated

View

untranslated

Zoom

untranslated

Navigation

untranslated

No node selected

untranslated

Alert

untranslated

Ping

untranslated

Scripting

untranslated

Target

untranslated

Source

untranslated

Other

untranslated

Timing

untranslated

Scan options

untranslated

Targets (optional):

untranslated

TCP scan:

untranslated

None

untranslated

Send probes with the ACK flag set. Ports will be marked \"filtered\" or \"unfiltered\". Use ACK scan to map out firewall rulesets.

untranslated

ACK scan

untranslated

Send probes with the FIN bit set. FIN scan can differentiate \"closed\" and \"open|filtered\" ports on some systems.

untranslated

FIN scan

untranslated

Send probes with the FIN and ACK bits set. Against some BSD-derived systems this can differentiate between \"closed\" and \"open|filtered\" ports.

untranslated

Maimon scan

untranslated

Send probes with no flags set (TCP flag header is 0). Null scan can differentiate \"closed\" and \"open|filtered\" ports on some systems.

untranslated

Null scan

untranslated

Send probes with the SYN flag set. This is the most popular scan and the most generally useful. It is known as a \"stealth\" scan because it avoids making a full TCP connection.

untranslated

TCP SYN scan

untranslated

Scan using the connect system call. This is like SYN scan but less stealthy because it makes a full TCP connection. It is the default when a user does not have raw packet privileges or is scanning IPv6 networks.

untranslated

TCP connect scan

untranslated

Same as ACK scan except that it exploits an implementation detail of certain systems to differentiate open ports from closed ones, rather than always printing \"unfiltered\" when a RST is returned.

untranslated

Window scan

untranslated

Send probes with the FIN, PSH, and URG flags set, lighting the packets up like a Christmas tree. Xmas tree scan can differentiate \"closed\" and \"open|filtered\" ports on some systems.

untranslated

Xmas Tree scan

untranslated

Non-TCP scans:

untranslated

Scan UDP ports. UDP is in general slower and more difficult to scan than TCP, and is often ignored by security auditors.

untranslated

UDP scan

untranslated

Scan IP protocols (TCP, ICMP, IGMP, etc.) to find which are supported by target machines.

untranslated

IP protocol scan

untranslated

Do not scan any targets, just list which ones would be scanned (with reverse DNS names if available).

untranslated

List scan

untranslated

Skip the port scanning phase. Other phases (host discovery, script scan, traceroute) may still run.

untranslated

No port scan

untranslated

SCTP is a layer 4 protocol used mostly for telephony related applications. This is the SCTP equivalent of a TCP SYN stealth scan.

untranslated

SCTP INIT port scan

untranslated

SCTP is a layer 4 protocol used mostly for telephony related applications.

untranslated

SCTP cookie-echo port scan

untranslated

Timing template:

untranslated

Set the timing template for IDS evasion.

untranslated

Paranoid

untranslated

Sneaky

untranslated

Set the timing template to slow down the scan to use less bandwidth and target machine resources.

untranslated

Polite

untranslated

Set the timing template to not modify the default Nmap value.

untranslated

Normal

untranslated

Set the timing template for faster scan. Used when on a reasonably fast and reliable network.

untranslated

Aggressive

untranslated

Set the timing template for the fastest scan. Used when on a fast network or when willing to sacrifice accuracy for speed.

untranslated

Insane

untranslated

Enable OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute).

untranslated

Enable all advanced/aggressive options

untranslated

Attempt to discover the operating system running on remote systems.

untranslated

Operating system detection

untranslated

Attempt to discover the version number of services running on remote ports.

untranslated

Version detection

untranslated

Scan by spoofing packets from a zombie computer so that the targets receive no packets from your IP address. The zombie must meet certain conditions which Nmap will check before scanning.

untranslated

Idle Scan (Zombie)

untranslated

Use an FTP server to port scan other hosts by sending a file to each interesting port of a target host.

untranslated

FTP bounce attack

untranslated

Never do reverse DNS. This can slash scanning times.

untranslated

Disable reverse DNS resolution

untranslated

Enable IPv6 scanning.

untranslated

IPv6 support

untranslated

Ping options

untranslated

Don't check if targets are up before scanning them. Scan every target listed.

untranslated

Don't ping before scanning

untranslated

Send an ICMP echo request (ping) probe to see if targets are up.

untranslated

ICMP ping

untranslated

Send an ICMP timestamp probe to see if targets are up.

untranslated

ICMP timestamp request

untranslated

Send an ICMP address mask request probe to see if targets are up.

untranslated

ICMP netmask request

untranslated

Send one or more ACK probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port.

untranslated

ACK ping

untranslated

Send one or more SYN probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port.

untranslated

SYN ping

untranslated

Send one or more UDP probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port.

untranslated

UDP probes

untranslated

Send one or more raw IP protocol probes to see if targets are up. Give a list of protocols or leave the argument blank to use a default list

untranslated

IPProto probes

untranslated

Send SCTP INIT chunk packets to see if targets are up. Give a list of ports or leave the argument blank to use a default port.

untranslated

SCTP INIT ping probes

untranslated

Scripting options (NSE)

untranslated

Use the Nmap Scripting Engine to gain more information about targets after scanning them.

untranslated

Script scan

untranslated

Run the given scripts. Give script names, directory names, or category names. Categories are \"safe\", \"intrusive\", \"malware\", \"discovery\", \"vuln\", \"auth\", \"external\", \"default\", and \"all\". If blank, scripts in the \"default\" category are run.

untranslated

Scripts to run

untranslated

Give arguments to certain scripts that use them. Arguments are <name>=<value> pairs, separated by commas. Values may be Lua tables.

untranslated

Script arguments

untranslated

Show all information sent and received by the scripting engine.

untranslated

Trace script execution

untranslated

Target options

untranslated

Specifies a comma-separated list of targets to exclude from the scan.

untranslated

Excluded hosts/networks

untranslated

Specifies a newline-, space-, or tab-delimited file of targets to exclude from the scan.

untranslated

Exclusion file

untranslated

Reads target list specification from an input file.

untranslated

Target list file

untranslated

Option to choose targets at random. Tells Nmap how many IPs to generate. 0 is used for a never-ending scan.

untranslated

Scan random hosts

untranslated

This option specifies which ports you want to scan and overrides the default.

untranslated

Ports to scan

untranslated

Only scan ports named in the nmap-services file which comes with Nmap (or nmap-protocols file for -sO).

untranslated

Fast scan

untranslated

Source options

untranslated

Send fake decoy probes from spoofed addresses to hide your own address. Give a list of addresses separated by commas. Use RND for a random address and ME to set the position of your address.

untranslated

Use decoys to hide identity

untranslated

Specify the IP address of the interface you wish to send packets through.

untranslated

Set source IP address

untranslated

Provide a port number and Nmap will send packets from that port where possible.

untranslated

Set source port

untranslated

Tells Nmap what interface to send and receive packets on.

untranslated

Set network interface

untranslated

Other options

untranslated

Any extra options to add to the command line.

untranslated

Extra options defined by user

untranslated

Set the IPv4 time-to-live field in sent packets to the given value.

untranslated

Set IPv4 time to live (ttl)

untranslated

Causes the requested scan (including ping scans) to split up TCP headers over several packets.

untranslated

Fragment IP packets

untranslated

Print more information about the scan in progress. Open ports are shown as they are found as well as completion time estimates.

untranslated

Verbosity level

untranslated

When even verbose mode doesn't provide sufficient data for you, debugging level is available to show more detailed output.

untranslated

Debugging level

untranslated

Print a summary of every packet sent or received.

untranslated

Packet trace

untranslated

Scan ports in order instead of randomizing them.

untranslated

Disable randomizing scanned ports

untranslated

Trace the network path to each target after scanning. This works with all scan types except connect scan (-sT) and idle scan (-sI).

untranslated

Trace routes to targets

untranslated

Try sending a probe to each port no more than this many times before giving up.

untranslated

Max Retries

untranslated

Timing and performance

untranslated

Give up on a host if it has not finished being scanning in this long. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.

untranslated

Max time to scan a target

untranslated

Wait no longer than this for a probe response before giving up or retransmitting the probe. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.

untranslated

Max probe timeout

untranslated

Wait at least this long for a probe response before giving up or retransmitting the probe. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.

untranslated

Min probe timeout

untranslated

Use the time given as the initial estimate of round-trip time. This can speed up scans if you know a good time for the network you're scanning.

untranslated

Initial probe timeout

untranslated

Scan no more than this many hosts in parallel.

untranslated

Max hosts in parallel

untranslated

Scan at least this many hosts in parallel.

untranslated

Min hosts in parallel

untranslated

Never allow more than the given number of probes to be outstanding at a time. May be set to 1 to prevent Nmap from sending more than one probe at a time to hosts.

untranslated

Max outstanding probes

untranslated

Try to maintain at least the given number of probes outstanding during a scan. Common usage is to set to a number higher than 1 to speed up scans of poorly performing hosts or networks.

untranslated

Min outstanding probes

untranslated

Do not allow the scan delay (time delay between successive probes) to grow larger than the given amount of time. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.

untranslated

Max scan delay

untranslated

Wait at least the given amount of time between each probe sent to a given host. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.

untranslated