In this tutorial, we will show you how to install Nmap on Fedora 36. For those of you who didn’t know, Nmap a.k.a Network Mapper is a command-line network scanning utility for Linux and other operating systems. It is also used for network inventory services, managing service upgrades, and monitoring hosts’ downtime. While Nmap is a potent tool, it is essential to note that it can be misused. In the hands of a skilled attacker, Nmap can be used to launch attacks against systems or to gather sensitive information about a network.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘
sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Nmap network scanning tool on a Fedora 36.
- A server running one of the following operating systems: Fedora 36.
- It’s recommended that you use a fresh OS install to prevent any potential issues.
- SSH access to the server (or just open Terminal if you’re on a desktop).
non-root sudo useror access to the
root user. We recommend acting as a
non-root sudo user, however, as you can harm your system if you’re not careful when acting as the root.
Install Nmap on Fedora 36
Step 1. Before proceeding, update your Fedora operating system to make sure all existing packages are up to date. Use this command to update the server packages:
sudo dnf upgrade sudo dnf update sudo dnf install dnf-plugins-core
Step 2. Installing Nmap on Fedora 36.
By default, the Nmap package come in the default repository of Fedora 36. Now run the following command below to install the latest version of Nmap to your Fedora system:
sudo dnf install nmap
You can verify the installed version of Nmap with the following command:
Step 3. Using Nmap with Command-Line.
Whenever you want to use Nmap you can use the command
Scan IP range or subnet:
To obtain general information on a remote system type:
sudo nmap target-IP-address or domain.com
Instead of scanning individual IPs, scan a whole IP range by defining it in your command line:
sudo nmap 192.168.77.2-20
The following command scans the entire specified subnet:
sudo nmap 184.108.40.206/24
Port Scanning with Nmap
Nmap is an efficient port scanner that recognizes six port states:
- open – actively accepting TCP connections, UDP datagrams, or SCTP associations
- closed – accessible; however, no application is listening on the port
- filtered – Nmap cannot determine whether the port is open due to packet filtering
- unfiltered – the port is accessible; however, Nmap is unable to determine if it is open or closed
- open|filtered – Nmap cannot determine if a port is open or filtered
- closed|filtered – Nmap cannot establish if a port is closed or filtered
Port Specification and Scan Order
By default, Nmap scans the thousand most common ports for each protocol. It also offers options for specifying which ports are to be scanned and whether the scan is random or ordered.
The -p option allows you to specify port ranges and sequences:
sudo nmap –p 80,443 192.168.77.20
This command scans ports 80 and 443 for the defined host.
TCP SYN scan
sudo nmap -sS 192.168.77.20
For a full list of options visit the Nmap official page or access the manual from your command line.
Congratulations! You have successfully installed Nmap. Thanks for using this tutorial for installing the Nmap network scanning on your Fedora 36 system. For additional help or useful information, we recommend you check the official Nmap website.