TypeScript icon, indicating that this package has built-in type declarations

1.0.5 • Public • Published

Network Mapper

Nmap wrapper for node fully coded in TypeScript.

This module is still in heavy development. As of now only the list scan is implemented, further more advanced scans will be implemented.

Linux build NPM npm


Installation is done using the npm install command:

npm install network-mapper

This package requires that Nmap is installed and available to the node application.


  • Awaitable functions which may take a few seconds


Simple list scan

The following example scans the specified target network for hosts.

import { ListScan } from 'network-mapper'

async function main() {
    const scan = new ListScan({
        target: ''

    const result = await


List scan with excluded addresses and reverse lookup

The following example scans a specified target network. The first and last hosts in the network are excluded from the network scan. The hostnames are resolved via the specified DNS resolvers.

import { ListScan } from 'network-mapper'

async function main() {
    const scan = new ListScan({
        target: '',
        exclude: ['', ''],
        dnsServer: ['', '']

    const result = await


Nmap scan with traceroute

The following example uses the core NmapScan. A ping scan is used to discover if the hosts are up. For each host which is up the route will be determined. Additionally for each hop a reverse lookup is executed.

import { NmapScan } from 'network-mapper'

async function main() {
    const scan = new NmapScan({
        scanType: 'ping-scan',
        target: '',
        dnsServer: ['', ''],
        resolve: 'all',
        traceroute: true

    const result = await


Scan Types

  • ListScan Lists each host of the network(s) specified, without sending any packets to the target hosts.
  • NmapScan This is the core scan of the package, using this scan type directly will allow you to run very customized scans.



Specifies which targets to scan. The Target Specification syntax from Nmap can be used. The option allows either a string or string array as an argument.

When a hostname is given as a target, it is resolved via the domain name system.


Specifies targets hosts to be excluded from the scan. The hosts passed can include hostnames, CIDR netblocks, IP ranges, etc.


Specifies ports which are excluded from the scan.


For larger network scans it might be useful to choose target hosts at random. Using this option an amount of random hosts can be specified.


The underlying Nmap process scans the hosts in order. Some IDS(Intrusion detection systems) might detect that an block following requests. When set Nmap randomizes the targets to scan.


Specifies for which IP addresses a reverse DNS lookup is run.

  • never Do not run reverse DNS lookup for any address
  • sometimes Nmap decides which addresses to run a reverse DNS lookup
  • always Try to resolve each target host address
  • all Also resolve all hosts addresses which are a part of the traceroute


By default, Nmap uses a custom stub resolver which performs dozends of requests in parallel. This option can be used to force use the system's DNS resolver. Using the system resolver can drastically increase the resolve time for each host.


By default, Nmap uses the system specified DNS servers to resolve IP addresses. A custom list of DNS resolver can be specified which this option.


Before running large network scans it might be useful to run a dryrun fist. This dryrun will not send any network packages at all. The response still return the addresses which will be scanned.


Determine all intermediate hops between the scanner and target host. This works by sending packets with a low TTL (time-to-live) in an attempt to elicit ICMP Time Exceeded message from the intermediate hops. By increasing the TTL until the target host is reached, the traceroute can be determined.


The timing templates can be used to slowdown or speedup network scans. Instead of using the fine-grained controls, using the timing option is a lot easier to use and they have a very similar effect on the scan.


The IPv4 time-to-live field in sent packets to the given value. Value must be within 0 and 255.


Specifies that you wish to scan fewer ports than the default. Normally Nmap scans the most common 1,000 ports for each scanned protocol. With this option, this is reduced to 100.


Some hosts simply take a long time to scan. This may be due to poorly performing or unreliable networking hardware or software, packet rate limiting, or a restrictive firewall. Use this option to specify the host timeout before the host is skipped.


Specifies the minimum group size in which a scan is divided into.


Specifies the maximum group size in which a scan is divided into.


Set this option to a number higher than one to speed up scans on poorly performing hosts or networks. This is a risky options to play with, as setting it too high may affect accuracy.


Specifies the maximal total number of probes outstanding for a host group. This options is sometimes set to one to prevent Nmap from sending more than one probe at a time to hosts.


Specifies the initial timeout value for determining how long it will wait for a probe response before giving up or retransmitting the probe.


This option is a rarely used option that could be useful when a network is so unreliable that even Nmap's default is too aggressive.


Specifies the maximal timeout value for a probe's round trip time. If a probe takes longer than the specified time it will be retransmitted until the maxRetries value is reached.


Specifies the amount of times a probe is retransmitted after it timed out. Set the option to 0 to prevent any retransmissions.


Specifies the timeout value for the execution of a script. Any script instance which exceeds that time will be terminated and no output will be shown.


Specifies the least given amount of time between each probe send to a given host.


When Nmap adjusts the scan delay upward to cope with rate limiting, the scan slows down dramatically. This options specifies the largest delay the is allowed.


This options tells Nmap to ignore RST response packets.


This options increases UDP scanning speed by ignoring ICMP error messages with are returned my a rate-limiting host.


Enforces the use of the given nsock IO multiplexing engine. Keep in mind that not all engines will be available on all systems. Currently the following engines are implemented in the underlying application.

  • epoll
  • kqueue
  • poll
  • select
  • iocp


Enforces Nmap to send the specified amount of packages per second. Specifying a minimum rate should be done with care. Scanning faster than a network support may lead to loss of accuracy.


Specifies the amount of packages Nmap is allowed per second.


Ths options causes the requested scan to use tiny fragmented IP packets. If a custom MTU value is set this options should not be used. Fragmentation is only supported for raw scans which include TCP and UDP (except connect scan und FTP bounce scan) and OS detection.


Specifies the length of the fragmented IP packet. The value must be a multiple of eight.


Causes a decoy scan to be performed, which makes it appear to the remote host that the host(s) you specify as decoys are scanning the target network too. Note that the hosts you use as decoys should be up or the target might get SYN flooded.


In some circumstances, Nmap may not be able to determine your source address. In this case use this option with the IP address of the interface which should be used to send packets through.

This option can also be used to spoof the source IP address. Note that in this case no reply packets will be received since their ar addressed to the spoofed IP address.


Tells Nmap what interface to send and receive packets on. Nmap should be able to detect this automatically, but it will tell you if it cannot.


Specifies on which port Nmap send packets from. Most scanning operations that use raw sockets, including SYN and UDP scans, support the option completely.


Specifies which MAC address to use for sending raw ethernet frames.


Establishes TCP connections with a final target through supplied chain of one or more HTTP or SOCKS4 proxies.


Uses an invalid TCP, UDP or SCTP checksum for packets sent to target hosts.


Enforces the use of IPv6 addresses.


Forces Nmap to use the specified send mechanism.

  • ip Sends packets via raw IP sockets rather than sending lower level ethernet frames.
  • eth Sends packets at the raw ethernet (data link) layer rather than the higher IP (network) layer.
  • auto Tells Nmap to automatically select the proper send mechanism. Same as not defining the send mechanism.


Nmap normally does ARP or IPv6 Neighbor Discovery discovery of locally connected ethernet hosts, even if other host discovery options are used. Use this option to disable this implicit behavior.


By default, the ports to be scanned are randomized. This randomization is normally desirable. Set this options to false to scan the ports in sequential order instead.


This option skips the host discovery stage altogether. This options is necessary, when target hosts do not respond to ICMP ping packets.


Only scan the specified ports. This options specifies which ports should be scanned and overrides the default. Ports can also be specified by name according to what the port is referred in the nmap-services file.


Scans all ports in the nmap-services file with a ratio greater that the given value. The value must be between 0.0 and 1.0.


Scans the specified highest ratio ports found in the nmap-services file after excluding all port specified by excludePort. The value must be 1 or greater.

Package Sidebar


npm i network-mapper

Weekly Downloads






Unpacked Size

93 kB

Total Files


Last publish


  • stogoh