Escaneo de IPs con descripción de MAC: nmap -sn 192.168.1.0/24 | awk ' /Nmap scan report/ { ip=$NF gsub(/[()]/,"",ip) } /MAC Address/ { match($0, /\((.*)\)/, m) if (ip != "") print ip " - " m[1] }' En una línea nmap -sn 192.168.1.0/24 | awk '/Nmap scan report/{ip=$NF; gsub(/[()]/,"",ip)} /MAC Address/{match($0,/\((.*)\)/,m); if(ip!="") print ip " - " m[1]}' * Listar puertos abiertos: nmap -sT -O localhost * Mirar puerto abierto UDP: # nmap -p -sU -P0 Ejemplo: # nmap -p 5060 -sU -P0 10.139.56.4 Starting Nmap 5.00 ( http://nmap.org ) at 2013-01-19 20:32 UTC Interesting ports on 10.139.56.4: PORT STATE SERVICE 5060/udp open|filtered sip * Manual para ver conexiones rechazadas: http://www.linuxjournal.com/article/6447 * Host discovery: nmap -sn 192.168.1.0/24 Starting Nmap 6.00 ( http://nmap.org ) at 2012-09-06 05:59 EDT Nmap scan report for 192.168.1.1 Host is up (0.028s latency). Nmap scan report for 192.168.1.199 Host is up (0.00031s latency). Nmap done: 256 IP addresses (2 hosts up) scanned in 4.48 seconds