ZMap is an open-source network scanner that enables researchers to quickly perform large-scale studies of the configuration of the Internet.

It was developed by Zakir Durumeric, Eric Wustrow, and J. Alex Halderman and is designed to perform comprehensive and fast network scans.

Unfortunately, even tho is freely available on-line, this tool is licensed to the University of Michigan.

ZMap is particularly known for its ability to scan the entire IPv4 address space in a short period.
With the right connection, available to most people, we talk of 45 minutes of work, if you can have a 10gigE connection and PF_RING you can scan the whole internet in about 5 minutes.

This ability makes it a valuable tool for security researchers (and not only).

It is commonly used to identify vulnerable or misconfigured devices on the Internet.

A very important piece of information/note

Please keep in mind that by running ZMap, you are potentially scanning the ENTIRE IPv4 address space and some users may not appreciate your scanning.

How to get it

The official website of ZMap is https://zmap.io/ and i advice you to check it out. There are a few of interesting things !

But more details on it’s GitHub page reachable at https://github.com/zmap/zmap

How to Install and use it

ZMap works on GNU/Linux, macOS, and BSD..

The latest stable version are available in almost all the package managers.
So just use your apt/yum/pacman/brew/emerge/port to install zmap

If you want something different (like building from source because you have nothing better to do) feel free to reach out the GitHub reported above.

By default, ZMap will perform a TCP SYN scan on the specified port at the maximum rate possible.
A more humane way to scan 10,000 random addresses on port 80 at a maximum 10 Mbps can be run as follows:

$ zmap --bandwidth=10M --target-ports=80 --max-targets=10000 --output-file=results.csv

As always,

show some love to the Authors and leave them a star on their GitHub page !