python-nmap is a Python library which helps in using the popular Nmap port scanner. It allows to easilly manipulate nmap scan results and will be a perfect tool for systems administrators who want to automatize scanning task and reports. It also supports nmap script outputs.
Typical usage looks like:
#!/usr/bin/env python
import nmap # import nmap.py module
nm = nmap.PortScanner() # instantiate nmap.PortScanner object
nm.scan(‘127.0.0.1′, ’22-443’) # scan host 127.0.0.1, ports from 22 to 443
nm.command_line() # get command line used for the scan : nmap -oX – -p 22-443 127.0.0.1
nm.scaninfo() # get nmap scan informations {‘tcp’: {‘services’: ’22-443′, ‘method’: ‘connect’}}
nm.all_hosts() # get all hosts that were scanned
nm[‘127.0.0.1’].hostname() # get hostname for host 127.0.0.1
nm[‘127.0.0.1’].state() # get state of host 127.0.0.1 (up|down|unknown|skipped)
nm[‘127.0.0.1’].all_protocols() # get all scanned protocols [‘tcp’, ‘udp’] in (ip|tcp|udp|sctp)
nm[‘127.0.0.1’][‘tcp’].keys() # get all ports for tcp protocol
nm[‘127.0.0.1’].all_tcp() # get all ports for tcp protocol (sorted version)
nm[‘127.0.0.1’].all_udp() # get all ports for udp protocol (sorted version)
nm[‘127.0.0.1’].all_ip() # get all ports for ip protocol (sorted version)
nm[‘127.0.0.1’].all_sctp() # get all ports for sctp protocol (sorted version)
nm[‘127.0.0.1’].has_tcp(22) # is there any information for port 22/tcp on host 127.0.0.1
nm[‘127.0.0.1’][‘tcp’][22] # get infos about port 22 in tcp on host 127.0.0.1
nm[‘127.0.0.1’].tcp(22) # get infos about port 22 in tcp on host 127.0.0.1
nm[‘127.0.0.1’][‘tcp’][22][‘state’] # get state of port 22/tcp on host 127.0.0.1 (open