{"id":3704,"date":"2020-07-26T15:19:21","date_gmt":"2020-07-26T09:49:21","guid":{"rendered":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/?p=3704"},"modified":"2021-07-10T10:43:12","modified_gmt":"2021-07-10T05:13:12","slug":"python-nmap","status":"publish","type":"post","link":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/","title":{"rendered":"Python Nmap Module Fully Explained with 8 Programs"},"content":{"rendered":"\n<p><strong>Network Mapper or Nmap is a module in python which is used to create an open port scanner. It is better known as a foot-printing or reconnaissance tool. Reconnaissance in ethical hacking terms means finding information about the target. The target can be in the form of a website or IP address. We will perform this Reconnaissance using the python nmap module.&nbsp;<\/strong><\/p>\n\n\n\n<p>Information can be the name of the operating system used or characteristics of the network devices. But the primary use of Nmap is to design an open port scanner. An open port scanner is used to scan what all ports are open and what all ports are closed.&nbsp;&nbsp;<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_65 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #990303;color:#990303\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #990303;color:#990303\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#What_is_Nmap_in_Python\" title=\"What is Nmap in Python?&nbsp;\">What is Nmap in Python?&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#Syntax_of_Python_Nmap_%E2%80%93\" title=\"Syntax of Python Nmap &#8211;&nbsp;\">Syntax of Python Nmap &#8211;&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#Operations_Performed_using_Nmap_Python\" title=\"Operations Performed using Nmap Python&nbsp;\">Operations Performed using Nmap Python&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#1_SYN-ACK_Scanning_using_nmap_python\" title=\"1. SYN-ACK Scanning using nmap python- \">1. SYN-ACK Scanning using nmap python- <\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#2_UDP_Scanning_Using_Nmap_%E2%80%93\" title=\"2. UDP Scanning Using Nmap &#8211;\">2. UDP Scanning Using Nmap &#8211;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#3_COMPREHENSIVE_Scanning_Using_Nmap_Python\" title=\"3. COMPREHENSIVE Scanning Using Nmap Python-\">3. COMPREHENSIVE Scanning Using Nmap Python-<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#4_Regular_Scanning_Using_Nmap_%E2%80%93\" title=\"4. Regular Scanning Using Nmap &#8211; \">4. Regular Scanning Using Nmap &#8211; <\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#5_OS_DETECTION_Using_Nmap_Python\" title=\"5. OS DETECTION Using Nmap Python\">5. OS DETECTION Using Nmap Python<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#6_Multiple_IP_Range_Using_Nmap_Python\" title=\"6. Multiple IP Range Using Nmap Python\">6. Multiple IP Range Using Nmap Python<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#7_Ping_Scan_Scanning_Using_Nmap\" title=\"7. Ping Scan Scanning Using Nmap \">7. Ping Scan Scanning Using Nmap <\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#8_Python_nmap_Asynchronous_Using_Nmap\" title=\"8. Python nmap Asynchronous Using Nmap \">8. Python nmap Asynchronous Using Nmap <\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#Program_For_using_Functionalities_in_Python_Nmap\" title=\"Program For using Functionalities in Python&nbsp;Nmap\">Program For using Functionalities in Python&nbsp;Nmap<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#Must_Read\" title=\"Must Read\">Must Read<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-what-is-nmap-in-python\"><span class=\"ez-toc-section\" id=\"What_is_Nmap_in_Python\"><\/span>What is Nmap in Python?&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In technical terms, nmap is a tool that is used for <strong>security auditing and network discovery.<\/strong> The way nmap works is by sending raw IP packets to determine if the target host is available on the network, what services the target host is providing, what type of firewalls are in use, what operating system versions are running, and tons of other characteristics.&nbsp;<\/p>\n\n\n\n<p>We will do it all using python. Although there is a GUI tool available, the <a href=\"https:\/\/www.pythonpool.com\/pyjokes\/\" target=\"_blank\" rel=\"noreferrer noopener\">fun<\/a> part is only when using a command line or python scripts.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-syntax-of-python-nmap\"><span class=\"ez-toc-section\" id=\"Syntax_of_Python_Nmap_%E2%80%93\"><\/span>Syntax of Python Nmap &#8211;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>To use the nmap module in python, we first need to install the <a href=\"https:\/\/nmap.org\/download.html\">online tool<\/a>. After installing it, we need to install the nmap module using pip install python-nmap.&nbsp; &nbsp;<\/p>\n\n\n\n<p>Note that we cannot target any website or IP address as that is illegal so that we will use the localhost i.e., 127.0.0.1&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-operations-performed-using-nmap-python\"><span class=\"ez-toc-section\" id=\"Operations_Performed_using_Nmap_Python\"><\/span>Operations Performed using Nmap Python&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-syn-ack-scanning-using-nmap-python\"><span class=\"ez-toc-section\" id=\"1_SYN-ACK_Scanning_using_nmap_python\"><\/span>1. SYN-ACK Scanning using nmap python- <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>When we want to know about the state of the port without establishing the full connection, we perform SYN scanning. This is possible by sending <strong>synchronous packets<\/strong> to every port of the target host (for three-way handshaking). If the target host server responds with SYN\/ACK (synchronization acknowledged), it means that the port is open. We will make a program for this type of scanning.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-udp-scanning-using-nmap\"><span class=\"ez-toc-section\" id=\"2_UDP_Scanning_Using_Nmap_%E2%80%93\"><\/span>2. UDP Scanning Using Nmap &#8211;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>User Datagram Packet is a<strong> connectionless protocol <\/strong>for video streaming or audio streaming purposes. It is <strong>fast<\/strong> but <strong>unreliable<\/strong>. We perform a UDP Scan when we want to search for UDP ports that are open or vulnerable. The process to know about the state is mostly the same as above. There are four types of state based on the responses.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>If we get a response, then the state is \u2018OPEN.\u2019<\/strong>&nbsp;<\/p>\n\n\n\n<p><strong>Response is not there , then the state is \u2018OPEN|FILTER\u2019&nbsp;<\/strong><\/p>\n\n\n\n<p><strong><strong>For \u2018ICMP port unreachable error (type 3, code 3)<\/strong>\u2019, then the state is \u2018closed.\u2019&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>And if we get \u2018Other ICMP unreachable errors (type 3, code 1, 2, 9, 10, or 13)\u2019, it means the state is \u2018FILTERED.\u2019&nbsp;<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-comprehensive-scanning-using-nmap-python\"><span class=\"ez-toc-section\" id=\"3_COMPREHENSIVE_Scanning_Using_Nmap_Python\"><\/span>3. COMPREHENSIVE Scanning Using Nmap Python-<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p> This scan does a lot of hard work in information gathering. Even if the handshake is not possible in the first attempt, it will keep trying, and if it gets success, it will try to know about the Operating System Version and other relevant information.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-regular-scanning-using-nmap\"><span class=\"ez-toc-section\" id=\"4_Regular_Scanning_Using_Nmap_%E2%80%93\"><\/span>4. Regular Scanning Using Nmap &#8211; <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A regular scan tries to find 1000 most common scans and uses the ICMP Echo request for host detection.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-os-detection-using-nmap-python\"><span class=\"ez-toc-section\" id=\"5_OS_DETECTION_Using_Nmap_Python\"><\/span>5. OS DETECTION Using Nmap Python<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Using nmap we can detect what OS does the target work on,&nbsp;and service&nbsp;<strong>detection<\/strong>&nbsp;for devices. It is possible by using the TCP\/IP stack fingerprinting method. In our program, we get a lot of results when we try os detection, but we will only show you the relevant information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-multiple-ip-range-using-nmap-python\"><span class=\"ez-toc-section\" id=\"6_Multiple_IP_Range_Using_Nmap_Python\"><\/span>6. Multiple IP Range Using Nmap Python<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is quite common that we will want to check the services of multiple hosts, so in nmap we have an option to give a range of ip addresses for scanning.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-7-ping-scan-scanning-using-nmap\"><span class=\"ez-toc-section\" id=\"7_Ping_Scan_Scanning_Using_Nmap\"><\/span>7. Ping Scan Scanning Using Nmap <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Pinging means  scanning if a host is active on the network or not. To check for more than one host, we perform ping sweep (also known as ICMP sweep). <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-8-python-nmap-asynchronous-using-nmap\"><span class=\"ez-toc-section\" id=\"8_Python_nmap_Asynchronous_Using_Nmap\"><\/span>8. Python nmap Asynchronous Using Nmap <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In Asynchronous, results are returned one at a time to a callback function defined by&nbsp;the&nbsp;user.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-program-for-using-functionalities-in-python-nmap\"><span class=\"ez-toc-section\" id=\"Program_For_using_Functionalities_in_Python_Nmap\"><\/span>Program For using Functionalities in Python&nbsp;Nmap<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: python; title: ; notranslate\" title=\"\">\nimport nmap\n\nscanner = nmap.PortScanner()\n\nip_addr = '127.0.0.1'\n\nresponse = input(&quot;&quot;&quot;\\nPlease enter the type of scan you want to run\n                1)SYN ACK Scan\n                2)UDP Scan\n                3)Comprehensive Scan\n                4)Regular Scan\n                5. OS Detection\n                6. Multiple IP inputs\n                7. Ping Scan\\n&quot;&quot;&quot;)\nprint(&quot;You have selected option: &quot;, response)\n\n# If user's input is 1, perform a SYN\/ACK scan\nif response == '1':\n    print(&quot;Nmap Version: &quot;, scanner.nmap_version())\n    # Here, v is used for verbose, which means if selected it will give extra information\n    # 1-1024 means the port number we want to search on\n    #-sS means perform a TCP SYN connect scan, it send the SYN packets to the host\n    scanner.scan(ip_addr,'1-1024', '-v -sS')\n    print(scanner.scaninfo())\n    # state() tells if target is up or down\n    print(&quot;Ip Status: &quot;, scanner&#x5B;ip_addr].state())\n    # all_protocols() tells which protocols are enabled like TCP UDP etc\n    print(&quot;protocols:&quot;,scanner&#x5B;ip_addr].all_protocols())\n    print(&quot;Open Ports: &quot;, scanner&#x5B;ip_addr]&#x5B;'tcp'].keys())\n    \n# If user's input is 2, perform a UDP Scan   \nelif response == '2':\n    # Here, v is used for verbose, which means if selected it will give #extra information\n    # 1-1024 means the port number we want to search on\n    #-sU means perform a UDP SYN connect scan, it send the SYN packets to #the host\n    print(&quot;Nmap Version: &quot;, scanner.nmap_version())\n    scanner.scan(ip_addr, '1-1024', '-v -sU')\n    print(scanner.scaninfo())\n    # state() tells if target is up or down\n    print(&quot;Ip Status: &quot;, scanner&#x5B;ip_addr].state())\n    # all_protocols() tells which protocols are enabled like TCP UDP etc\n    print(&quot;protocols:&quot;,scanner&#x5B;ip_addr].all_protocols())\n    print(&quot;Open Ports: &quot;, scanner&#x5B;ip_addr]&#x5B;'udp'].keys())\n    \n# If user's input is 3, perform a Comprehensive scan\nelif response == '3':\n    print(&quot;Nmap Version: &quot;, scanner.nmap_version())\n    # sS for SYN scan, sv probe open ports to determine what service and version they are running on\n    # O determine OS type, A tells Nmap to make an effort in identifying the target OS\n    scanner.scan(ip_addr, '1-1024', '-v -sS -sV -sC -A -O')\n    print(scanner.scaninfo())\n    print(&quot;Ip Status: &quot;, scanner&#x5B;ip_addr].state())\n    print(scanner&#x5B;ip_addr].all_protocols())\n    print(&quot;Open Ports: &quot;, scanner&#x5B;ip_addr]&#x5B;'tcp'].keys())\n    \n# If user's input is 4, perform a Regular Scan\nelif response == '4':\n    # Works on default arguments\n    scanner.scan(ip_addr)\n    print(scanner.scaninfo())\n    print(&quot;Ip Status: &quot;, scanner&#x5B;ip_addr].state())\n    print(scanner&#x5B;ip_addr].all_protocols())\n    print(&quot;Open Ports: &quot;, scanner&#x5B;ip_addr]&#x5B;'tcp'].keys())\n    \nelif response == '5':\n    print(scanner.scan(&quot;127.0.0.1&quot;, arguments=&quot;-O&quot;)&#x5B;'scan']&#x5B;'127.0.0.1']&#x5B;'osmatch']&#x5B;1])\n\nelif response == '6':\n    ip_addr = input()\n    print(&quot;Nmap Version: &quot;, scanner.nmap_version())\n    # Here, v is used for verbose, which means if selected it will give extra information\n    # 1-1024 means the port number we want to search on\n    #-sS means perform a TCP SYN connect scan, it send the SYN packets to the host\n    scanner.scan(ip_addr,'1-1024', '-v -sS')\n    print(scanner.scaninfo())\n    # state() tells if target is up or down\n    print(&quot;Ip Status: &quot;, scanner&#x5B;ip_addr].state())\n    # all_protocols() tells which protocols are enabled like TCP UDP etc\n    print(&quot;protocols:&quot;,scanner&#x5B;ip_addr].all_protocols())\n    print(&quot;Open Ports: &quot;, scanner&#x5B;ip_addr]&#x5B;'tcp'].keys())\n    \nelif response == '7': \n    scanner.scan(hosts='192.168.1.0\/24', arguments='-n -sP -PE -PA21,23,80,3389')\n    hosts_list = &#x5B;(x, scanner&#x5B;x]&#x5B;'status']&#x5B;'state']) for x in scanner.all_hosts()]\n    for host, status in hosts_list:\n        print('{0}:{1}'.format(host, status))\n    \nelse:\n    print(&quot;Please choose a number from the options above&quot;)\n<\/pre><\/div>\n\n\n<p><strong>Output-<\/strong><\/p>\n\n\n\n<p>Let us give all the possible numbers (1-4) one by one.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">Please enter the type of scan you want to run\n                1)SYN ACK Scan\n                2)UDP Scan\n                3)Comprehensive Scan\n                4)Regular Scan\n1\nYou have selected option:  1\nNmap Version:  (7, 80)\n{'tcp': {'method': 'syn', 'services': '1-1024'}}\nIp Status:  up\nprotocols: ['tcp']\nOpen Ports:  dict_keys([135, 137, 445])<\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\">Please enter the type of scan you want to run\n                1)SYN ACK Scan\n                2)UDP Scan\n                3)Comprehensive Scan\n                4)Regular Scan\n2\nYou have selected option:  2\nNmap Version:  (7, 80)\n{'udp': {'method': 'udp', 'services': '1-1024'}}\nIp Status:  up\nprotocols: ['udp']\nOpen Ports:  dict_keys([137, 500])<\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\">Please enter the type of scan you want to run\n                1)SYN ACK Scan\n                2)UDP Scan\n                3)Comprehensive Scan\n                4)Regular Scan\n3\nYou have selected option:  3\nNmap Version:  (7, 80)\n{'tcp': {'method': 'syn', 'services': '1-1024'}}\nIp Status:  up\n['tcp']\nOpen Ports:  dict_keys([135, 137, 445])<\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"715\" src=\"https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Screenshot-265-1024x715.png\" alt=\"python nmap\" class=\"wp-image-3705\" srcset=\"https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Screenshot-265-1024x715.png 1024w, https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Screenshot-265-300x209.png 300w, https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Screenshot-265-768x536.png 768w, https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Screenshot-265.png 1229w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<pre class=\"wp-block-preformatted\">Please enter the type of scan you want to run\n1)SYN ACK Scan\n2)UDP Scan\n3)Comprehensive Scan\n4)Regular Scan\n5)OS Detection\n6)Multiple IP inputs\n7) Ping Scan\n\n5\n{'name': 'Microsoft Windows 10 1703', 'accuracy': '93', 'line': '69394', 'osclass': [{'type': 'general purpose', 'vendor': 'Microsoft', 'osfamily': 'Windows', 'osgen': '10', 'accuracy': '93', 'cpe': ['cpe:\/o:microsoft:windows_10:1703']}]}<\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\">Please enter the type of scan you want to run\n1)SYN ACK Scan\n2)UDP Scan\n3)Comprehensive Scan\n4)Regular Scan\n5)OS Detection\n6)Multiple IP inputs\n7) Ping Scan\n\n6<\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\">Please enter the type of scan you want to run\n1)SYN ACK Scan\n2)UDP Scan\n3)Comprehensive Scan\n4)Regular Scan\n5)OS Detection\n6)Multiple IP inputs\n7) Ping Scan\n\n7\n192.168.1.0:up \n192.168.1.1:up \n192.168.1.10:up \n192.168.1.100:up \n192.168.1.101:up \n192.168.1.102:up\n<\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"699\" src=\"https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Screenshot-267-1024x699.png\" alt=\"nmap python\" class=\"wp-image-3720\" srcset=\"https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Screenshot-267-1024x699.png 1024w, https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Screenshot-267-300x205.png 300w, https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Screenshot-267-768x524.png 768w, https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Screenshot-267.png 1091w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" id=\"h-must-read\"><span class=\"ez-toc-section\" id=\"Must_Read\"><\/span>Must Read<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul><li><a href=\"https:\/\/www.pythonpool.com\/python-lowercase\/\">How to Convert String to Lowercase in<\/a><\/li><li><a href=\"https:\/\/www.pythonpool.com\/square-root-in-python\/\">How to Calculate Square Root<\/a><\/li><li><a href=\"https:\/\/www.pythonpool.com\/python-user-input\/\">User Input | Input () Function | Keyboard Input<\/a><\/li><li><a href=\"https:\/\/www.pythonpool.com\/python-book\/\">Best Book to Learn Python<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There are so many other scans that you can do, like intense scan, quick scan, ping scan, which will just need small changes in the program that we made. You must have now acknowledged the power of map in python, how powerful a tool it is for information gathering.<\/p>\n\n\n\n<p>Try to run the programs on your side and let us know if you have any queries.<\/p>\n\n\n\n<p><strong><em>Happy Coding!<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network Mapper or Nmap is a module in python which is used to create an open port scanner. It is better known as a foot-printing &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Python Nmap Module Fully Explained with 8 Programs\" class=\"read-more button\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/#more-3704\" aria-label=\"More on Python Nmap Module Fully Explained with 8 Programs\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":3726,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[15],"tags":[1753,1739,1747,1759,1741,1746,1744,1751,11,1762,1738,1737,1745,1749,1768,1757,1743,1740,1752,1742,1748],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.1 (Yoast SEO v22.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Python Nmap Module Fully Explained with 8 Programs - Python Pool<\/title>\n<meta name=\"description\" content=\"Network Mapper or Python Nmap is a module in python which is used to create an open port scanner. It is better known as a foot-printing...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pythonpool.com\/python-nmap\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Python Nmap Module Fully Explained with 8 Programs\" \/>\n<meta property=\"og:description\" content=\"Network Mapper or Nmap is a module in python which is used to create an open port scanner. It is better known as a foot-printing or reconnaissance tool.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pythonpool.com\/python-nmap\/\" \/>\n<meta property=\"og:site_name\" content=\"Python Pool\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-26T09:49:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-10T05:13:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Capture-26.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1002\" \/>\n\t<meta property=\"og:image:height\" content=\"604\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ashwini Mandani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pythonpool\" \/>\n<meta name=\"twitter:site\" content=\"@pythonpool\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ashwini Mandani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pythonpool.com\/python-nmap\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pythonpool.com\/python-nmap\/\"},\"author\":{\"name\":\"Ashwini Mandani\",\"@id\":\"https:\/\/www.pythonpool.com\/#\/schema\/person\/8a75fb48eb1f3dc952df65a8c28ac056\"},\"headline\":\"Python Nmap Module Fully Explained with 8 Programs\",\"datePublished\":\"2020-07-26T09:49:21+00:00\",\"dateModified\":\"2021-07-10T05:13:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pythonpool.com\/python-nmap\/\"},\"wordCount\":820,\"commentCount\":11,\"publisher\":{\"@id\":\"https:\/\/www.pythonpool.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pythonpool.com\/python-nmap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Capture-26.jpg\",\"keywords\":[\"how does nmap grab services\",\"install nmap module python kali\",\"nmap from python\",\"nmap in python\",\"nmap port scan python\",\"nmap python\",\"no module named nmap python\",\"port scanner python nmap\",\"Python\",\"python import nmap no module named nmap\",\"python nmap\",\"python nmap &quot;trace route&quot;\",\"python nmap module\",\"python nmap modules\",\"python nmap package mac\",\"python nmap ping scan\",\"python script nmap\",\"python sh with nmap\",\"python-nmap\",\"raspbian python script importerror no module named nmap\",\"will python-nmap work on windows\"],\"articleSection\":[\"Tutorials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.pythonpool.com\/python-nmap\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pythonpool.com\/python-nmap\/\",\"url\":\"https:\/\/www.pythonpool.com\/python-nmap\/\",\"name\":\"Python Nmap Module Fully Explained with 8 Programs - Python Pool\",\"isPartOf\":{\"@id\":\"https:\/\/www.pythonpool.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pythonpool.com\/python-nmap\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pythonpool.com\/python-nmap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Capture-26.jpg\",\"datePublished\":\"2020-07-26T09:49:21+00:00\",\"dateModified\":\"2021-07-10T05:13:12+00:00\",\"description\":\"Network Mapper or Python Nmap is a module in python which is used to create an open port scanner. It is better known as a foot-printing...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pythonpool.com\/python-nmap\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pythonpool.com\/python-nmap\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pythonpool.com\/python-nmap\/#primaryimage\",\"url\":\"https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Capture-26.jpg\",\"contentUrl\":\"https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Capture-26.jpg\",\"width\":1002,\"height\":604,\"caption\":\"python nmap\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pythonpool.com\/python-nmap\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pythonpool.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Python Nmap Module Fully Explained with 8 Programs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pythonpool.com\/#website\",\"url\":\"https:\/\/www.pythonpool.com\/\",\"name\":\"Python Pool\",\"description\":\"Your One-Stop Python Learning Destination\",\"publisher\":{\"@id\":\"https:\/\/www.pythonpool.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pythonpool.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pythonpool.com\/#organization\",\"name\":\"Python Pool\",\"url\":\"https:\/\/www.pythonpool.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pythonpool.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/08\/aa.png\",\"contentUrl\":\"https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/08\/aa.png\",\"width\":452,\"height\":185,\"caption\":\"Python Pool\"},\"image\":{\"@id\":\"https:\/\/www.pythonpool.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/pythonpool\",\"https:\/\/www.youtube.com\/c\/pythonpool\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pythonpool.com\/#\/schema\/person\/8a75fb48eb1f3dc952df65a8c28ac056\",\"name\":\"Ashwini Mandani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pythonpool.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/efd3e2763a755a226df4479ad87a5464?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/efd3e2763a755a226df4479ad87a5464?s=96&d=wavatar&r=g\",\"caption\":\"Ashwini Mandani\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Python Nmap Module Fully Explained with 8 Programs - Python Pool","description":"Network Mapper or Python Nmap is a module in python which is used to create an open port scanner. It is better known as a foot-printing...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/","og_locale":"en_US","og_type":"article","og_title":"Python Nmap Module Fully Explained with 8 Programs","og_description":"Network Mapper or Nmap is a module in python which is used to create an open port scanner. It is better known as a foot-printing or reconnaissance tool.","og_url":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/","og_site_name":"Python Pool","article_published_time":"2020-07-26T09:49:21+00:00","article_modified_time":"2021-07-10T05:13:12+00:00","og_image":[{"width":1002,"height":604,"url":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Capture-26.jpg","type":"image\/jpeg"}],"author":"Ashwini Mandani","twitter_card":"summary_large_image","twitter_creator":"@pythonpool","twitter_site":"@pythonpool","twitter_misc":{"Written by":"Ashwini Mandani","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/#article","isPartOf":{"@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/"},"author":{"name":"Ashwini Mandani","@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/#\/schema\/person\/8a75fb48eb1f3dc952df65a8c28ac056"},"headline":"Python Nmap Module Fully Explained with 8 Programs","datePublished":"2020-07-26T09:49:21+00:00","dateModified":"2021-07-10T05:13:12+00:00","mainEntityOfPage":{"@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/"},"wordCount":820,"commentCount":11,"publisher":{"@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/#organization"},"image":{"@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/#primaryimage"},"thumbnailUrl":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Capture-26.jpg","keywords":["how does nmap grab services","install nmap module python kali","nmap from python","nmap in python","nmap port scan python","nmap python","no module named nmap python","port scanner python nmap","Python","python import nmap no module named nmap","python nmap","python nmap &quot;trace route&quot;","python nmap module","python nmap modules","python nmap package mac","python nmap ping scan","python script nmap","python sh with nmap","python-nmap","raspbian python script importerror no module named nmap","will python-nmap work on windows"],"articleSection":["Tutorials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/","url":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/","name":"Python Nmap Module Fully Explained with 8 Programs - Python Pool","isPartOf":{"@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/#primaryimage"},"image":{"@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/#primaryimage"},"thumbnailUrl":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Capture-26.jpg","datePublished":"2020-07-26T09:49:21+00:00","dateModified":"2021-07-10T05:13:12+00:00","description":"Network Mapper or Python Nmap is a module in python which is used to create an open port scanner. It is better known as a foot-printing...","breadcrumb":{"@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/#primaryimage","url":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Capture-26.jpg","contentUrl":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/07\/Capture-26.jpg","width":1002,"height":604,"caption":"python nmap"},{"@type":"BreadcrumbList","@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/python-nmap\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/"},{"@type":"ListItem","position":2,"name":"Python Nmap Module Fully Explained with 8 Programs"}]},{"@type":"WebSite","@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/#website","url":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/","name":"Python Pool","description":"Your One-Stop Python Learning Destination","publisher":{"@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/#organization","name":"Python Pool","url":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/#\/schema\/logo\/image\/","url":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/08\/aa.png","contentUrl":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-content\/uploads\/2020\/08\/aa.png","width":452,"height":185,"caption":"Python Pool"},"image":{"@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/twitter.com\/pythonpool","https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.youtube.com\/c\/pythonpool"]},{"@type":"Person","@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/#\/schema\/person\/8a75fb48eb1f3dc952df65a8c28ac056","name":"Ashwini Mandani","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/#\/schema\/person\/image\/","url":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/secure.gravatar.com\/avatar\/efd3e2763a755a226df4479ad87a5464?s=96&d=wavatar&r=g","contentUrl":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/secure.gravatar.com\/avatar\/efd3e2763a755a226df4479ad87a5464?s=96&d=wavatar&r=g","caption":"Ashwini Mandani"}}]}},"_links":{"self":[{"href":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-json\/wp\/v2\/posts\/3704"}],"collection":[{"href":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-json\/wp\/v2\/comments?post=3704"}],"version-history":[{"count":8,"href":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-json\/wp\/v2\/posts\/3704\/revisions"}],"predecessor-version":[{"id":13559,"href":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-json\/wp\/v2\/posts\/3704\/revisions\/13559"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-json\/wp\/v2\/media\/3726"}],"wp:attachment":[{"href":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-json\/wp\/v2\/media?parent=3704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-json\/wp\/v2\/categories?post=3704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/www.pythonpool.com\/wp-json\/wp\/v2\/tags?post=3704"}],"curies":[{"name":"wp","href":"https:\/\/web.archive.org\/web\/20240926035615\/https:\/\/api.w.org\/{rel}","templated":true}]}}