Scan All Devices On Your WiFi Using Termux + Nmap

Ever felt curious about what’s happening on your local Wi-Fi? 👀 Wanna check what devices are connected and what services are open? 🕵️‍♂️



Termux + Nmap = the ultimate hacker-style scanner combo 💻⚡ Let’s learn how to scan open ports in your network using your Android device like a pro 🧠📲

⚙️ What is Nmap?

Nmap (Network Mapper) is a free, open-source tool used for network discovery and security auditing. It can:

  • Detect devices on your network 📡
  • Identify open ports 🔓
  • Recognize running services and versions ⚙️
  • Help you understand potential vulnerabilities 🔍

With Nmap + Termux, you turn your Android into a mini cybersecurity scanner 🧠📱💥


🚀 Step 1: Install Nmap in Termux

Let’s get you set up real quick:

pkg update && pkg upgrade
pkg install nmap

✅ Done. You’re now equipped with Nmap 🧢


📡 Step 2: Find Your Own IP Address 🏠

To scan your network, you first need your local IP address. Just type:

ifconfig

Look for something like this:

wlan0: flags=...
inet 192.168.1.208  netmask 255.255.255.0  broadcast 192.168.1.255

👆 That inet IP (192.168.x.x) is your phone’s local IP address. You’ll need the subnet too, which is usually /24.


📡 Step 3: Scan the Whole Network 🌍

Use this command to scan all devices on your network and check which ports are open:

nmap -sV 192.168.1.0/24

💥 This command will:

  • Show all up (online) hosts ✅
  • Reveal open ports on each ✅
  • Detect service versions ✅

🔍 Example output:

Nmap scan report for 192.168.1.208
Host is up (0.0068s latency).
PORT     STATE SERVICE VERSION
8022/tcp open  ssh     OpenSSH 9.9

🔥 4 devices up? Only one with an open port? Now that’s clarity!


☝️ VERY IMPORTANT:

Make sure to check the list of “Host is up” 💡 — these are the ONLY devices you can scan deeper!

Ignore ones that say All 1000 scanned ports are closed. Focus on the juicy ones with something open! 🍔


🎯 Step 4: Scan a Specific Device Only

Once you find the IP of a device that’s “up” (maybe your laptop or a smart bulb 💡), you can scan it like this:

nmap -sV 192.168.1.208

This command:

  • Targets only one IP 🎯
  • Shows detailed info about its open ports 🧠


🧠 Bonus Tip:

You can also do:

nmap -O 192.168.1.208

This tries to detect the OS (Operating System) of the target! 🕵️‍♂️ Linux? Windows? You’ll find out!


🎁 Final Thoughts:

Nmap is like a flashlight in the dark web of your Wi-Fi 🕯️✨ You can see all the hidden stuff: devices, open doors (ports), and services.

🔒 Always use it ethically. Only scan networks you own or have permission to test!

So go scan your house, find what’s open, and flex your hacker powers (legally ofc 😎)

— Saad Maqsood 🛹

Post a Comment

0 Comments

Popup Image