Nmap over tor issue : hacking | Torhoo darknet markets
I am trying to scan the nmap scanme, however when I use my qubes+kali setup through whonix it comes back as all scanned (top 1k) ports open.
If I do the same default scan with the default firewall net qube, I get the expected results.
Is there anything I can do to get a proper scan without exposing my IP address?
Scanning from Tor is not going to work well. Your IP is probably blacklisted as it is tor exit node and not all flags are really meant to be used with Tor. Buy a cheap vps, buy cheap datacenter or res proxies, and scan from them. Your results will be faster and you can ssh to the scan server from tor so that you are still safe.
Thanks for the help.
I noticed (at least for nmaps scanme server) that ports that are actually open will stand out if I use -sV over tor. All ports still report as open, but the ones that are actually open had version info.
Yes, I am trying to attack vulnerable web servers that I shouldn't be. I want to avoid any attacks being traced back to my IP. Ideally, not even my city/state so I want to avoid going to a public wifi to do the scans. I appreciate the help btw.
No problem. I would suggest using the -D (Decoy) agument or the Source address one. Both of these will spoof your address from the target server. You cant make yourself Invisible per say but you can Make enough fake IPs So you are harder to find. Hope that helps
Do not scan using Tor for scanning. Buy a cheap VPS and some socks proxies. Connect to your VPS through Tor. Then run nmap with proxychains. Scanning directly from Tor can lead to problems like connection timeouts, firewall blocks, and false negatives.
for me in my scans usually i use proxy-chains but before you use it make sure that you set it up correctly and everything is working right to avoid IP leaks
When scanning through Whonix, your traffic routes over Tor, which can cause nmap to see all ports as open due to Tor’s exit node behavior and filtering. To get accurate scans without exposing your IP, consider using a VPN or proxy outside Tor that supports nmap scans, or scan from a trusted VPS with strict anonymity controls. Alternatively, limit scans to safer, less intrusive options like -sS (TCP SYN) and scan fewer ports to reduce detection and distortion.
I noticed (at least for nmaps scanme server) that ports that are actually open will stand out if I use -sV over tor. All ports still report as open, but the ones that are actually open had version info.