nmap scan question (identifying hosts that are alive)
I've went through quite a few iterations to try and find out a way to do this. Essentially pinging to find live hosts doesn't work on all systems in my network, as with many. I'm wondering what will output all systems that have an open port of any sort, or some other way to identify living systems. The end result of this data is being scanned with Nessus. Anyway, the command line I ended up having to use was
nmap -iL netranges.txt -F -O -P0 > NETWORKnmap.txt
This resulted in every IP in every network range being listed as a server, but most of the other scans I attempted didn't find anything. How can I excise entries like this:
Nmap scan report for 10.xx.xx.xx
Host is up (0.22s latency).
All 1000 scanned ports on 10.xx.xx.xx are filtered
Too many fingerprints match this host to give specific OS details
yet still find every single live host on the networks I'm scanning?