How To Block Nmap Scan Linux?
Share
Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
1. Use Firewall: To block Nmap scanning, the most effective method is to use firewall. Configure your firewall to block the incoming Nmap connection requests from the external network.
2. Disable Unnecessary Services: Disabling unnecessary services will reduce the attack surface of the system, hence making it less vulnerable to Nmap scanning.
3. Harden SSH Server: Harden your SSH server by setting up an IP whitelist and disabling root access.
4. Enable Intrusion Detection/Prevention System (IDS/IPS): An effective way to block malicious activity is to enable an Intrusion Detection/Prevention system on your Linux server. IDS/IPS can detect and block suspicious Nmap scans in real–time.
5. Block Source IP Using iptables: You can also block the source IP address of the Nmap scan using iptables rules.