Naabu

A fast, lightweight port scanner built for attack surface discovery with SYN, CONNECT, and UDP scanning plus native Nmap and ProjectDiscovery toolchain integration.

Developer

ProjectDiscovery

verified_user
Visit Official Site open_in_new

description Technical Dossier

Naabu is a high-performance port enumeration tool developed by ProjectDiscovery that sends asynchronous SYN, CONNECT, or UDP packets to target hosts and collects replies to identify which ports are open. Its core scanning engine operates at the packet level using raw sockets for SYN mode, which allows it to achieve substantially higher throughput than connection-based scanners while remaining lightweight on system resources. It accepts input in multiple formats — individual IPs, hostnames, CIDR ranges, and ASN notation — making it well-suited for large-scale attack surface enumeration.

What distinguishes Naabu within the port-scanning space is its position inside the broader ProjectDiscovery ecosystem. It is designed as a composable, pipeline-friendly tool: output pipes directly into other tools such as httpx (HTTP probing) or Nuclei (vulnerability scanning), allowing practitioners to build end-to-end recon chains. The Nmap integration lets Naabu act as a fast port-discovery first pass, with Nmap invoked only on confirmed open ports for detailed service fingerprinting — a workflow that dramatically reduces total scan time versus running Nmap alone against all ports.

Naabu also includes several operationally useful refinements: automatic IP deduplication when scanning DNS names that resolve to multiple records, CDN/WAF IP detection to avoid full port scanning of cloud infrastructure, passive enumeration via Shodan’s InternetDB for zero-traffic reconnaissance, and IPv6 support. It is packaged in Kali Linux’s official repositories and as a Docker image, reflecting its adoption as a standard recon tool in the penetration testing and bug bounty communities.

speed Multi-Mode Port Scanning

Supports SYN (raw socket), CONNECT (unprivileged), and UDP probe scanning, giving flexibility for different access levels and scan types.

cloud_off CDN/WAF-Aware Scanning

Automatically detects CDN and WAF IPs (Cloudflare, Akamai, Incapsula, Sucuri) and limits those hosts to ports 80/443 to reduce noise.

share Nmap Integration

Discovered open ports pipe directly into Nmap for deep service/version fingerprinting, making it a natural first stage in a two-pass scan pipeline.

visibility_off Passive Enumeration

Queries the Shodan InternetDB API for zero-traffic passive port reconnaissance alongside active probing for comprehensive coverage.

Distribution Model

Open Source

Free community edition available.
Enterprise support on request.

trending_up Popularity

Low 45 / 100 High

settings_suggest Deployment Complexity

Low 18 / 100 High

engineering Technical Difficulty

Low 20 / 100 High
Naabu visualization
radar

Scan Modes

SYN / CONNECT / UDP

Language

GO

Integration

NMAP, NUCLEI

License

MIT