Upload Nmap Output
Normal text .nmap files only. Parsing stays in this browser.
Drop scan files here
Upload one or more .nmap files from normal text output. Host, port, NSE, CVE, and OS details are parsed instantly.
Target Intake Console
Parse scope, command metadata, and local data controls.
Latest upload
No scan uploaded
Waiting for first scan
Nmap version
Unknown
Command
Command metadata unavailable
Stored scans
0
Reset removes browser-stored scan history.
Data controls
Clear old uploads before starting a fresh review.
Scope is clean until scan data lands
Prioritize exposed services, inspect raw NSE evidence, and reset the workspace before a fresh engagement.
Reachable hosts
0
0 unreachable in scope
Unreachable hosts
0
Hosts reported down
Exposure surface
0
No service is most common
Parser status
idle: waiting_for_upload
0 CVEs indexed
Graph & Analytics
Filtered operational signals for exposure, impact, and evidence priority.
Risk pressure
0
Critical + high findings
Most exposed service
none
0 open ports
Top host impact
none
0 findings
CSV report rows
11
Summary and top signals
Severity Signal
Findings grouped by inferred risk level.
Service Exposure
Services with the widest open-port footprint.
Host Impact Matrix
Findings and open ports per highest-risk host.
Reachability Split
Reachable and unreachable hosts in the current scope.
Top CVEs
Most repeated identifiers.
NSE Scripts
Most common finding sources.
Top Ports
Most frequent exposed ports.
Risk Queue
Hosts ranked by findings and exposure.
Critical Findings
0
Unreachable Hosts
0
Common CVEs
0