mirror of
https://github.com/nmap/nmap.git
synced 2025-12-15 20:29:03 +00:00
bd1b2ccf981520f5dd62f99d0b8c96a44f7dc4e9
This is the way it worked for IPv6 (with the exception of a slash in an IPv6 address, which has also been made into a warning)--warn about the bogus specification and carry on with the other targets. The main use for this is preventing the whole scan from being stopped when a bad specification appears in a hostgroup after the first.
Here is some documentation for Nmap, but these files are much less comprehensive than what you'll find at the actual Nmap documentation site ( http://nmap.org ).
Description
Languages
C
37.8%
Lua
28.1%
C++
16.7%
Shell
5.8%
Python
4.2%
Other
7.2%