Skip to content

nmap 7.97 crash: DNS queries to unrelated DNS server #3130

Closed
@sausix

Description

@sausix

Describe the bug
nmap -sn 192.168.60.0/22 does not yield any results.
But nmap -sn -n 192.168.60.0/22 does.

To Reproduce
Windows. Two network adapters configured. Internet sharing active and working.
Adapter 1: Private network interface on static ip. Without gateway or DNS.
Adapter 2: A regular network interface on DHCP which gets DNS, IP and gateway.
Scan the subnet on the private adapter: nmap -sn 192.168.60.0/22

Expected behavior
Whatever the unrelated DNS server replies about the unknown hosts nmap should not skip all successful ping results.

Version info (please complete the following information):

  • OS: Windows 11 Pro 10.0.26100 Build 26100
  • Output of nmap --version:
Nmap version 7.97 ( https://nmap.org )
Platform: i686-pc-windows-windows
Compiled with: nmap-liblua-5.4.7 openssl-3.0.16 nmap-libssh2-1.11.1 nmap-libz-1.3.1 nmap-libpcre2-10.45 Npcap-1.82 nmap-libdnet-1.18.0 ipv6
Compiled without:
Available nsock engines: iocp poll select
  • Output of nmap --iflist
Starting Nmap 7.97 ( https://nmap.org ) at 2025-06-08 22:22 +0200
************************INTERFACES************************
DEV  (SHORT) IP/MASK                      TYPE     UP   MTU   MAC
unk0 (unk0)  fe80::a5f9:784d:8080:1b42/64 other    down 65535
unk0 (unk0)  169.254.219.162/16           other    down 65535
eth0 (eth0)  fe80::757:b65c:adaf:6c2d/64  ethernet up   1500  8C:32:23:21:F4:9B
eth0 (eth0)  192.168.51.53/24             ethernet up   1500  8C:32:23:21:F4:9B
eth1 (eth1)  fe80::9e64:f02b:e691:37df/64 ethernet up   1500  8C:32:23:21:F4:9C
eth1 (eth1)  192.168.60.1/22              ethernet up   1500  8C:32:23:21:F4:9C
unk1 (unk1)  fe80::7cef:eb89:6d28:f6fd/64 other    down 1500
unk1 (unk1)  169.254.217.210/16           other    down 1500
unk2 (unk2)  fe80::49fc:c076:f361:46c5/64 other    down 1500
unk2 (unk2)  169.254.122.125/16           other    down 1500
unk3 (unk3)  fe80::a5f9:784d:8080:1b42/64 other    down 1500
unk3 (unk3)  169.254.13.96/16             other    down 1500
lo0  (lo0)   ::1/128                      loopback up   -1
lo0  (lo0)   127.0.0.1/8                  loopback up   -1

DEV    WINDEVICE
unk0   \Device\NPF_{09476A2E-A126-427F-973E-23987EE83CDE}
unk0   \Device\NPF_{09476A2E-A126-427F-973E-23987EE83CDE}
eth0   \Device\NPF_{2638A08E-ABAF-4D79-8712-98C0BB2D5000}
eth0   \Device\NPF_{2638A08E-ABAF-4D79-8712-98C0BB2D5000}
eth1   \Device\NPF_{ADEAB8D3-B945-4D4C-8C59-E740C0AF524C}
eth1   \Device\NPF_{ADEAB8D3-B945-4D4C-8C59-E740C0AF524C}
unk1   \Device\NPF_{A9374567-6601-458B-AB1B-8C93667A3798}
unk1   \Device\NPF_{A9374567-6601-458B-AB1B-8C93667A3798}
unk2   \Device\NPF_{61B66488-1E74-441C-B57E-10A0DA541C2F}
unk2   \Device\NPF_{61B66488-1E74-441C-B57E-10A0DA541C2F}
unk3   \Device\NPF_{DA889704-7299-4EE7-AC59-7C9ABBBE4549}
unk3   \Device\NPF_{DA889704-7299-4EE7-AC59-7C9ABBBE4549}
lo0    \Device\NPF_Loopback
lo0    \Device\NPF_Loopback
<none> \Device\NPF_{BA2E3B44-164B-4519-B916-6CAD4DF73947}
<none> \Device\NPF_{D90B47E4-84FC-4AB0-B9B7-1A9C0E613F75}
<none> \Device\NPF_{B27D59F0-7455-4340-B7AA-A01ABCC753D1}

**************************ROUTES**************************
DST/MASK                      DEV  METRIC GATEWAY
255.255.255.255/32            unk0 261
255.255.255.255/32            unk3 281
255.255.255.255/32            unk1 281
255.255.255.255/32            unk2 281
255.255.255.255/32            eth0 281
192.168.51.53/32              eth0 281
192.168.51.255/32             eth0 281
255.255.255.255/32            eth1 281
192.168.60.1/32               eth1 281
192.168.63.255/32             eth1 281
127.255.255.255/32            lo0  331
255.255.255.255/32            lo0  331
127.0.0.1/32                  lo0  331
192.168.51.0/24               eth0 281
192.168.60.0/22               eth1 281
127.0.0.0/8                   lo0  331
224.0.0.0/4                   unk0 261
224.0.0.0/4                   unk1 281
224.0.0.0/4                   unk3 281
224.0.0.0/4                   unk2 281
224.0.0.0/4                   eth0 281
224.0.0.0/4                   eth1 281
224.0.0.0/4                   lo0  331
0.0.0.0/0                     eth0 25     192.168.51.254
fe80::a5f9:784d:8080:1b42/128 unk0 261
fe80::9e64:f02b:e691:37df/128 eth1 281
fe80::a5f9:784d:8080:1b42/128 unk3 281
fe80::757:b65c:adaf:6c2d/128  eth0 281
fe80::7cef:eb89:6d28:f6fd/128 unk1 281
fe80::49fc:c076:f361:46c5/128 unk2 281
::1/128                       lo0  331
fe80::/64                     unk0 261
fe80::/64                     unk1 281
fe80::/64                     unk3 281
fe80::/64                     unk2 281
fe80::/64                     eth1 281
fe80::/64                     eth0 281
ff00::/8                      unk0 261
ff00::/8                      unk1 281
ff00::/8                      eth1 281
ff00::/8                      eth0 281
ff00::/8                      unk2 281
ff00::/8                      unk3 281
ff00::/8                      lo0  331

Additional context
Wireshark shows the ARP responses. nmap does not even show "host down" results.

nmap -sn -vv -d 192.168.60.0/22
Packet.dll present, library version 1.82
wpcap.dll present, library version: Npcap version 1.82, based on libpcap version 1.10.5
Starting Nmap 7.97 ( https://nmap.org ) at 2025-06-08 22:24 +0200
--------------- Timing report ---------------
  hostgroups: min 1, max 100000
  rtt-timeouts: init 1000, min 100, max 10000
  max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
  parallelism: min 0, max 0
  max-retries: 10, host-timeout: 0
  min-rate: 0, max-rate: 0
---------------------------------------------
Initiating ARP Ping Scan at 22:24
Scanning 1023 hosts [1 port/host]
Packet capture filter (device eth1): arp and arp[18:4] = 0x8C322321 and arp[22:2] = 0xF49C
Bogus rttdelta: 2958782 (srtt 252218) ... ignoring
Bogus rttdelta: 2745782 (srtt 252218) ... ignoring
Bogus rttdelta: 2750782 (srtt 252218) ... ignoring
Bogus rttdelta: 2751782 (srtt 252218) ... ignoring
Bogus rttdelta: 2705782 (srtt 252218) ... ignoring
Bogus rttdelta: 2753782 (srtt 252218) ... ignoring
Bogus rttdelta: 2747782 (srtt 252218) ... ignoring
Bogus rttdelta: 4701810 (srtt 221190) ... ignoring
Bogus rttdelta: 4701810 (srtt 221190) ... ignoring
Bogus rttdelta: 4702810 (srtt 221190) ... ignoring
Bogus rttdelta: 4700810 (srtt 221190) ... ignoring
Bogus rttdelta: 4700810 (srtt 221190) ... ignoring
Bogus rttdelta: 4669810 (srtt 221190) ... ignoring
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
Completed ARP Ping Scan at 22:24, 18.47s elapsed (1023 total hosts)
Overall sending rates: 108.60 packets / s, 4561.31 bytes / s.
mass_dns: Using DNS server 192.168.51.1
mass_dns: Using DNS server 192.168.51.1
Initiating Parallel DNS resolution of 1023 hosts. at 22:24

C:\Program Files (x86)\Nmap>

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions