Overview
Rate limit options control how fast scan4all sends packets and how many concurrent workers process scan results. Proper rate limiting prevents network congestion, avoids triggering security systems, and optimizes scan performance.Rate Limit Configuration
Number of general nclruner worker threads.Controls the concurrency level for processing scan results and performing subsequent analysis (service detection, HTTP checks, vulnerability scanning).Range: 1-10000 (practical range: 10-100)Examples:
Number of packets to send per second.Controls the speed of the port scanning phase. This is the primary rate limiting mechanism for network traffic.Default values by scan type:
- SYN scan: 1000 packets/second
- CONNECT scan: 2000 packets/second (set internally)
Choosing the Right Rate
Network Type Recommendations
| Environment | Recommended Rate | Worker Threads |
|---|---|---|
| Internet (Default) | 500-1000 | 20-25 |
| Local Network (LAN) | 2000-5000 | 30-50 |
| Localhost | 5000-10000 | 50-100 |
| Unstable/Slow Network | 100-500 | 10-20 |
| Stealth Mode | 50-200 | 5-10 |
Scan Scope Considerations
Small Target Set (1-10 hosts)
Medium Target Set (10-100 hosts)
Large Target Set (100+ hosts)
Performance Tuning
Maximum Speed (Local Testing)
Stealth Mode (Avoid Detection)
Production Safe (Minimal Impact)
High-Speed LAN Scan
Impact of Rate Limits
Too High
- Packet loss
- Incomplete results
- Network congestion
- IDS/IPS triggers
- Firewall blocks
- Inaccurate port states
Too Low
- Very slow scans
- Extended completion times
- Resource underutilization
- Timeout on large scans
Just Right
- Reliable results
- Acceptable completion time
- Minimal network impact
- No packet loss
- Below detection thresholds
Rate Limiting Best Practices
- Start Conservative: Begin with lower rates and increase if needed
- Monitor Performance: Use
-statsto watch scan progress - Test First: Run small test scans to find optimal rates
- Consider Target: Adjust based on target infrastructure
- Match Network: Higher rates for LANs, lower for Internet
- Use Verification: Enable
-verifywith high rates to confirm results - Respect Resources: Don’t overwhelm target systems
Calculating Scan Time
Estimated time = (Number of hosts × Ports per host) / Rate Example:- Targets: 10 hosts
- Ports: 1000
- Rate: 1000 packets/second
- Time: (10 × 1000) / 1000 = 10 seconds (port scan phase only)
Total scan time includes port scanning, service detection, HTTP analysis, and vulnerability checks. Port scanning is typically 30-50% of total time.
Common Scenarios
Fast Reconnaissance
Thorough Security Audit
Continuous Monitoring
Bug Bounty Scanning
Troubleshooting
Scan Too Slow
- Increase
-ratevalue - Increase
-cworker threads - Reduce number of ports with
-tp - Check network latency
Incomplete Results
- Decrease
-ratevalue - Decrease
-cworker threads - Increase
-timeout - Enable
-verifyflag - Increase
-retries
System Overload
- Decrease
-cworker threads - Decrease
-ratevalue - Scan fewer hosts simultaneously
- Increase
-warm-up-time
Related Options
- Optimization Options - Additional tuning with timeouts and retries
- Debug Options - Monitor performance with
-stats