hello..

nmap options :

nmap operating system match scan for googles dns
nmap -O 8.8.8.8
Scan all 65535 ports:
nmap -p- 192.168.1.1
TCP SYN and UDP scan for all ports
nmap -sS -sU -PN -p 1-65535 192.168.0.164
Scan for UDP DDOS reflectors ? try
nmap -sU -A -PN -n -pU:19,53,123,161 -script=ntp-monlist,dns-recursion,snmp-sysdescr 192.168.1.0/24

ssh options :
ssh 10.0.1.1 "tcpdump -i pppoe-wan -w - 'not port 2'" | wireshark -k -i - <-> wireshark trough ssh with pipe , w big packets
ssh 10.0.1.1 "tcpdump -i pppoe-wan -s0 -w - 'not port 2'" | wireshark -k -i - <-> wireshark trough ssh with pipe , with small packets


manual ip traffic inspection @ nix hosts
ip_conntrack for & ipv4 nf_conntrack for ipv6
cat /proc/net/ip_conntrack
cat /proc/net/nf_conntrack