Here is the list of most popular nmap commands that Dhound team use.
This cheatsheet first of all for us during security analysis, but you can also find here something interesting.
If you run nmap on linux, don't forget to run it with root permissions.
nmap -Pn dhound.io
nmap -p 1-65535 -Pn -sV -sS -T4 dhound.io
nmap -Pn -p 22,80,443 dhound.io
nmap -p 22 --open -sV 192.168.10.0/24
nmap --traceroute -p 80 dhound.io
nmap --traceroute --script traceroute-geolocation.nse -p 80 dhound.io
nmap --script=asn-query dhound.io
nmap --script ssl-cert -p 443 -Pn dhound.io
nmap --script ssl-enum-ciphers -p 443 dhound.io
nmap --script ftp-brute --script-args userdb=users.txt,passdb=passwords.txt -p 21 -Pn dhound.io
nmap --script http-brute -script-args http-brute.path=/evifile-bb-demo,userdb=users.txt,passdb=passwords.txt -p 80 -Pn dhound.io
nmap -sV --script http-wordpress-brute --script-args userdb=users.txt,passdb=passwords.txt,http-wordpress-brute.hostname=dhound.io,http-wordpress-brute.threads=10 -p 80 dhound.io
#use other tools like ncrack
nmap --script default,safe -Pn dhound.io
nmap --script vuln -Pn dhound.io
nmap --script dos -Pn dhound.io
nmap --script exploit -Pn dhound.io