An external load balancer decides which server answers each request, hiding internal networks and spreading traffic to keep services online. To see it clearly, you need the right tools. Nmap is one of them. When used against an external load balancer, Nmap can reveal open ports, service banners, and routing behavior without touching backend nodes directly.
Start with a basic TCP scan against the balancer’s public IP:
nmap -Pn -p 80,443 <load-balancer-ip>
This shows which front-end services are exposed. To dig deeper, use version detection and script scanning:
nmap -sV -sC <load-balancer-ip>
These flags tell Nmap to probe services for metadata. Sometimes, you’ll find that the external load balancer terminates TLS. Nmap’s SSL scripts (--script ssl-cert,ssl-enum-ciphers) can identify certificate details and cipher support. This is critical for confirming security posture.