Forum Discussion

PerkyflyNCE's avatar
PerkyflyNCE
Seasoned Rookie
11 hours ago

Strange 'nmap' behavior after recent EA App / BF6 update — an interference?

29 January 2026 (UTC +09 hours)

Hi everyone — I’m running into a very unusual issue on my Windows PC that seems to have started after I launched the Battlefield 6 launcher/EA App, and I’m hoping to get input from others who might have seen something similar.

What’s happening

I use nmap on Windows for legitimate network scanning/testing, and recently I noticed very odd behavior:

I uninstalled and reinstalled nmap completely.

When I run simple nmap commands in Command Prompt, they work as expected.

However, all more complex scan options that use advanced timing, tuning, and raw packet operations fail with the usual nmap banner and then stop working — but the same nmap installation works perfectly when launched through Zenmap (the GUI).

The error or behavior looks like the normal Windows nmap banner (“Platform: i686‑pc‑windows‑windows …”), but the scans just don’t proceed unless run through the Zenmap GUI.

This suggests to me that there might be a difference in how raw network traffic or advanced socket operations are being handled in the CLI versus the GUI environment.

Timeline

I believe this behavior began after a Battlefield 6 launcher / EA App update on January 28, 2026.

I haven’t found official BF6 patch notes for that date, but there are community reports of silent anti‑cheat or EA App updates around the same time.

Why I’m posting here

I’m wondering whether the EA App or EA Javelin Anti‑Cheat might be doing something at the system/network stack level that affects how tools like nmap behave — especially those that rely on raw packets or advanced scanning features.

I know that EA’s Javelin Anti‑Cheat runs at kernel level and requires Secure Boot/TPM for deeper OS integration, and that it can interfere with or block certain software it deems suspicious — for example, VPNs and other networking software are sometimes flagged or prevented from running alongside games that use Javelin.

What I’d like to know

If anyone from EA or in the community can help clarify:

Does the Battlefield 6 launcher / EA App install or update any networking‑related drivers, services, or filters that could affect raw socket operations in Windows?

If so, what are the names and locations of those components (e.g., service or driver names, install paths)?

Is there any known interaction between Javelin Anti‑Cheat and packet‑level networking tools like nmap that might explain the difference between Command Prompt and Zenmap behavior?

Thanks in advance — happy to provide additional logs or specific command outputs if that would help.

2 Replies

  • EA_Leeuw's avatar
    EA_Leeuw
    Icon for Community Manager rankCommunity Manager
    4 hours ago

    PerkyflyNCE​ 

    Thanks for following up and owning the root cause -- that clarification helps a lot.

    For anyone reading this later: EA app / Battlefield do not install networking drivers or packet-filter components that would selectively affect CLI tools like nmap while leaving Zenmap functional. Zenmap invokes the same nmap engine, so a driver-level or kernel-level conflict would impact both.

    The behavior described lines up with Windows IPv6 / transition-tunnel configuration changes (Teredo / 6to4 / ISATAP + adapter-level IPv6 disablement), which can break raw socket operations and also cause unrelated symptoms like SMTP rejection.

    In short: this wasn’t related to the EA app, Battlefield, or anti-cheat -- it was a local network stack configuration issue that happened to surface around the same time.

    Appreciate you posting the resolution; it’ll save someone else a lot of time. :)

  • PerkyflyNCE's avatar
    PerkyflyNCE
    Seasoned Rookie
    4 hours ago

    [UPDATE]

    I am embarrassed by what I wrote here earlier regarding Nmap behavior.
    I found the cause and solution. 

    Zenmap works, but Nmap stops working and generates a set of error messages.

    Nmap version 7.98 (https://nmap.org)
    Platform: i686-pc-windows-windows
    Compiled with: nmap-liblua-5.4.8, openssl-3.0.17, nmap-libssh2-1.11.1, nmap-libz-1.3.1, nmap-libpcre2-10.45, Npcap-1.83, nmap-libdnet-1.18.0, ipv6.
    Compiled without: Available nsock engines: iocp poll select. 

    I should have configured the registry entry for IPv6 by adding "DisabledComponents" as a REG_DWORD with the value 0x20 to the following path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters.

    However, I performed the following syntax in Command Prompt:

    •     netsh interface teredo set state disabled
    •     netsh interface ipv6 6to4 set state disabled
    •     netsh interface ipv6 isatap set state disabled

    Then, I disabled "Internet Protocol Version 6" on the network adapter.

    As a result, Nmap encounters an issue, and two email clients on my PC are unable to send outgoing messages to any destination. My internet provider's SMTP server returns a spam notification, rejecting further processing.

    Nmap now works flawlessly. Thank you for understanding my mistake.

Featured Places

Node avatar for Battlefield 6 General Discussion

Battlefield 6 General Discussion

Join the Battlefield 6 community to get game information and updates, talk tactics and share Battlefield moments.Latest Activity: 24 minutes ago
9,096 Posts