Current location - Quotes Website - Team slogan - How to view network ports
How to view network ports
Question 1: How do I check my network port? Start/Program/Accessories/Command Prompt /NETSTAT -NA/Enter, check the ports that your machine is currently using, and then introduce them according to the following ports:

Some ports must be opened by system services and cannot be closed casually. You may have stopped the process, but it will be re-established. You compare the following port knowledge. If it is not a dangerous port, it can be ignored.

Public computer port interpretation

We often see "ports" like 135, 137, 139, 443 in various technical articles, but what are these ports for? Will it bring potential threats to our computers? How many ports are useful? If you want to know, come with me.

Port: 0

Service: reserved

Description: Usually used to analyze the operating system. This method is effective because "0" is an invalid port in some systems, and when you try to connect it to a port that is usually closed, it will produce different results. A typical scan uses the IP address 0.0.0.0, sets the ACK bit and broadcasts it in the Ethernet layer.

Port: 1

Service: tcpmux

Description: This means that someone is looking for SGI Irix machine. Irix is the main provider of tcpmux, which is turned on by default in this system. Irix machine contains several default password-free accounts when it is released, such as: IP, guest UUCP, NUUCP, DEMOS, TUTOR, DIAG, OUTOFBOX, etc. Many administrators forget to delete these accounts after installation. So hackers searched for tcpmux online and used these accounts.

Port: 7

Service: echo

Description: When searching for Fraggle amplifier, you can see many messages sent by people to X.X.X.0 and X.X.X.255.

Port: 19

Service: Character Generator

Description: This is a service that only sends characters. The UDP version will respond to packets containing junk characters after receiving UDP packets. When TCP connects, it sends a data stream containing junk characters until the connection is closed. Hackers can use IP spoofing to launch DoS attacks. Forge UDP packets between two chargen servers. Similarly, the Fraggle DoS attack will broadcast a packet with a forged victim IP to this port of the target address, and the victim will be overloaded in response to the data.

Port: 2 1

Service: FTP

Description: FTP server opens ports for uploading and downloading. The most common attacker is to find a way to open anonymous's FTP server. These servers have read-write directories. Trojan Doly Trojan, Fore, Stealth FTP, WebEx, WinCrash and blade runner open ports.

Port: 22

Service: Ssh

Description: The connection between TCP established by PcAnywhere and this port may be to find ssh. This service has many weaknesses. If configured in a specific mode, many versions that use the RSAREF library will have many loopholes.

Port: 23

Service: Telnet

Description: Remote login, the intruder is searching for the service of remote login UNIX. In most cases, scanning this port is to find the operating system running on the machine. And using other technologies, intruders will also find the password. Trojan mini Telnet server opens this port.

Port: 25

Service: SMTP

Description: The port opened by SMTP server is used to send mail. Intruders are looking for SMTP servers to send their spam. The intruder's account is closed, and they need to connect to a high-bandwidth email server and send simple information to different addresses. Trojan horse antigen, e-mail password sender, Haebu Coceda, Shtrilitz Stealth, WinPC and WinSpy all open this port.

Port: 3 1

Service: message authentication

Description: Trojan Master Park and Hacker Park open this port.

Port: 42

......& gt& gt

Question 2: [Network Configuration] How to check your own port number? You need to fill in the port when setting up the proxy server. This port number can be freely filled in on the server side, generally greater than 1024 and less than 65535. When the client uses the proxy server to surf the Internet, the port number must be the same as the port number set by itself on the proxy server.

Tomcat uses port 8080 by default, which can be changed by itself.

Generally, the port number of server-side software can be customized, as long as it is between 1024-65535, and it is not repeated. Each software sets the port number in a different way. Usually in the "Settings" interface.

If the client software wants to set the port number, it must be the same as the server software.

Question 3: How to check what port you use to surf the Internet? The next related detection software, Windows Process Manager, is recommended, and it can be used under the thunder by directly searching on dogs.

Question 4: How to check the host IP and network port? Check the host IP and network port as follows:

1, click the computer to start-run;

2. Enter cmd to enter the dos interface;

3. Enter ipconfig /all and press enter to view the host IP;

Op 4. Enter netstat to view the network port.

Question 5: How to find the network port of the computer? Find "Run" in the "Start" menu of the computer, click "Run", then enter "cmd", and enter "ping all" in the black box that pops up to see the network connection of each port of your computer.

Netstat: used to display statistical data related to IP, TCP, UDP and ICMP protocols, and generally used to check the network connection of each port of this machine.

If the datagram received by the computer sometimes leads to erroneous data deletion or failure, TCP/IP allows fault tolerance and can automatically retransmit the datagram. However, if the cumulative number of errors accounts for a considerable percentage of the received IP datagrams, or the number is increasing rapidly, you can use Netstat to find out the reasons for these situations.

Netstat s

This option can display the statistics of each protocol separately. If an application (such as a Web browser) runs slowly, or data such as web pages cannot be displayed, you can use this option to check the displayed information. You need to look carefully at the lines of statistical data, find the wrong keywords, and then determine the problem.

netstat r

Displays information about the routing table, similar to the information you will see later when using the route print command. In addition to displaying valid routes, it also displays currently valid connections.

Network statistics

Displays all valid connections that have been established.

Question 6: How to check the open network ports of this computer? Click "Start → Run" in turn, enter "cmd" and press enter to open the command prompt window. Type "netstat -a -n" at the command prompt, and then press Enter to view the port number and status of TCP and UDP connections displayed in digital form.

Network statistics-electronics -n -o -s-an

-a displays all active TCP connections and TCP and UDP ports that the computer listens to.

-e indicates the number of bytes and packets sent and received by Ethernet.

-n indicates that only the addresses and port numbers of all active TCP connections are displayed in digital form.

-o displays the active TCP connections, including the process ID(PID) of each connection.

-s indicates that statistics of various connections, including port numbers, are displayed by protocol.

-View all open ports

Question 7: How to check the IP and port of your computer? Start, run, enter cmd, enter, and then enter "ipconfig -all".

Question 8: How to check which network ports are open on your computer? Netstat -a can do it. Is this the wrong number-

-

C:\ Documents and Settings \ Administrator & gtnetstat/?

Displays protocol statistics and current TCP/IP network connections.

NETSTAT[-a][-b][-e][-n][-o][-p proto][-r][-s][-v][interval]

-a shows all connections and listening ports.

-b display.

Executable component. In some cases, executable components are known.

There are multiple independent components, and in these cases,

A series of components involved in creating a connection or listening port.

Be displayed. In this case, the executable component name

In [] at the bottom, at the top is the component it calls.

Wait until the TCP/IP part. Please note this option.

If you don't have enough permissions, it may take a long time.

It may fail.

-e Displays Ethernet statistics. This option can be used with-s.

Options are grouped together.

-n Displays the address and port number as numbers.

-o Displays the owning process ID associated with each connection.

-p proto shows the connection of the protocol specified by proto; Proto can be one of the following protocols

One: TCP, UDP, TCPv6 or UDPv6.

If you use the -s option to display statistics by protocol, proto can

Is one of the following protocols:

IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP or UDPv6.

-r displays the routing table.

-s displays statistics by protocol. By default, IP is displayed,

Statistical information of IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP and UDPv6;

The p option is used to specify a subset of the default cases.

When the -v option is used with the -b option, the information contained in is displayed.

This creates a connection or listening port for all executable components.

Component.

Interval redisplays the selected statistics between each display.

Pause interval (seconds). Press CTRL+C to stop the restart.

Show statistics. If omitted, netstat will display the current

Configuration information (displayed only once)

Question 9: How to check the occupied computer network ports and which ones are available? Run for 20 minutes-enter "cmd"-enter "netstat -ano" command. The "PID" column in the list is the port number, and the number with zero is not occupied.

Question 10: How to find out which network port is used by a certain software? If it's simple, start = run-cmd-enternetstat-naobv.

Of course, tools are the best.

Basic optimization tools are available.

Personally, I suggest that 360 security guards check directly.