137端口是NetBIOS Name Service,向局域网或互联网上的某台计算机的137端口发送一个请求,就可以获取该计算机的名称、注册用户名,以及是否安装主域控制器、IIS是否正在运行等信息,不过这里已经被comodo拦截了,没什么问题的,lz可以关闭137端口
你通过局域网是否要用网上邻居传输文件,如果要,就不要关闭此端口,如果不需要通过网上邻居传输文件就关闭137,138端口
服务器的UDP,TCP端口的扫描工具 - nmap (UDP扫描)
今天我新加坡的同事问我如何判别服务器的UDP的5060端口是否打开的,及对SIP协议打开端口的分析.
因 Telnet + IP + 端口号是对TCP的判断,故使用第三方软件nmap.
从 http://nmap.org 下载安装了Window7版,测试了一下感觉真不错.
Target: 填IP
Profile: Intense scan plus UDP
Nmap Output:
PORT STATE SERVICE VERSION
7/tcp filtered echo
19/tcp filtered chargen
22/tcp open ssh OpenSSH 4.5 (protocol 1.99)
|_sshv1: Server supports SSHv1
| ssh-hostkey: 1024 fd:fc:c7:b2:38:7a:06:b1:c7:91:7c:23:bd:43:f2:10 (RSA1)
| 1024 4b:4f:81:67:5c:73:db:64:12:3f:8e:5c:8a:44:e6:38 (DSA)
|_2048 0a:7a:eb:fc:d9:06:c9:c1:81:5a:9e:e7:2a:ba:40:06 (RSA)
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
443/tcp open ssl/https?
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
4444/tcp filtered krb524
5060/tcp open tcpwrapped
5061/tcp open ssl/sip-tls?
10000/tcp open tcpwrapped
10001/tcp open ssl/unknown
69/udp filtered tftp
135/udp filtered msrpc
136/udp filtered profile
137/udp filtered netbios-ns
138/udp filtered netbios-dgm
139/udp filtered netbios-ssn
161/udp open snmp SNMPv1 server (public)
| snmp-sysdescr: CXC8
|_ System uptime: 3 days, 2:09:21.00 (26696100 timeticks)
445/udp filtered microsoft-ds
1433/udp filtered ms-sql-s
1434/udp filtered ms-sql-m
5060/udp open sip (SIP end point; Status: 404 Not found)
8900/udp open sip (SIP end point; Status: 404 Not found)
10000/udp open sip (SIP end point; Status: 404 Not found)
Ports/Hosts:
#wiki-windows