论坛: 菜鸟乐园 标题: 竟然开了71个端口,大家更告诉我都是做什么用的吗? 复制本贴地址    
作者: sunking [sunking]    论坛用户   登录
正在检测"202.102.??.??" ...
[202.102.??.??]: 正在检测"开放端口" ...
[202.102.??.??]: 端口25开放: SMTP, Simple Mail Transfer Protocol
[202.102.??.??]: 端口21开放: FTP (Control)
[202.102.??.??]: 端口53开放: domain, Domain Name Server
[202.102.??.??]: 端口52开放: xns-time, XNS Time Protocol
[202.102.??.??]: 端口54开放: xns-ch, XNS Clearinghouse
[202.102.??.??]: 端口19开放: Character Generator
[202.102.??.??]: 端口22开放: SSH, Remote Login Protocol
[202.102.??.??]: 端口24开放: Private mail-system
[202.102.??.??]: 端口23开放: Telnet
[202.102.??.??]: 端口55开放: ISI Graphics Language
[202.102.??.??]: 端口59开放: Private file service
[202.102.??.??]: 端口56开放: XNS Authentication
[202.102.??.??]: 端口18开放: Message Send Protocol
[202.102.??.??]: 端口60开放: Unassigned
[202.102.??.??]: 端口61开放: NI MAIL
[202.102.??.??]: 端口20开放: FTP (Data)
[202.102.??.??]: 端口57开放: Private terminal access
[202.102.??.??]: 端口58开放: XNS Mail
[202.102.??.??]: 端口62开放: ACA Services
[202.102.??.??]: 端口63开放: Unassigned
[202.102.??.??]: 端口64开放: Communications Integrator (CI)
[202.102.??.??]: 端口65开放: TACACS-Database Service
[202.102.??.??]: 端口66开放: Oracle SQL*NET
[202.102.??.??]: 端口67开放: Bootstrap Protocol Server
[202.102.??.??]: 端口69开放: Trivial File Transfer
[202.102.??.??]: 端口68开放: Bootstrap Protocol Client
[202.102.??.??]: 端口71开放: Remote Job Service
[202.102.??.??]: 端口70开放: Gophergopher
[202.102.??.??]: 端口73开放: Remote Job Service
[202.102.??.??]: 端口75开放: any private dial out service
[202.102.??.??]: 端口74开放: Remote Job Service
[202.102.??.??]: 端口77开放: any private RJE service
[202.102.??.??]: 端口76开放: Distributed External Object Store
[202.102.??.??]: 端口78开放: vettcpvettcp
[202.102.??.??]: 端口82开放: XFER Utility
[202.102.??.??]: 端口79开放: Finger server
[202.102.??.??]: 端口81开放: HOSTS2 Name Server
[202.102.??.??]: 端口80开放: HTTP, World Wide Web
[202.102.??.??]: 端口83开放: MIT ML Device
[202.102.??.??]: 端口86开放: Micro Focus Cobol
[202.102.??.??]: 端口84开放: Common Trace Facility
[202.102.??.??]: 端口72开放: Remote Job Service
[202.102.??.??]: 端口85开放: MIT ML Device
[202.102.??.??]: 端口87开放: Private terminal link
[202.102.??.??]: 端口90开放: DNSIX Securit Attribute Token Map
[202.102.??.??]: 端口89开放: SU/MIT Telnet Gateway
[202.102.??.??]: 端口88开放: Kerberos
[202.102.??.??]: 端口110开放: Pop3, Post Office Protocol - Version 3
[202.102.??.??]: 端口91开放: MIT Dover Spooler
[202.102.??.??]: 端口93开放: Device Control Protocol
[202.102.??.??]: 端口92开放: Network Printing Protocol
[202.102.??.??]: 端口94开放: Tivoli Object Dispatcher
[202.102.??.??]: 端口3128开放: [Unknown service]
[202.102.??.??]: 端口3389开放: Windows 2000 remote admin
[202.102.??.??]: 端口5000开放: Windows XP UPNP
[202.102.??.??]: 端口7002开放: afs3-prserver users & groups database
[202.102.??.??]: 端口7001开放: afs3-callback callbacks to cache managers
[202.102.??.??]: 端口7000开放: afs3-fileserver file server itself
[202.102.??.??]: 端口7003开放: afs3-vlserver volume location database
[202.102.??.??]: 端口7004开放: afs3-kaserver AFS/Kerberos authentication service
[202.102.??.??]: 端口7005开放: afs3-volser volume managment server
[202.102.??.??]: 端口7008开放: afs3-update server-to-server updater
[202.102.??.??]: 端口7007开放: afs3-bos basic overseer process
[202.102.??.??]: 端口7006开放: afs3-errors error interpretation service
[202.102.??.??]: 端口7010开放: ups-online onlinet uninterruptable power supplies
[202.102.??.??]: 端口7009开放: afs3-rmtsys remote cache manager service
[202.102.??.??]: 端口8010开放: Wingate
[202.102.??.??]: 端口8080开放: Proxy server
[202.102.??.??]: 端口8181开放: IMail
[202.102.??.??]: 端口443开放: HttpS, Secure HTTP
[202.102.??.??]: 端口139开放: NETBIOS Session Service
[202.102.??.??]: "开放端口"扫描完成, 发现 71.
[202.102.??.??]: 正在检测"CGI漏洞" ...
[202.102.??.??]: 发现 CGI漏洞: /null.ida
[202.102.??.??]: 发现 CGI漏洞: /scripts/samples/search/qsumrhit.htw
[202.102.??.??]: 发现 CGI漏洞: /iissamples/exair/search/qfullhit.htw
[202.102.??.??]: 发现 CGI漏洞: /scripts/samples/search/qfullhit.htw
[202.102.??.??]: 发现 CGI漏洞: /iissamples/exair/search/qsumrhit.htw
[202.102.??.??]: 发现 CGI漏洞: /iishelp/iis/misc/iirturnh.htw
[202.102.??.??]: 发现 CGI漏洞: /iissamples/issamples/oop/qsumrhit.htw
[202.102.??.??]: 发现 CGI漏洞: /iissamples/issamples/oop/qfullhit.htw
[202.102.??.??]: 发现 CGI漏洞: /null.idq
[202.102.??.??]: 发现 CGI漏洞: /abczxv.htw
[202.102.??.??]: 发现 CGI漏洞: /index.jsp
[202.102.??.??]: 发现 CGI漏洞: /file/index.jsp
[202.102.??.??]: 发现 CGI漏洞: /servlet/SessionServlet
[202.102.??.??]: 发现 CGI漏洞: /."./."./winnt/win.ini%20.php3
[202.102.??.??]: 发现 CGI漏洞: /phorum/plugin/replace/admin.php
[202.102.??.??]: 发现 CGI漏洞: /b2/b2-include/b2edit.showposts.php
[202.102.??.??]: 发现 CGI漏洞: /phorum/admin/actions/del.php
[202.102.??.??]: 发现 CGI漏洞: /filemanager/filemanager_forms.php
[202.102.??.??]: 发现 CGI漏洞: /phorum/plugin/replace/plugin.php
[202.102.??.??]: "CGI漏洞"扫描完成, 发现 19.
[202.102.??.??]: 正在检测"IIS漏洞" ...
[202.102.??.??]: 正在检测"HTTP重定向错误页面" ...
[202.102.??.??]: 正在检测"IIS漏洞" ...
[202.102.??.??]: "IIS漏洞"扫描完成.
[202.102.??.??]: 扫描全部完成.


地主 发表时间: 04-05-11 19:12

回复: reek [reek]   论坛用户   登录
这是xp系统
不过也真是厉害 开了那么多端口  牛人

B1层 发表时间: 04-05-11 22:35

回复: cnfans [cnfans]   论坛用户   登录
我只知道
21:FTP
23:Telnet
80:万维网服务(HTTP)
3389:远程桌面
110:POP3
139:NetBios Service

B2层 发表时间: 04-05-11 22:45

回复: uncracker [uncracker]   论坛用户   登录
没遇到过这样的机器

B3层 发表时间: 04-05-12 08:00

回复: goomoo [goomoo]   论坛用户   登录
用什么工具扫描的啊?

B4层 发表时间: 04-05-12 11:05

回复: wangsong [wangsong]   论坛用户   登录
可能是密罐大家小心

B5层 发表时间: 04-05-12 13:41

回复: sunking [sunking]   论坛用户   登录
不可能是蜜罐吧
大家看看http://www.cnlife.com我用X-SCAN扫的

B6层 发表时间: 04-05-12 17:44

回复: abctm [abctm]   版主   登录
给别人的端口映射把

B7层 发表时间: 04-05-12 18:28

论坛: 菜鸟乐园

20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon

粤ICP备05087286号