🌐 Port Scanner
Simulated port scanner for security testing and network reconnaissance. For educational and authorized testing only!
⚠️ Legal Disclaimer
This is a simulated port scanner for educational purposes only.
Real port scanning should only be performed on systems you own or have explicit permission to test.
Unauthorized port scanning may be illegal in your jurisdiction.
📚 Common Ports Reference
Web Services:
• 80 - HTTP (Hypertext Transfer Protocol)
• 443 - HTTPS (HTTP Secure)
• 8080 - HTTP Alternate
• 8443 - HTTPS Alternate
• 3000 - Node.js Development Server
• 8000 - Python HTTP Server
Remote Access:
• 22 - SSH (Secure Shell)
• 23 - Telnet
• 3389 - RDP (Remote Desktop Protocol)
• 5900 - VNC (Virtual Network Computing)
• 5985 - WinRM HTTP
• 5986 - WinRM HTTPS
Mail Services:
• 25 - SMTP (Simple Mail Transfer Protocol)
• 110 - POP3 (Post Office Protocol)
• 143 - IMAP (Internet Message Access Protocol)
• 465 - SMTPS (SMTP Secure)
• 587 - SMTP Submission
• 993 - IMAPS (IMAP Secure)
• 995 - POP3S (POP3 Secure)
Database Services:
• 1433 - Microsoft SQL Server
• 3306 - MySQL
• 5432 - PostgreSQL
• 1521 - Oracle Database
• 27017 - MongoDB
• 6379 - Redis
🛠️ Nmap Command Generator
Common Nmap Commands:
• nmap -sS target - SYN scan (stealth)
• nmap -sT target - TCP connect scan
• nmap -sU target - UDP scan
• nmap -sV target - Version detection
• nmap -O target - OS detection
• nmap -A target - Aggressive scan (OS, version, scripts)
• nmap -p- target - Scan all ports
• nmap --top-ports 1000 target - Scan top 1000 ports
💰 Support Development
This toolkit is 100% free. If it helped you, consider donating in USDT to support future development.
USDT (TRC20):
TACpbL6iRczHYzE4sJCKfHB3Npw8NoQv37
TACpbL6iRczHYzE4sJCKfHB3Npw8NoQv37
