use*_*848 5 firewall networking
我在托管上使用虚拟服务器。有 Ubuntu 12.04 LTS。我正在建立矿池网站和地层挖掘。我可以port 3333通过服务器上的minrd连接到层,但不能像我一样从外部 cpu 矿机连接。这是我在尝试此命令时得到的列表netstat -ntlp | grep LISTEN:
root@vm9807:~# netstat -ntlp | grep LISTEN
tcp 0 0 0.0.0.0:3334 0.0.0.0:* LISTEN 1757/python
tcp 0 0 127.0.0.1:10025 0.0.0.0:* LISTEN 1219/master
tcp 0 0 127.0.0.1:3306 0.0.0.0:* LISTEN 987/mysqld
tcp 0 0 0.0.0.0:587 0.0.0.0:* LISTEN 1219/master
tcp 0 0 127.0.0.1:11211 0.0.0.0:* LISTEN 1121/memcached
tcp 0 0 0.0.0.0:8332 0.0.0.0:* LISTEN 1721/python
tcp 0 0 0.0.0.0:8333 0.0.0.0:* LISTEN 1757/python
tcp 0 0 0.0.0.0:32333 0.0.0.0:* LISTEN 1686/betacoind
tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN 969/dovecot
tcp 0 0 0.0.0.0:143 0.0.0.0:* LISTEN 969/dovecot
tcp 0 0 0.0.0.0:9333 0.0.0.0:* LISTEN 1678/litecoind
tcp 0 0 31.31.75.108:53 0.0.0.0:* LISTEN 999/named
tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 999/named
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 856/sshd
tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 1219/master
tcp 0 0 127.0.0.1:953 0.0.0.0:* LISTEN 999/named
tcp 0 0 0.0.0.0:4190 0.0.0.0:* LISTEN 969/dovecot
tcp 0 0 127.0.0.1:7777 0.0.0.0:* LISTEN 1117/python
tcp 0 0 0.0.0.0:993 0.0.0.0:* LISTEN 969/dovecot
tcp 0 0 0.0.0.0:995 0.0.0.0:* LISTEN 969/dovecot
tcp 0 0 0.0.0.0:3333 0.0.0.0:* LISTEN 1721/python
tcp6 0 0 :::32332 :::* LISTEN 1686/betacoind
tcp6 0 0 :::32333 :::* LISTEN 1686/betacoind
tcp6 0 0 :::80 :::* LISTEN 1319/apache2
tcp6 0 0 :::9333 :::* LISTEN 1678/litecoind
tcp6 0 0 :::53 :::* LISTEN 999/named
tcp6 0 0 :::9334 :::* LISTEN 1678/litecoind
tcp6 0 0 :::22 :::* LISTEN 856/sshd
tcp6 0 0 ::1:953 :::* LISTEN 999/named
root@vm9807:~#
Run Code Online (Sandbox Code Playgroud)
我的虚拟服务器主机没有阻止任何端口,我没有使用任何防火墙。请帮帮我谢谢x
只需从另一台计算机使用nmap- 这将扫描并显示您计算机上的所有开放端口,以及可以从中获取的硬件和软件信息。
赶紧跑:
sudo nmap -A -O IP_ADDRESS
Run Code Online (Sandbox Code Playgroud)
或获取更多信息输出:
sudo nmap -A -O -vvv IP_ADDRESS
Run Code Online (Sandbox Code Playgroud)
您可能需要sudo apt-get install nmap先安装它。至少,这是 Ubuntu/Debian 机器的命令。
例如,如果我运行这个:
sudo nmap -A -O -vvv 192.168.1.6
Run Code Online (Sandbox Code Playgroud)
表明:
Starting Nmap 6.40 ( http://nmap.org ) at 2013-12-22 16:32 GMT
Nmap scan report for 192.168.1.6
Host is up (0.00037s latency).
Not shown: 991 filtered ports
PORT STATE SERVICE VERSION
21/tcp closed ftp
22/tcp open ssh
2049/tcp closed nfs
MAC Address: **:**:**:**:**:** (MANUFACTURER-OF-NETWORKING-HARDWARE)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 - 2.6.27
Network Distance: 1 hop
TRACEROUTE
HOP RTT ADDRESS
1 0.37 ms 192.168.1.6
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.24 seconds
Run Code Online (Sandbox Code Playgroud)
这表明它当前仅ssh开放访问 端口 上的端口 ,22和端口可用,但关闭和端口上的端口。ftpnfs212049
是的,我已经从上述输出中编辑了秘密信息 - 包括MAC Address: **:**:**:**:**:** (MANUFACTURER-OF-NETWORKING-HARDWARE)
希望这可以帮助