Checking all open ports linux

3 ways to check open ports in Linux

In this blog post, we will discuss 3 ways to check open ports in Linux. We will be using the command line to do this, so if you are not familiar with that environment, don’t worry! We will walk you through everything.

Checking port status is an important task for system administrators and developers . By knowing which ports are open and which ones are closed, you can better diagnose and fix networking issues.

To check open ports in Linux, we can use three methods: the netstat command, the ss command, and the lsof command. Open the terminal and type in any command above with the right option. It will list all the open ports in Linux.

  • The netstat command is a network statistics utility that displays information about network connections, routing tables, and a number of network interface statistics.
  • The ss command is a utility for displaying socket statistics. It can be used to report a variety of information, including open sockets.
  • The lsof command is a utility for displaying information about files that are open by processes running on the system. The lsof command can be used to find out which ports are being used by which processes.

Each of these commands will give us different information about the open ports on our system. Try running each of them and see what results you get!

Procedure to Check open ports in Linux

  • Open the terminal.
  • Type netstat -tulpn and press Enter. This will show you a list of all the open ports on your system, as well as the PID and name of the program that is using each port.
  • If you want to see more information about a specific port, type netstat -tulpn | grep portnumber and press Enter. Replace portnumber with the actual port number you want to check. The output will show you the PID and name of the program that is using that port.

Check open ports with netstat command in Linux

The easiest way to check open ports in Linux is using netstat command. You will need to open a terminal window. Then, type in the following command:

This will give you a list of all open ports on your system, as well as the programs that are using them.

The “l” flag will show you all the open ports. The ‘p’ flag will show you the program that is using the port, including the process ID (PID) and the user that owns it.

  • -t : All TCP ports
  • -u : All UDP ports
  • -l : Display listening server sockets
  • -p : Show the PID and name of the program to which each socket belongs
  • -n : Don’t resolve names
  • -a: Show both listening and non-listening (for TCP this means established connections) sockets.
Читайте также:  Linux команды восстановление данных

From the following example, we can see that ports 111,22,5432,25 are open.

# netstat -utpnl
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN 1/systemd
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1900/sshd
tcp 0 0 0.0.0.0:5432 0.0.0.0:* LISTEN 182374/postgres
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 2084/master
tcp6 0 0 . 111 . * LISTEN 1/systemd
tcp6 0 0 . 22 . * LISTEN 1900/sshd
tcp6 0 0 . 5432 . * LISTEN 182374/postgres
udp 0 0 0.0.0.0:111 0.0.0.0:* 1/systemd
udp6 0 0 . 111 . * 1/systemd

If you see a socket in the “LISTENING” state, it means that the port is open and waiting for a connection.

If you want to see more information about a specific port, you can use the following command:

For example, if you want to see information about port 22 (the standard SSH port), you would type in:

# netstat -tulpn | grep 22
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1900/sshd
tcp6 0 0 . 22 . * LISTEN 1900/sshd

This will show you all of the processes that are connected to port 22, as well as their PIDs and owners.

The netstat -a command will show you all of the active sockets on your system, both listening and non-listening. This can be useful for troubleshooting purposes, as it will show you all of the sockets that are currently in use.

From the following example, we can see that there is one more TCP connection. Its state is ESTABLISHED.

# netstat -tulapn | grep 22
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1900/sshd
tcp 0 80 10.244.13.128:22 10.79.96.124:53559 ESTABLISHED 1296958/sshd:
tcp6 0 0 . 22 . * LISTEN 1900/sshd

When you see a socket in the “ESTABLISHED” state, it means that the connection is established and both sides are actively communicating. This usually indicates that the connection is working properly.

If you see a socket in the “TIME_WAIT” state, it means that the connection has been terminated but the socket is still waiting for some time to expire so that it can be freed up.

Check port status with ss command in Linux

You can also use the ss command to check open ports in Linux. It stands for socket statistics , and it gives a snapshot of all active sockets on the system. The ss command is similar to netstat, but it provides more information about each connection.

To use the ss command, type in the following:

It will show more detailed information about ports than netstat . To use ss, you will need to install the iputils-ss package.

This will give you a list of all active sockets, including the following information: – The socket type ( tcp , udp , raw , etc.) – The local address – The remote address – The state ( LISTENING , ESTABLISHED , etc.)

This will give you a list of all open ports on your system.

Читайте также:  Расширить диск linux xfs

Example:
# ss -tulpn
Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port Process
tcp LISTEN 0 128 0.0.0.0:111 0.0.0.0:* users:((«rpcbind»,pid=96374,fd=4),(«systemd»,pid=1,fd=58))
tcp LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:((«sshd»,pid=1900,fd=5))
tcp LISTEN 0 4096 0.0.0.0:5432 0.0.0.0:* users:((«postgres»,pid=182374,fd=6))
tcp LISTEN 0 100 127.0.0.1:25 0.0.0.0:* users:((«master»,pid=2084,fd=16))
tcp LISTEN 0 128 [::]:111 [::]:* users:((«rpcbind»,pid=96374,fd=6),(«systemd»,pid=1,fd=60))
tcp LISTEN 0 128 [::]:22 [::]:* users:((«sshd»,pid=1900,fd=7))
tcp LISTEN 0 4096 [::]:5432 [::]:* users:((«postgres»,pid=182374,fd=7))

You can also use the following command to see information about a specific port:

For example, if you want to see information about port 22 (the standard SSH port), you would type in:

Example:
# ss -tulpn | grep «22»
tcp LISTEN 0 128 0.0.0.0:22 0.0.0.0:* users:((«sshd»,pid=1900,fd=5))
tcp LISTEN 0 128 [::]:22 [::]:* users:((«sshd»,pid=1900,fd=7))

Check open ports with lsof command in Linux

we will cover the lsof command. The lsof command is a powerful tool that can be used to show a variety of information about open files on your system. To use it to check port status, type in the following:

lsof -i TCP -sTCP:LISTEN -n -P

This will give you a list of all open ports on your system, as well as the programs that are using them.

  • -i TCP -sTCP:LISTEN: Look for listing ports
  • -P : Inhibits the conversion of port numbers to port names for network files. Inhibiting the conversion may make lsof run a little faster. It is also useful when port name lookup is not working properly.
  • -n : Do not use DNS name

# lsof -i TCP -sTCP:LISTEN -n -P
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
systemd 1 root 58u IPv4 13485027 0t0 TCP *:111 (LISTEN)
systemd 1 root 60u IPv6 13485029 0t0 TCP *:111 (LISTEN)
sshd 1900 root 5u IPv4 15494 0t0 TCP *:22 (LISTEN)
sshd 1900 root 7u IPv6 15496 0t0 TCP *:22 (LISTEN)
master 2084 root 16u IPv4 33300 0t0 TCP 127.0.0.1:25 (LISTEN)
rpcbind 96374 rpc 4u IPv4 13485027 0t0 TCP *:111 (LISTEN)
rpcbind 96374 rpc 6u IPv6 13485029 0t0 TCP *:111 (LISTEN)
postgres 182374 postgres 6u IPv4 14699999 0t0 TCP *:5432 (LISTEN)
postgres 182374 postgres 7u IPv6 14700000 0t0 TCP *:5432 (LISTEN)

You can also use the following command to see information about a specific port:

This will show you all of the processes that are connected to port 22.

COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
sshd 1900 root 5u IPv4 15494 0t0 TCP *:22 (LISTEN)
sshd 1900 root 7u IPv6 15496 0t0 TCP *:22 (LISTEN)
sshd 1296958 root 5u IPv4 20115240 0t0 TCP 10.244.13.128:22->10.79.96.124:53559 (ESTABLISHED)
sshd 1296964 howtouselinux 5u IPv4 20115240 0t0 TCP 10.244.13.128:22->10.79.96.124:53559 (ESTABLISHED)

There you have it! Three ways to check port status in Linux. Which one is your favorite? Let us know in the comments below.

David is a Cloud & DevOps Enthusiast. He has years of experience as a Linux engineer. He had working experience in AMD, EMC. He likes Linux, Python, bash, and more. He is a technical blogger and a Software Engineer. He enjoys sharing his learning and contributing to open-source.

Читайте также:  Nvidia drivers linux failed

howtouselinux.com is dedicated to providing comprehensive information on using Linux.

We hope you find our site helpful and informative.

Источник

How can I see what ports are open on my machine?

I would like to see what ports are open on my machine, e.g. what ports my machine is listening on. E.g. port 80 if I have installed a web server, and so on. Is there any command for this?

10 Answers 10

If the netstat command is not available, install it with:

sudo apt install net-tools 

-l already filters for listening. grep LISTEN won’t help beyond hiding 2 lines of header information.

-t : tcp, -l : listening socket, -p : show pid and program name, -n : print 127.0.0.1:80 instead of localhost:http . Reference: linux.die.net/man/8/netstat

The expanded command is sudo netstat —tcp —listening —programs —numeric . There’s no need to use grep unless you want to eliminate column headers.

nmap (install)

Nmap («Network Mapper») is a free and open source utility for network exploration or security auditing.

Use nmap 192.168.1.33 for internal PC or nmap external IP address .

More information man nmap .

Zenmap is the official GUI frontend.

Remember that there is a difference between nmap localhost and nmap 192.168.0.3 (or what ever you machine IP is)

I think netstat is a better answer to this. netstat will list what the system is listening on directly, and without using an additional application or doing unnecessary calls over localhost or thought the network.

This is stupid. If you have access to the computer, just use netstat -ln . You’ll instantly see all the open ports.

nmap localhost didn’t find services that were bound only to localhost. For example, I run influxd with bind-address:localhost:8086 . That didn’t show up in sudo nmap localhost , but did show up in sudo netstat -tulpn .

Other good ways to find out what ports are listenting and what your firewall rules are:

To list open ports use the netstat command.

 $ sudo netstat -tulpn | grep LISTEN tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 5452/dnsmasq tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN 1037/cupsd tcp6 0 0 ::1:631 . * LISTEN 1037/cupsd 

In the above example three services are bound to the loopback address.

IPv4 services bound to the loopback address «127.0.0.1» are only available on the local machine. The equivalent loopback address for IPv6 is «::1». The IPv4 address «0.0.0.0» means «any IP address», which would mean that other machines could potentially connect to any of the locally configured network interfaces on the specific port.

Another method is to use the lsof command:

 $ sudo lsof -nP -i | grep LISTEN cupsd 1037 root 9u IPv6 11276 0t0 TCP [::1]:631 (LISTEN) cupsd 1037 root 10u IPv4 11277 0t0 TCP 127.0.0.1:631 (LISTEN) dnsmasq 5452 nobody 5u IPv4 212707 0t0 TCP 127.0.0.1:53 (LISTEN) 

For more details see man netstat or man lsof .

Источник

Оцените статью
Adblock
detector