作成日:2001年06月01日、更新日:2002年10月03日 作成:鷹の巣

Sygate Online ServiceのQuick ScanによるService Portの確認結果を公開しています。


Sygate Online ServiceのService Portの確認結果

このQuick Scanでは、WWWサーバーを起動し、ルータで、サービスポート80番を開放していてもサービスポート80番は、「OPEN」にならない場合がありますので、ご注意願います。
又、私のルータでは、ping による探査を受け付けませんので、ICMPのサービスポート8番は、「BLOCKED」になっております。

Your system ports are now being scanned and the results will be returned shortly...
Results fromquick scanat TCP/IP address:VVV.XXX.YYY.ZZZ Ideally your status should be "Blocked." This indicates that your ports are not only
closed, but they are completely hidden (stealthed) to attackers.
Service Ports Status Additional Information
FTP DATA 20 CLOSED This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities.
FTP 21 OPEN File Transfer Protocol is used to transfer files between computers. A misconfigured FTP server can allow an attacker to transfer files, Trojan horses, and virus programs at will.
SSH 22 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
TELNET 23 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
SMTP 25 OPEN SMTP is used to send email across the internet. This allows an attacker to verify user accounts on your system, send anonymous (spam) email, or even access files on your hard drive.
DNS 53 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
DDC 59 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
FINGER 79 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
WEB 80 OPEN HTTP web services publish web pages. A misconfigured web server can not only offer an attacker needed information about his target, but it can allow for various security breaches.
POP3 110 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
IDENT 113 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
Location Service 135 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
NetBIOS 139 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
HTTPS 443 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
Server Message Block 445 BLOCKED BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
SOCKS PROXY 1080 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
UPnP 5000 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
WEB PROXY 8080 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.

Results from scan ofcommonly used trojans at TCP/IP address:VVV.XXX.YYY.ZZZ

Service Ports Status Possible Trojans
Trojan 1243 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan 1999 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan 6776 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan 7789 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan 12345 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan 31337 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan 54320 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
Trojan 54321 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.

Results from scan ofICMPat TCP/IP address:VVV.XXX.YYY.ZZZ

Service Ports Status Additional Information
ICMP 8 BLOCKED An ICMP ping request is usually used to test Internet access. However, an attacker can use it to determine if your computer is available and what OS you are running. This gives him valuable information when he is determining what type of attack to use against you.

You are not fully protected:
We have detected that some of our probes connected with your computer.

If you are not already running ourEnterprise Security Agentor ourPersonal Firewall,
try ourAward-Winning Personal Firewall now.


|Home |Company |Products |News |Downloads |Buy |Support |Partners |Contact Us|

1997-2002 Sygate Technologies, Inc.
All content,
brands, and products referenced herein are the trademarks or registered
trademarks of their respective holders. Sygate® is a registered
trademark of Sygate Technologies, Inc. No part of this document may be
reproduced or transmitted in any form or by any means, electronic,
mechanical, or otherwise, without prior written permission of Sygate
Technologies, Inc. Please be advised that Sygate Technologies, Inc.
actively and aggressively enforces its intellectual property rights to
the fullest extent of the law.

目次▲頁先頭