欢迎各位兄弟 发布技术文章

这里的技术是共享的

You are here

linux系统/Windows系统——测试端口通不通(四种方法) 有大用

针对Linux系统:有1、2、3、4四种方法
针对Windows系统:有1、5两种通用方法

目录

针对Linux系统:有1、2、3、4四种方法针对Windows系统:有1、5两种通用方法

1、使用telnet判断

2、使用ssh判断

3、使用wget判断

4、使用端口扫描工具

5、使用专用工具tcping进行访问:


一般情况下使用"telnet ip port"判断端口通不通,其实测试方法不止这一种,还有很多种方法,下面小编给大家分享了几种方法,具体内容请往下看:

准备环境

启动一个web服务器,提供端口.

  1. [wyq@localhost ~]$ python -m SimpleHTTPServer 8080
  2. Serving HTTP on 0.0.0.0 port 8080 ...

用其它web服务器提供端口也一样,由于python比较方便,这里就用它

1、使用telnet判断

telnetwindows标准服务,可以直接用;如果是linux机器,需要安装telnet.

用法: telnet ip port

1)先用telnet连接不存在的端口

  1. [root@localhost ~]# telnet 10.0.250.3 80
  2. Trying 10.0.250.3...
  3. telnet: connect to address 10.0.250.3: Connection refused #直接提示连接被拒绝


2)再连接存在的端口

  1. [root@localhost ~]# telnet localhost 22
  2. Trying ::1...
  3. Connected to localhost. #看到Connected就连接成功了
  4. Escape character is '^]'.
  5. SSH-2.0-OpenSSH_5.3
  6. a
  7. Protocol mismatch.
  8. Connection closed by foreign host.

2、使用ssh判断

ssh是linux的标准配置并且最常用

用法: ssh -v -p port username@ip

-v 调试模式(会打印日志).

-p 指定端口

username可以随意

1)连接不存在端口

  1. [root@localhost ~]# ssh 10.0.250.3 -p 80
  2. ssh: connect to host 10.0.250.3 port 80: Connection refused
  3. [root@localhost ~]# ssh 10.0.250.3 -p 80 -v
  4. OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013
  5. debug1: Reading configuration data /etc/ssh/ssh_config
  6. debug1: Applying options for *
  7. debug1: Connecting to 10.0.250.3 [10.0.250.3] port 80.
  8. debug1: connect to address 10.0.250.3 port 80: Connection refused
  9. ssh: connect to host 10.0.250.3 port 80: Connection refused


2)连接存在的端口

  1. [root@localhost ~]# ssh ... -p
  2. a
  3. ^]
  4. ^C
  5. [root@localhost ~]# ssh ... -p -v
  6. OpenSSH_.p, OpenSSL ..e-fips Feb
  7. debug: Reading configuration data /etc/ssh/ssh_config
  8. debug: Applying options for *
  9. debug: Connecting to ... [...] port .
  10. debug: Connection established.
  11. debug: permanently_set_uid: /
  12. debug: identity file /root/.ssh/identity type -
  13. debug: identity file /root/.ssh/identity-cert type -
  14. debug: identity file /root/.ssh/id_rsa type -
  15. debug: identity file /root/.ssh/id_rsa-cert type -
  16. debug: identity file /root/.ssh/id_dsa type -
  17. debug: identity file /root/.ssh/id_dsa-cert type -
  18. a
  19. ^C


不用-v选项也可以咯

3、使用wget判断

wget是linux下的下载工具,需要先安装.

用法: wget ip:port

1)连接不存在的端口

  1. [root@localhost ~]# wget ...:
  2. ---- ::-- http://.../
  3. Connecting to ...:... failed: Connection refused.

2)连接存在的端口

  1. [root@localhost ~]# wget ...:
  2. ---- ::-- http://...:/
  3. Connecting to ...:... connected.
  4. HTTP request sent, awaiting response...

4、使用端口扫描工具

  1. [root@localhost ~]# nmap ... -p
  2. Starting Nmap . ( http://nmap.org ) at -- : CST
  3. Nmap scan report for ...
  4. Host is up (.s latency).
  5. PORT STATE SERVICE
  6. /tcp closed http
  7. MAC Address: B:A::CF:FD:D (Unknown)
  8. Nmap done: IP address ( host up) scanned in . seconds
  9. [root@localhost ~]# nmap ... -p
  10. Starting Nmap . ( http://nmap.org ) at -- : CST
  11. Nmap scan report for ...
  12. Host is up (.s latency).
  13. PORT STATE SERVICE
  14. /tcp open http-proxy
  15. MAC Address: B:A::CF:FD:D (Unknown)
  16. Nmap done: IP address ( host up) scanned in . seconds
  17. [root@localhost ~]# nmap ...
  18. Starting Nmap . ( http://nmap.org ) at -- : CST
  19. Nmap scan report for ...
  20. Host is up (.s latency).
  21. Not shown: closed ports
  22. PORT STATE SERVICE
  23. /tcp open ssh
  24. /tcp open rpcbind
  25. /tcp open http-proxy
  26. /tcp open unknown
  27. MAC Address: B:A::CF:FD:D (Unknown)
  28. Nmap done: IP address ( host up) scanned in . seconds


5、使用专用工具tcping进行访问:

下载软件地址:https://elifulkerson.com/projects/tcping.php,如果无法下载可以从本人资源中下载

 

总结

提供端口服务,则使用了tcp协议,上面是以web服务器为例。如果服务器是更简单的tcp服务器,三个工具同样适用.

三个工具的共同点是:1.以tcp协议为基础;2.能访问指定端口. 遵循这两点可以找到很多工具.

一般在windows下使用tcping比较方便,linux下个人就比较喜欢用wget.

来自 https://blog.csdn.net/qq_36501591/article/details/105664436


普通分类: