TCP Port scanner Multi threaded with possibility to scan 65535 TCP ports on an IP address.
You can specify how many threads to run and the timeout. Further more it will tell you the MAC address of the target and the service running
With the TCP Scanner you can scan any IP address both local and public IP addresses for open ports.
It has threaded option as well so you can easily scan many IPs very fast.
You can use the TCP Port scanner to scan your public ip, local ips and for example your firewall.
This way you can find out if you have open ports on your network that actually should be firewalled off.
It is even recommended to do regular scans and find out if your security policy is still active.
Often human mistakes can allow to open up ports that should be firewalled off.
And now you can easily find out.
For LINUX and Windows.
## 4.0 - Added mixed port specification for parameter -p, that makes
possible to specify port lists and ranges together
- Added support for Mac os x (thanks to Gary Sims)
## 3.0 Added a number of new features:
- Added host name resolution
- Added option -o <filename> for output to file in plain text format
- Added option -oh <filename> for output to file in html format
- Added option -ox <filename> for output to file in xml format
- Reversed the meaning of -r : by default shows port names, with -r does
not show them
- Skipping duplicated open ports: Due to the low delay between two
sends, the pcap library may call the receive function multiple times
for the same port. Increasing the delay time, this problem can be
bypassed, but it will slow down processing. With this solution, it's
possible to keep a low delay and avoid duplicates at once.
- Changed name to "portscanner"
- Added target host name to output, if given
- Removed printing of options -w and -n for Connect scan
- Help message changed according to the new options
- Fixed mistyped word "Receovery"
- Renamed net.h into pscan.h to collect general program definitions
- Moved version number to macro PSCAN_VERSION
- unified output by using fprintf(stdout), fprintf(stderr) or
- Improved indentation of code
- Removed commented lines of code
- Removed useless function print_status()
- Removed useless return statements
- Renamed macro OPENED to OPEN
- Moved generic output functions to output.c
Version 2.0 - 22 September 2011
## 2.0 - Added option -s for Syn scan.
- Scanning made faster thanks to Syn scan
- Added even more default ports
- Improved error handler for Syn scan
- Improved text output
- Fixed minor bugs:
- changed pathname to oui.txt and port-numbers.txt files
- added missing call to cleanup function WSACleanup
A new branch of the program has been created to support Syn scan.
Syn scan was necessary because under some circumstances of heavy load,
the Connect scan can hang routers. Syn scan is multithreaded and uses
the standard library pcap on Unix/Linux operating systems.
Please be aware that Syn scan requires a higher level of authorization,
if compared to connect sockets: in Unix/Linux pscan requires root
In some operating systems, Syn scan is performed using connectionless
"raw" sockets, therefore the usage of pscan is subject to possible
restriction to the usage of raw sockets in such operating systems.
With Syn scan, option -w is not used because the program does not use
connected sockets, so it doesn't have to loop reading a socket until
the timeout is reached. The receive function doesn't have to poll over
a number of sockets, but simply reads the packets passing through the
network card, for all ports, and displays the message of "open port"
when the packet coming from the remote IP contains the information that
the remote port is open. For the same reason, options -a and -n are not
used. The first one because packets sent to closed ports are simply
not being replied to, so they cannot be counted; the second one because
the function that reads packets is one, and performs this by reading
packets from the network card, not from multiple sockets.
Version 1.3 - 21 March 2011
## 1.3 added more default ports
Version 1.2 - 17 March 2011
## 1.2 default port list is now not 1-1024, but is a list of frequently used ports; duplicates check
Version 1.1 - 8 March 2011
# ## 1.1 you could use not only port range, but single ports and port lists (check -p option)
Version 1.0 - 3 March 2011
# ## 1.0 initial release
|Want to be Contacted?|
|Click here to Get Contacted|
Free Wi-Fi Top 15 Security Tips
Free Vulnerability Scan
» New Penetrator Vulnerability Scanner 22.5 with Ticket System Released
|Awards & Reviews|