My goal was to check how those ports responded to an external scan, and to make sure the network boundary was not open to casual scanning or potential ingress through those addresses. This recipe ...
Port scanning is also widely used to find out if a network can be compromised. See well-known port. See also port mirroring. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction ...