_noob.tools

/PORT// scanner

Remote TCP Socket Scanner. Determines exactly which connection ports are exposed to the public internet.
Deep Link: /tool/network/portscan

What is the Remote TCP Port Scanner?

A fundamental reconnaissance tool that attempts to establish valid TCP handshake connections against a remote host to map out explicitly exposed software services.

How it Works under the hood

The Node.js server engine iterates through an array of the 20 most targeted attack ports (like SSH 22, MySQL 3306, and RDP 3389). It utilizes the native `net.Socket` library to initiate a 3-way TCP connection request. If it connects, the port is OPEN. If a TCP RST packet is received immediately, it's CLOSED. If the 3000ms timeout is reached, the host's firewall explicitly FILTERED (dropped) the packet.

SysAdmin & Security Use Cases

  • »Verify that corporate databases (MySQL, Postgres) are not publicly exposed to the internet.
  • »Confirm firewall rules successfully drop ICMP/TCP traffic natively at the hardware level.
  • »Detect unauthorized Shadow IT services running on forgotten cloud VPS instances.
  • »Discover hidden SSH or FTP administration endpoints.