Port Scanner checks to see which ports are open on an IP address and reads any data sent when it connects. If possible, the service on the port will be named.
a helpful tool that connects to a specified IP address and attempts to connect to a range of ports, notifying you the user what ports are open for everyone to see
a legitimate tool when used by web masters or IT administrators to see if a computer is locked down, it other words it can be used like a guard at a building to see if non public areas are secure
a must have tool for the network administrator
a network tool which is able to scan for open ports on a server
an important tool in the security manager's toolkit
a program that automatically detects security weaknesses in a remote system
a program that tells you which ports are open on a host (don't port scan just any host
a program that tests a remote system for common vulnerabilities
a tool used by both system administrators and attacker(s) to identify vulnerabilities in operating systems
In hacker reconnaissance, a port scan attempts to connect to all 65536 ports on a machine in order to see if anybody is listening on those ports. Ports scans are not illegal in many places, in part because they don't actually compromise the system, in part because they can easily be spoofed, so it is hard to prove guilt, and in part because virtually any machine on the Internet can be induced to scan another machine. Many people think that port scanning is an overt hostile act and should be made illegal. An attacker will often sweep thousands (or millions) of machines rather than a single machine looking for any system that might be vulnerable. Port scans are always automated through tools called Port Scanners. Examples
Security Analysis Software used to discover what computer network services a remote system provides. Port scanning indicates where to probe for weaknesses.
A port scanner is a piece of software designed to search a network host for open ports. This is often used by administrators to check the security of their networks and by crackers to compromise it.