我經(jīng)常用它來檢測(cè)遠(yuǎn)程的 Windows服務(wù)器的ip地址,因?yàn)椴皇枪潭╥p地址,該服務(wù)器的ip地址會(huì)經(jīng)常變化,但是有個(gè)規(guī)律,只在一個(gè)網(wǎng)段內(nèi)變化,這樣就給ip地址的確定帶來 了方便。
1. 如果沒有安裝nmap,就安裝
yum install -y nmap
2. 掃描指定網(wǎng)段的遠(yuǎn)程桌面連接端口
nmap -sT -p3389 218.206.112.0/24
3. 如果覺得輸出太多,可以用 grep 命令過濾
nmap -sT -p3389 218.206.112.0/24 | grep -B2 open
下面是操作的消息記錄,備查。
.
[[email protected] opt]# nmap
-bash: nmap: command not found
[[email protected] opt]# yum install -y nmap
...
[[email protected] opt]# nmap -sT -p3389 218.206.112.0/24
Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2012-10-26 15:36 CST
Interesting ports on 218.206.112.1:
PORT STATE SERVICE
3389/tcp closed ms-term-serv
Interesting ports on 218.206.112.11:
PORT STATE SERVICE
3389/tcp filtered ms-term-serv
...
[[email protected] opt]# nmap -sT -p3389 218.206.112.0/24 | grep -B2 open
Interesting ports on 218.206.112.100:
PORT STATE SERVICE
3389/tcp open ms-term-serv
--
Interesting ports on 218.206.112.132:
PORT STATE SERVICE
3389/tcp open ms-term-serv
[[email protected] opt]#