写了个简单的脚本测试了一下本地 ISP (某地电信)对个人用户屏蔽了哪些 TCP 端口。
测试方法:
参考脚本: https://gist.github.com/vfreex/32b7de2e36422dbee94454afc762305e
经测试,楼主所在地的 ISP 屏蔽了以下 TCP 端口:
42
80
135
136
137
138
139
443
539
901
1023
1025
1068
1434
2745
3127
3128
3129
3130
3332
3333
4444
5554
5800
5900
6129
6176
6667
6669
8080
8998
9437
9995
9996
1
bclerdx 2018-11-20 18:20:01 +08:00
具体应该如何操作与实施,看着有些迷茫!
|
2
afc 2018-11-20 18:22:17 +08:00
我们公司的专线是备案过才开通 80 端口的,最近又给电信封上了
|
4
des 2018-11-20 18:44:33 +08:00 via Android 3
sudo nmap -sA -Pn -F 195.172.xx.xx
一条命令解决 |
5
CloudnuY 2018-11-20 19:02:10 +08:00
10000 以内的端口 ISP 封了以下几个:
25/tcp filtered smtp 80/tcp filtered http 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 5800/tcp filtered vnc-http 5900/tcp filtered vnc 8080/tcp filtered http-proxy |
7
des 2018-11-20 19:07:41 +08:00 via Android
|
9
skyeycirno 2018-11-20 19:26:04 +08:00
没看懂。能不能具体说下。。
|
14
Archeb 2018-11-20 22:46:50 +08:00
我们只封了 80....连 443 都没事
|
15
Danswerme 2018-11-20 23:29:23 +08:00 via Android
@des 用 vps 扫了一下家里路由器..
Host is up (0.31s latency).Not shown: 9976 unfiltered portsPORT STATE SERVICE 80/tcp filtered http 135/tcp filtered msrpc 136/tcp filtered profile 137/tcp filtered netbios-ns 138/tcp filtered netbios-dgm 139/tcp filtered netbios-ssn 443/tcp filtered https 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 901/tcp filtered samba-swat 1433/tcp filtered ms-sql-s 1614/tcp filtered unknown 1999/tcp filtered tcp-id-port 2745/tcp filtered unknown 3127/tcp filtered unknown 3128/tcp filtered squid-http 3333/tcp filtered dec-notes 4444/tcp filtered krb524 5554/tcp filtered sgi-esphttp 6129/tcp filtered unknown 6667/tcp filtered irc 7306/tcp filtered unknown 7626/tcp filtered unknown 8080/tcp filtered http-proxy Nmap done: 1 IP address (1 host up) scanned in 9879.99 seconds |
17
zhouyut001 2018-11-24 20:25:05 +08:00
老家的服務器,電信只被封這些。
25/tcp filtered smtp 80/tcp filtered http 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 443/tcp filtered https 445/tcp filtered microsoft-ds 3128/tcp filtered squid-http 5800/tcp filtered vnc-http 5900/tcp filtered vnc 8080/tcp filtered http-proxy |
18
sheephe 2019-08-28 13:04:57 +08:00
Shanghai ChinaNet:
Not shown: 91 unfiltered ports PORT STATE SERVICE 80/tcp filtered http 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 443/tcp filtered https 445/tcp filtered microsoft-ds 1025/tcp filtered NFS-or-IIS 3128/tcp filtered squid-http 5900/tcp filtered vnc 8080/tcp filtered http-proxy |
19
sheephe 2019-08-28 13:08:23 +08:00
Guangdong Foshan:
Not shown: 97 unfiltered ports PORT STATE SERVICE 80/tcp filtered http 445/tcp filtered microsoft-ds 8080/tcp filtered http-proxy 同时电信的情况下,看起来每个地区的规律都不一样,还是说 80/445/8080 外其他端口随机封锁的可能? |
20
a1gslyghmqnl 2020-09-21 00:18:51 +08:00
https://www.comcdn.com/help/article/66.html
> 接到电信运营商的通知,为了增强网络安全性,中国电信将于北京时间 2017 年 09 月 28 日 00:00 开始在全国范围的 IDC 机房电信链路网络出口添加病毒防护策略,屏蔽部分端口(详细参看下列清单),届时对这些端口的访问将被阻断。建议您检查您的业务中是否包含下述端口的服务,更换端口以免受到影响。 具体屏蔽的端口如下: 目的端口:137-139,协议:TCP/UDP 目的端口:593,协议:TCP/UDP 目的端口:445,协议:TCP/UDP 目的端口:4444,协议:TCP/UDP 目的端口:135,协议:TCP/UDP 目的端口:3332,协议:TCP 目的端口:9996,协议:TCP/UDP 目的端口:6669,协议:TCP 目的端口:1434,协议:TCP/UDP 目的端口:3127-3130,协议:TCP 目的端口:42,协议:TCP 目的端口:1068,协议:TCP/UDP 目的端口:5554,协议:UDP 目的端口:17185,协议:UDP |