A number of weeks ago, I provided and described a script that uses nmap to quickly scan a system or subnet for activity on a particular port. Useful for detecting, say, web servers or Oracle ...
I scanned my router and didn’t like what I saw.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results