Port scan (ShieldsUp and Syhunt NmapW): Open ports

Hello all!

I’m very glad with my new CPF (XP & Vista x32), and doing a port scan in ShieldsUp, GRC | Gibson Research Corporation Home Page   , everything ok, all stealth, but, with Syhunt NmapW, http://www.syhunt.com/section.php?id=nmapw , I received the follow:

Starting Nmap 4.20 ( http://insecure.org ) at 2007-12-10 05:29 Hora oficial do Brasil
Interesting ports on
Not shown: 1053 closed ports
135/tcp open msrpc
445/tcp open microsoft-ds

Nmap finished: 1 IP address (1 host up) scanned in 237.078 seconds

… how can I resolve this?


Hi Eduardo,

i just downloaded that NmapW to try out.

I tried scanning a couple of ports for example 22, 139 and 65535

the results i got were:

Starting Nmap 4.20 ( http://insecure.org ) at 2007-12-11 18:13 GMT Standard Time
Note: Host seems down. If it is really up, but blocking our ping probes, try -P0
Nmap finished: 1 IP address (0 hosts up) scanned in 5.672 seconds

hope you don’t mind me asking, but what does that mean? does it mean it scanned it and the results is good

and just to make sure I am running it right in the target box i enter my external IP or my internal IP? since I have a router


ahah, with the router it can’t probe or ping me. am running NMapW without my router now to test just the CFP firewall on its own. am probing all 1- 65,535 ports and man is it gonna take a long time :o

here’s some info that might help you Eduaro as far as i can remember from way back. Remote Assistance is a service that depends on port 135 and keeps it open. right click My computer/properties goto the remote tab and see if you have remote assistance untick, if it ain’t then untick it. as for port 445, i think i remember reading that WinXP uses it for netbios services and only uses port 139 rarely or sometimes. Win98 and Win95 were OS’s that only used port 139

(Incase that doesn’t work, you can goto Control Panel/Adminstrative tools/Services and set any RPC services to manual that should make port 135 report as not open when you do a scan)

hope that helps.

so far i scanned only a few independent ports with NmapW and all came back as closed. am curious on what a scan of all 65,535 ports will come back as. sheesh sure takes ages :o


NMAP seems to have stopped, or my scan is taking a very long while. Why is this?

The timing options can make it take a very long time. I believe the -T Paranoid
( -T 0 )option waits up to 5 minutes between packets… now, for 65000 ports,
thats 65000 x 5 = 325000 minutes = 225 days!!
-T Sneaky ( -T 1 ) waits up to 15 seconds between scans, and is therefore
more useful; but scans will still take a long while! You can use -v to get more
verbose output, which will alert you as to the progress of the scan. Using -v twice
makes the output even more verbose.

is that how long its gonna take? ^^ ■■■■■■ I wish i had come across the FAQ section in the nmap tutorial guide sooner

You must read this if you are new to nmap :

…and this if you use windows XP :

While it has improved dramatically, the Windows port is not quite as efficient or stable as on Unix. Here are some known limitations: You cannot generally scan your own machine from itself (using a loopback IP such as or any of its registered IP addresses). This is a Windows limitation that we haven't yet worked around. If you really want to do this, use a TCP connect scan without pinging (-sT -P0) as that uses the high level socket API rather than sending raw packets. Nmap only supports ethernet interfaces (including many 802.11 wireless cards) unless you use the -sT -P0 options. RAS connections (such as PPP dialups) are not supported. This support was dropped when Microsoft removed raw TCP/IP socket support in Windows XP SP2. Now Nmap must send lower-level ethernet frames instead. Version detection cannot use SSL scan-through

Nmap now has a official cross-platform GUI :

Another FOSS GUI for nmap :

remember… behave like a responsible adult when using a port-scanner…
using this without authorization on a corporate network could loose you your job !

Hi gordon, thanks for that :slight_smile:

I decided to try NmapW when i came across Eduardo’s post, to run it on my PC to see what how safe my PC is, whether or not it reports any Ports as being open which is unsafe is undesirable.

that link I’ve been to it yesterday and its too technical for me Chapter 15. Nmap Reference Guide | Nmap Network Scanning :-\

I have a single PC behind a router, i disconnected my router yesterday and ran NmapW can NmapW be used like that? also am I correct in presuming that in target I enter my IP and whatever ports in Ports and it scans my PC right??

I’ve looked everywhere in them links yesterday and nothing explains such things in a simple easy way for someone new to nmap like me :cry:

btw, yeah I read that Nmap is used by network people but also can be used to do bad :-
something i have no intention of using it for, it is alright that I scan my own Home PC with it though??

P.S lastnight I managed to scan 1 - 10,000 ports ;D it said all 10,000 ports scanned were closed
I would like to scan all 65,535 ports of my PC but it says it can take upto 225 days! :o unless I change the timing but i don’t know how to do that lol. so any answers on my questions I have asked would be greatly appreciated :slight_smile:


Hi Ron_75! Firstly, thanks for your big help! Unhappily, I’m a novice with Nmap to, and I was using it for scan my own PC. Othes great software to do this that I already listen are Download Tenable Nessus Vulnerability Assessment | Tenable® and Home :: GFI

Your welcome Eduardo :slight_smile: and no probs and thanks for those new links for testing :slight_smile:

I also tried that umit that gordon posted a link to, its another front end interface for nmap it looks alot simpler to use, main difference is its scan profile is slightly different, its a bit like doing them scan tests of ones firewall/PC on them online scanner sites for example: it has quick scan, regular scan, intense scan etc, quick scan one can run on their own PC to scan their own PC. regular and intensive scan it doesn’t allow one to scan ones own PC well it will recognise the PC but the first test in regular scan or any other besides quick scan is syn tealth scan and it says nmap doesn’t support this OS from scanning on the same PC that it is running on"something like that" , so nmap tools are really meant to be used from another PC to scan ones own PC or another PC on a home/office network.

NmapW though is a bit more techy but more flexible, one can atleast run port scanner tests from it check to see if there are any ports that report as being open by scanning their own PC that they are running it from.

So I tried umit but installed it and am keeping NmapW and will try to scan all 65.535 ports sometime lol. i’ve only scanned the first 10,000 ports the day i saw your post and downloaded and tried it and they came back all as closed, which was good :slight_smile:

and don’t worry about the novice part, I’m a novice on alot too …but atleast we learn some :slight_smile: