Meet us at
Booth #350
Discover open UDP ports, detect service version and operating system
This scanner detects open UDP ports on target systems using Nmap. You can find open services such as DNS, VPN, SNMP, NTP and others. The Light version of the scanner finds the most common Top 100 UDP ports and also detects their service version (-sV).
If you want to scan IP ranges or custom UDP ports, please check the Full Scan.
Here is a UDP Port Scanner with Nmap sample report:
Allows you to discover which UDP ports are open on your target host, identify the service versions and detect the operating system.
The scanner is helpful for quick port scans but also for lengthy scans which can take multiple hours. The results are accurate since our servers have direct Internet connection. Furthermore, the scanner is optimized for best performance and quality results.
Check if your servers exposed to the Internet have unnecessary open UDP ports. By also looking at the service versions, you can find which server software is outdated and needs to be upgraded.
You can scan a range of IP addresses to map the live hosts and UDP services exposed to the Internet. Find which machines are old and could be used by attackers to break the perimeter and gain access to the internal network.
| Parameter | Description |
|---|---|
| Target | This is the target to scan for open UDP ports. Can be specified as hostname, IP address or IP range |
| Ports to scan - Common | This option tells Nmap to scan only the top 10, 100, 1000 or 5000 most common UDP ports (Nmap --top-ports). Top 100 is the default scan option. |
| Ports to scan - Range | You can specify a range of ports to be scanned. Valid ports are between 1 and 65535. Because of the way UDP protocol works, scanning is pretty slow so if you specify a large range of ports, the scan can take up to several hours. |
| Ports to scan - List | You can specify a comma separated list of ports to be scanned |
| Detect service version | In this case Nmap will try to detect the version of the service that is running on each open port. In case of UDP, this is possible only by sending UDP requests that can be understood by the tested service, otherwise the service will not answer at all |
| Detect operating system | If enabled, Nmap will try to determine the type and version of the operating system that runs on the target host. The result is not always 100% accurate, depending on the way the target responds to probe requests |
| Don't ping host | If enabled, Nmap will no longer do host discovery before scanning (which is the default behavior). This option is useful when the target host does not respond to ICMP requests but it is actually up and it has open ports |
open|filtered for that port.open|filtered is really open, you should enable the detection of service version. Since this operation is really slow, you should do it in a second scan, only for the ports that were reported as open|filtered in the initial simple scan.
| 500 Credits | €45 |
via FastSpring |
| 3000 Credits | €250 |
via FastSpring |
| Unlimited Credits | €950 |
via FastSpring |
| Options | Light scan | Full scan |
| Top 100 ports | ||
| All 65535 ports | ||
| Single IP or hostname | ||
| IP range (/24) | ||
| Detect service version | ||
| Detect operating system | ||
| Traceroute |
As an anonymous user, you get 40 free credits every 24 hours.
Whenever you use one of the tools, its cost in service credits is deducted from your current balance. If your balance runs out, you will get more free credits at the end of the 24-hour period.
If you need more credits per day, you can buy them from our pricing page.