UDP Port Scan

This specialized free tool shows results and findings that are a part of the premium Deep Scan version of our proprietary Port Scanner. If you’d like to try it, check out our paid subscriptions.

Discover open UDP ports, detect service version and operating system.

Reporting

Sample UDP Port Scan report

Here is a sample report from our UDP Port Scan that gives you a taste of how our tools save you time and reduce repetitive manual work.

  • Shows the open UDP ports, services and version information

  • Includes operating system information and reverse DNS results

  • The original Nmap output is also included

UDP Port Scanner with NMap Report Sample

How to use the pentesting tool

Use Cases for UDP Port Scan

Allows you to discover which UDP ports are open on your target host, identify the service versions, and detect the operating system.

  • Network Penetration Testing

    The scanner is helpful for quick port scans but also for lengthy scans which can take multiple hours. The results are accurate since our servers have direct Internet connection. Furthermore, the scanner is optimized for best performance and quality results.

  • Security Self-Assessment

    Check if your servers exposed to the Internet have unnecessary open UDP ports. By also looking at the service versions, you can find which server software is outdated and needs to be upgraded.

  • Asset Inventory

    You can scan IP addresses to map the live hosts and UDP services exposed to the Internet. Find which machines are old and could be used by attackers to break the perimeter and gain access to the internal network.

Better vulnerability discovery.Faster pentest reporting.

Get instant access to custom vulnerability scanners and automation features that simplify the pentesting process and produce valuable results. The platform helps you cover all the stages of an engagement, from information gathering to website scanning, network scanning, exploitation and reporting.

Pentest-Tools.com UDP Port Scanner with NMap Sample Report

UDP Port Scan

Technical details

UDP is a transport layer protocol (the same as TCP) mainly used in network services such as DNS, NTP, DHCP, RTSP, TFTP, and others.

Even though UDP services are less popular than TCP services, having a vulnerable UDP service exposes the target system to the same risk as having a vulnerable TCP service. Hence, discovering all open UDP ports is important in a penetration test for achieving complete coverage of the security evaluation.

Parameters

ParameterDescription
TargetThis is the target to scan for open UDP ports. Can be specified as hostname or IP address
Ports to scan - CommonThis option tells Nmap to scan only the top 10, 100, 1000, or 5000 most common UDP ports (Nmap --top-ports). Top 100 is the default scan option.
Ports to scan - RangeYou can specify a range of ports to be scanned. Valid ports are between 1 and 65535. Because of the way UDP protocol works, scanning is pretty slow so if you specify a large range of ports, the scan can take up to several hours.
Ports to scan - ListYou can specify a comma-separated list of ports to be scanned
Detect service versionIn this case, Nmap will try to detect the version of the service that is running on each open port. In the case of UDP, this is possible only by sending UDP requests that can be understood by the tested service, otherwise, the service will not answer at all
Detect operating systemIf enabled, Nmap will try to determine the type and version of the operating system that runs on the target host. The result is not always 100% accurate, depending on the way the target responds to probe requests
Don't ping hostIf enabled, Nmap will no longer do host discovery before scanning (which is the default behavior). This option is useful when the target host does not respond to ICMP requests but it is up and it has open ports

How it works

The tool is a web interface for Nmap, which is called with the proper parameters to provide speed and accuracy.

Behind the scenes, Nmap sends UDP packets to each port specified in the parameters. If the target responds with 'ICMP port unreachable', Nmap can be sure that the port is closed. Otherwise (no response received), the scanner cannot know if the port is open, firewalled or if the packet was lost on the way. In this case, Nmap will show you the status open|filtered for that port.

To make sure that a certain port marked as open|filtered is really open, you should enable the detection of the service version. Since this operation is really slow, you should do it in a second scan, only for the ports that were reported as open|filtered in the initial simple scan.