Get access to immediate incident response assistance.
Eliminate active threats with 24/7 threat detection, investigation, and response.
Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.
Advance your cybersecurity program and get expert guidance where you need it most.
Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.
Prevent unauthorized access and exceed compliance requirements.
Stop email threats others miss and secure your organization against the #1 ransomware attack vector.
Prepare for the inevitable with 24/7 global breach response in-region and available on-site.
Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.
You can use the NETSTAT command to check the operation of local ports to see if they are configured properly and if they are receiving data.
You can access a wealth of helpful information about the NETSTAT utility from the Help utility on your Microsoft Windows workstation or server. This information can be found by clicking START | HELP | INDEX and by entering the keyword netstat.
Port
Protocol
NETSTAT - WinNT
NETSTAT - UNIX
21
FTP
netstat -an 1 | findstr 21
netstat -an 1 | grep 21
25
SMTP
netstat -an 1 | findstr 25
netstat -an 1 | grep 25
53
DNS (Note 1)
netstat -an 1 | findstr 53
Netstat -an 1 | grep 53
80
HTTP
netstat -an 1 | findstr 80
netstat -an 1 | grep 80
99
WebTrends Remote Reporting
netstat -an 1 | findstr 99
netstat -an 1 | grep 99
110
POP3
netstat -an 1 | findstr 110
netstat -an 1 | grep 110
137
WINS (Note 2)
netstat -an 1 | findstr 137
netstat -an 1 | grep 137
514
SYSLOG
netstat -an 1 | findstr 514
netstat -an 1 | grep 514
18184
OPSEC LEA
netstat -an 1 | findstr 18184
netstat -an 1 | grep 18184
Once you type the command, look for a response:
If the word "ESTABLISHED" appears, then the port is configured properly and it is receiving data.
To contact Trustwave about this article or to request support: