Class: Scan
Description A Scan attack is performed by cyber-assailants in a process of initial information-gathering known as footprinting. Scan attacks are used mostly to identify and enumerate active hosts on a network, and to determine the host operating system and available UDP and TCP network services that are running on the targeted hosts. A successful Scan attack can result in information disclosure.Platform: Generic
No platform descriptionDescription
Port scanning was detected. Port scanning is a process of determining which ports on a computer are open by sending requests to them. This process could be the first step of an attack. (Or, port scanning could be an attack prevention measure that helps a user or company to spot potential attack targets in the organization.) The port status is determined by sending a UDP pocket.Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!