Localhost Nmap scan result

Hello Friends , I am a new user in parrotsec OS . I installed parrotsec in my laptop and used. today I scanned 127.0.0.1 for security reason with nmap but this ports are always open . I want to know why this ports are opened and what for . And can i close this ports . Thank All . Sorry For My noob English .

Starting Nmap 7.70 ( https://nmap.org ) at 2019-07-02 13:10 +0630
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000024s latency).
Not shown: 997 closed ports
PORT     STATE SERVICE          VERSION
3000/tcp open  http             Apache httpd 2.2.3 ((CentOS))
|_http-server-header: Apache/2.2.3 (CentOS)
|_http-title: Apache HTTP Server Test Page powered by CentOS
6789/tcp open  ibm-db2-admin?
8081/tcp open  blackice-icecap?
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest: 
|     HTTP/1.0 405 Method Not Allowed
|     Date: Tue, 02 Jul 2019 06:40:09 GMT
|     Content-Length: 0
|   GenericLines, Help, Kerberos, RTSPRequest, SIPOptions, SSLSessionReq, TLSSessionReq, WWWOFFLEctrlstat: 
|     HTTP/1.1 400 Bad Request
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Request
|   HTTPOptions: 
|     HTTP/1.0 204 No Content
|     Access-Control-Allow-Headers: Accept, Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token, Authorization
|     Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, DELETE
|     Access-Control-Allow-Origin: *
|     Referrer-Policy: same-origin
|     X-Content-Type-Options: nosniff
|     X-Frame-Options: DENY
|     X-Xss-Protection: 1; mode=block
|_    Date: Tue, 02 Jul 2019 06:40:09 GMT
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port8081-TCP:V=7.70%I=7%D=7/2%Time=5D1AFC49%P=x86_64-pc-linux-gnu%r(Get
SF:Request,5B,"HTTP/1\.0\x20405\x20Method\x20Not\x20Allowed\r\nDate:\x20Tu
SF:e,\x2002\x20Jul\x202019\x2006:40:09\x20GMT\r\nContent-Length:\x200\r\n\
SF:r\n")%r(FourOhFourRequest,5B,"HTTP/1\.0\x20405\x20Method\x20Not\x20Allo
SF:wed\r\nDate:\x20Tue,\x2002\x20Jul\x202019\x2006:40:09\x20GMT\r\nContent
SF:-Length:\x200\r\n\r\n")%r(SIPOptions,67,"HTTP/1\.1\x20400\x20Bad\x20Req
SF:uest\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x2
SF:0close\r\n\r\n400\x20Bad\x20Request")%r(WWWOFFLEctrlstat,67,"HTTP/1\.1\
SF:x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf
SF:-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(GenericLine
SF:s,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain
SF:;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request
SF:")%r(HTTPOptions,188,"HTTP/1\.0\x20204\x20No\x20Content\r\nAccess-Contr
SF:ol-Allow-Headers:\x20Accept,\x20Content-Type,\x20Content-Length,\x20Acc
SF:ept-Encoding,\x20X-CSRF-Token,\x20Authorization\r\nAccess-Control-Allow
SF:-Methods:\x20POST,\x20GET,\x20OPTIONS,\x20PUT,\x20DELETE\r\nAccess-Cont
SF:rol-Allow-Origin:\x20\*\r\nReferrer-Policy:\x20same-origin\r\nX-Content
SF:-Type-Options:\x20nosniff\r\nX-Frame-Options:\x20DENY\r\nX-Xss-Protecti
SF:on:\x201;\x20mode=block\r\nDate:\x20Tue,\x2002\x20Jul\x202019\x2006:40:
SF:09\x20GMT\r\n\r\n")%r(RTSPRequest,67,"HTTP/1\.1\x20400\x20Bad\x20Reques
SF:t\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20cl
SF:ose\r\n\r\n400\x20Bad\x20Request")%r(Help,67,"HTTP/1\.1\x20400\x20Bad\x
SF:20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnectio
SF:n:\x20close\r\n\r\n400\x20Bad\x20Request")%r(SSLSessionReq,67,"HTTP/1\.
SF:1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=u
SF:tf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(TLSSessio
SF:nReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/pl
SF:ain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Requ
SF:est")%r(Kerberos,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type
SF::\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x2
SF:0Bad\x20Request");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 154.28 seconds

I don’t think so anything is running , as you see 400
If yoy have worry, then kill that port

Maybe someservice runninf at 8081

Try scanning individual info of 8081 & post it

1 Like

nmap is not really the best for scanning localhost. You are better off using netstat like this:

sudo netstat -tnlup

You are better off using nmap on another host to scan parrot.

1 Like

Remote IPs can’t access your 127.0.0.1 address :slight_smile:

This topic was automatically closed 120 days after the last reply. New replies are no longer allowed.