If you need to verify whether an application has established a network connection or how many ports are open on your network, you can use any of these tools.

Table of Contents


nmap allows you to see which network ports are open on any device. This is the basic usage:

nmap IP
# where IP is an IP address (local or public), an IP range or a CIDR block.
# You can also use hostnames.

By default, it shows ports that are open:

  • ‘open’ means that an application is actively accepting TCP connections, UDP datagrams or SCTP associations on that port.
  • ‘filtered’ means that some firewall prevents nmap to reach that port.
  • ‘closed’ means port is accesible but there is no application listening on it.

By default, nmap checks 1000 common ports (TCP), but you can scan an specific port with -p PORT where PORT can be a number or a range.

nmap -p 80

To scan UDP ports, you need to add -Su and -p U: and the port number, several numbers separated by commas or a range.

Other parameters you can use are:

  • -Pn: treat hosts as online, skip host discovery.
  • -sn: ping scan.
  • -sV: show more info about service that is using a port.
  • -F: reduce the number of scanned ports in the default scan to 100.
  • -v: increase verbosity of the scan process.

You can learn more at the man page (man nmap).


Another port scanning utility. Following command checks if any device in the local network has port 22 open.

# you may need to use 'sudo' or log in as root
masscan -p22


This utility shows information about which applications are connected to the network. The following command will show all established TCP connections (sockets) and the process name (and ID) that invoke every connection.

ss -ntp
# 'n' stands for not trying to resolve service names (always shows the port number),
# 't' for 'tcp'
# and 'p' for showing process info
$ ss -ntp
State         Recv-Q    Send-Q        Local Address:Port             Peer Address:Port     Process                                     
ESTAB         0         0              192.168.1.XX:38500           XXX.XX.XX.XXX:443       users:(("vivaldi-bin",pid=47567,fd=26))    
ESTAB         0         0              192.168.1.XX:58678          XX.XXX.XXX.XXX:993       users:(("thunderbird",pid=10399,fd=49))    
CLOSE-WAIT    1         0                  users:(("vivaldi-bin",pid=47567,fd=39))    
ESTAB         0         0              192.168.1.XX:47356           XX.XX.XXX.XXX:50332     users:(("syncthing",pid=803,fd=12))        
ESTAB         0         0                 users:(("bundle",pid=78907,fd=15))         
ESTAB         0         0              192.168.1.XX:49770        XXX.XXX.XXX.XXX:443       users:(("Discord",pid=3202,fd=28))         

You can use other parameters (more info at the man page):

  • -l: show only listening sockets.
  • -u: show UDP sockets.
  • -a: show listening and non-listening sockets.


A top-like console network traffic visualizer. You need to run it with sudo if your user does not have required permissions.

tshark (from wireshark-cli)

It’s the CLI version of WireShark. Capture packet data and write it to standard output or to a file. You need to run it with sudo if your user does not have required permissions.

sudo tshark > packets.txt