@trendy fully aligned with you. I can't seem to find an explanation for what I see!!
Do a netstat -lnp
on OpenWrt.
1 Like
This might be local firewall rules for outgoing connections on your PC.
Possibly related to some antivirus/antispam software.
1 Like
Here you go:
root@OpenWrt:~# netstat -lnp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 823/uhttpd
tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN 17442/dnsmasq
tcp 0 0 192.168.1.1:53 0.0.0.0:* LISTEN 17442/dnsmasq
tcp 0 0 10.0.0.1:53 0.0.0.0:* LISTEN 17442/dnsmasq
tcp 0 0 79.156.122.55:53 0.0.0.0:* LISTEN 17442/dnsmasq
tcp 0 0 192.168.10.1:53 0.0.0.0:* LISTEN 17442/dnsmasq
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 672/dropbear
tcp 0 0 :::80 :::* LISTEN 823/uhttpd
tcp 0 0 ::1:53 :::* LISTEN 17442/dnsmasq
tcp 0 0 fe80::46a5:6eff:fe47:3d55:53 :::* LISTEN 17442/dnsmasq
tcp 0 0 fe80::46a5:6eff:fe47:3d54:53 :::* LISTEN 17442/dnsmasq
tcp 0 0 fda7:3a7a:f62::1:53 :::* LISTEN 17442/dnsmasq
tcp 0 0 fe80::46a5:6eff:fe47:3d54:53 :::* LISTEN 17442/dnsmasq
tcp 0 0 fe80::46a5:6eff:fe47:3d55:53 :::* LISTEN 17442/dnsmasq
tcp 0 0 fe80::46a5:6eff:fe47:3d57:53 :::* LISTEN 17442/dnsmasq
tcp 0 0 fe80::1bc1:5d28:6c99:5ea4:53 :::* LISTEN 17442/dnsmasq
tcp 0 0 fe80::46a5:6eff:fe47:3d56:53 :::* LISTEN 17442/dnsmasq
tcp 0 0 2a02:9003:af:5feb:9927:7c7:57e3:c854:53 :::* LISTEN 17442/dnsmasq
tcp 0 0 fe80::9927:7c7:57e3:c854:53 :::* LISTEN 17442/dnsmasq
tcp 0 0 fe80::44a5:6eff:fe47:3d56:53 :::* LISTEN 17442/dnsmasq
tcp 0 0 :::22 :::* LISTEN 672/dropbear
udp 0 0 0.0.0.0:1194 0.0.0.0:* 1016/openvpn
udp 0 0 127.0.0.1:53 0.0.0.0:* 17442/dnsmasq
udp 0 0 192.168.1.1:53 0.0.0.0:* 17442/dnsmasq
udp 0 0 10.0.0.1:53 0.0.0.0:* 17442/dnsmasq
udp 0 0 79.156.122.55:53 0.0.0.0:* 17442/dnsmasq
udp 0 0 192.168.10.1:53 0.0.0.0:* 17442/dnsmasq
udp 0 0 0.0.0.0:67 0.0.0.0:* 17442/dnsmasq
udp 0 0 :::123 :::* 1302/ntpd
udp 0 0 :::546 :::* 1997/odhcp6c
udp 0 0 :::547 :::* 17474/odhcpd
udp 0 0 ::1:53 :::* 17442/dnsmasq
udp 0 0 fe80::46a5:6eff:fe47:3d55:53 :::* 17442/dnsmasq
udp 0 0 fe80::46a5:6eff:fe47:3d54:53 :::* 17442/dnsmasq
udp 0 0 fda7:3a7a:f62::1:53 :::* 17442/dnsmasq
udp 0 0 fe80::46a5:6eff:fe47:3d54:53 :::* 17442/dnsmasq
udp 0 0 fe80::46a5:6eff:fe47:3d55:53 :::* 17442/dnsmasq
udp 0 0 fe80::46a5:6eff:fe47:3d57:53 :::* 17442/dnsmasq
udp 0 0 fe80::1bc1:5d28:6c99:5ea4:53 :::* 17442/dnsmasq
udp 0 0 fe80::46a5:6eff:fe47:3d56:53 :::* 17442/dnsmasq
udp 0 0 2a02:9003:af:5feb:9927:7c7:57e3:c854:53 :::* 17442/dnsmasq
udp 0 0 fe80::9927:7c7:57e3:c854:53 :::* 17442/dnsmasq
udp 0 0 fe80::44a5:6eff:fe47:3d56:53 :::* 17442/dnsmasq
raw 0 0 ::%161:58 ::%1:* 58 17474/odhcpd
raw 0 0 ::%158:58 ::%2:* 58 1997/odhcp6c
Active UNIX domain sockets (only servers)
Proto RefCnt Flags Type State I-Node PID/Program name Path
unix 2 [ ACC ] STREAM LISTENING 2203 152/ubusd /var/run/ubus.sock
1 Like
False alarm from the nmap, most likely what @vgaetera said.
1 Like
This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.