Ejecute los comandos que me dijeron y este fue el resultado:
Código:
[root@server ~]# iptables-save
[root@server ~]# netstat -na | grep LISTEN
tcp 0 0 0.0.0.0:8000 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:8001 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:2082 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:2083 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:2084 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:3306 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:143 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:10000 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN
unix 2 [ ACC ] STREAM LISTENING 20165539 private/verify
unix 2 [ ACC ] STREAM LISTENING 20167006 /var/lib/mysql/mysql.sock
unix 2 [ ACC ] STREAM LISTENING 27134091 /dev/log
unix 2 [ ACC ] STREAM LISTENING 20165543 public/flush
unix 2 [ ACC ] STREAM LISTENING 20165547 private/proxymap
unix 2 [ ACC ] STREAM LISTENING 20165551 private/smtp
unix 2 [ ACC ] STREAM LISTENING 20165555 private/relay
unix 2 [ ACC ] STREAM LISTENING 20165559 public/showq
unix 2 [ ACC ] STREAM LISTENING 20165563 private/error
unix 2 [ ACC ] STREAM LISTENING 20165567 private/local
unix 2 [ ACC ] STREAM LISTENING 20165571 private/virtual
unix 2 [ ACC ] STREAM LISTENING 20165575 private/lmtp
unix 2 [ ACC ] STREAM LISTENING 20165579 private/anvil
unix 2 [ ACC ] STREAM LISTENING 20165583 private/maildrop
unix 2 [ ACC ] STREAM LISTENING 20165587 private/old-cyrus
unix 2 [ ACC ] STREAM LISTENING 20165591 private/cyrus
unix 2 [ ACC ] STREAM LISTENING 20165595 private/uucp
unix 2 [ ACC ] STREAM LISTENING 20165599 private/ifmail
unix 2 [ ACC ] STREAM LISTENING 20165603 private/bsmtp
unix 2 [ ACC ] STREAM LISTENING 20165516 public/cleanup
unix 2 [ ACC ] STREAM LISTENING 20165523 private/rewrite
unix 2 [ ACC ] STREAM LISTENING 20165527 private/bounce
unix 2 [ ACC ] STREAM LISTENING 20165531 private/defer
unix 2 [ ACC ] STREAM LISTENING 20165535 private/trace
[
[root@server ~]#
[root@server ~]# ps aux | grep named
[root@server ~]# nmap localhost
Starting Nmap 4.03 ( http://www.insecure.org/nmap/ ) at 2006-05-30 18:02 CEST
Interesting ports on localhost.localdomain (127.0.0.1):
(The 1663 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
80/tcp open http
110/tcp open pop3
111/tcp open rpcbind
143/tcp open imap
443/tcp open https
3306/tcp open mysql
8000/tcp open http-alt
10000/tcp open snet-sensor-mgmt
Nmap finished: 1 IP address (1 host up) scanned in 0.086 seconds