----------------------------------------------------------------------------------
@MSGID: 2:5030/723 67ffb1f5
@REPLY: 2:5020/620.1 67ffa4a9
@CHRS: CP866 2
@TZUTC: 0300
Здраствуйте, Rinat!
RS> Хост такой имеется, порт тоже:
RS> --8<--
RS> root@localhost:/etc/wireguard# nc -vzu 193.138.218.220 51820
RS> Ncat: Version 7.92 ( https://nmap.org/ncat )
RS> Ncat: Connected to 193.138.218.220:51820.
RS> Ncat: UDP packet sent successfully
RS> Ncat: 1 bytes sent, 0 bytes received in 2.02 seconds.
RS> root@localhost:/etc/wireguard#
RS> --8<--
man nc:
CAVEATS
UDP port scans using the -uz combination of flags will always
report success irrespective of the target ma
chine`s state. However, in conjunction with a traffic sniffer
either on the target machine or an intermediary
device, the -uz combination could be useful for communications
diagnostics. Note that the amount of UDP traffic
generated may be limited either due to hardware resources and/or
configuration settings.
C UDP любая связь будет success, так как просто отсылается пакет.
Так что диагностика только "на слух" - пришел ли пакет к тебе оттуда или нет.
Alexey Khromov
--- GoldED+/LNX 1.1.5-b20250409
* Origin: - Вы в опасности! Вы окружены роботами! - (2:5030/723)
SEEN-BY: 46/49 50/109 361 104/117 221/6 240/1120
301/1 341/66 450/1024 452/28
SEEN-BY: 455/19 460/16 58 256 1124 5858 463/68
469/335 5000/111 5001/100
SEEN-BY: 5010/352 5015/42 46 5019/40 400 5020/101
113 545 620 715 830 846 848
SEEN-BY: 5020/1042 2992 4441 12000 5022/128 5030/49
115 500 723 1081 1474
SEEN-BY: 5030/1900 5050/151 5053/51 58 5054/30 89
5058/104 5059/37 5060/900
SEEN-BY: 5061/133 5083/1 444 6035/4 6078/80
6090/1
@PATH: 5030/723 460/58 5020/1042 4441