How to Ping a UDP Port

Techwalla may earn compensation through affiliate links in this story. Learn more about our affiliate and product review process here.
A screen of HTML coding.
Image Credit: spainter_vfx/iStock/Getty Images

Ping is a command that reaches out and asks the intended recipient if it is there and waits for an answer. The intention of this is to make sure the recipient is there and to measure the amount of time that it takes to get a response. Ping is a good utility to measure round trip delay if users report network slowness. One issue with the original ping utility is that it was only intended to use Transmission Control Protocol, or TCP. This has since been adapted to tests that include User Datagram Protocol, or UDP, so that you can simulate traffic for programs that use strictly UDP to run.


Step 1

Open the program. Network MAPper (Nmap) is a utility that is used to scan open ports and end devices. This utility has a front end graphical user interface for windows called Zenmap. This is not a standard program that is preinstalled with windows but can be downloaded for free from the nmap website. This utility requires an additional file called WinPcap, which can only be installed by a person with administrative permissions on the computer.


Video of the Day

Step 2

Enter the Internet protocol, or IP, address of the target in the field marked target. This is the IP address that you are trying to reach or the receiver of the UDP packet. Start with one IP, but as you learn to use the utility you can scan a whole group of IPs at a time.

Step 3

Enter the command in the command box. There are many different commands that this utility can perform but for this instance we will use the following command to indicate a UDP scan is what is wanted. "nmap -sU" The IP in this command should be replaced with your intended target. Then click "Scan."



Step 4

Recover the needed information from the scan window below. This scan includes 1,000 of the more common reports and the system will report back on each port. The port will appear to be in one of six states. The closed state is where a port needs to be sitting to be available for an attack. Scanning your own computer and or devices will allow you to discover where you are most exposed.



references & resources

Report an Issue

screenshot of the current page

Screenshot loading...