Port scanning is a technique to check TCP/IP
ports to see what services are available. For example, port 80 is typically a web server, port 25 is SMTP used by Internet mail and so on. Unauthorized port scanning, for any reason, is strictly prohibited. This includes unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network.