How to Check TCP ESXi and vCenter Ports in SynetoOS 6

Written By Christian Castagna (Administrator)

Updated at December 29th, 2025

→ Applies to: SynetoOS 6.x

 

Step 1. Connect to SynetoOS appliance via SSH as admin

ssh admin@<your_ip_address_or_hostname>

 

Step 2. Get root privileges

sudo su -

 

Step 3. Edit /tmp/check_vmware_ports.sh file

vi /tmp/check_vmware_ports.sh

IMPORTANT
Make sure to copy and paste the exact lines below.

#!/bin/bash

if [ -z "$1" ]; then
  echo "Usage on: $0 <IP or hostname ESXi/vCenter>"
  exit 1
fi

TARGET="$1"

# List of ports to check
declare -A PORTS
PORTS["443"]="API vSphere / vCenter (HTTPS)"
PORTS["902"]="ESXi host management, vSphere data mover (only TCP)"
PORTS["903"]="Remote console (less common)"
PORTS["5989"]="CIM/SMASH API (hardware interrogation)"
PORTS["22"]="SSH (optional, for testing purposes)"

# Function for TCP port check
check_tcp() {
  local port=$1
  nc -z -w2 "$TARGET" "$port" &>/dev/null
  if [ $? -eq 0 ]; then
    echo "✅ TCP $port opened - ${PORTS[$port]}"
  else
    echo "❌ TCP $port closed or filtered - ${PORTS[$port]}"
  fi
}

echo "🔍 Checking TCP ports on $TARGET..."
echo "----------------------------------------------------"

for port in "${!PORTS[@]}"; do
  check_tcp "$port"
done

echo "----------------------------------------------------"
echo "✅ Check completed."

Save and EXIT

:wq

 

Step 4. Give permissions to /tmp/check_vmware_ports.sh file

chmod +x /tmp/check_vmware_ports.sh

 

Step 5. Run the script (replace <IP_address> with the ESXi/vCenter IP or hostname)

/tmp/check_vmware_ports.sh <IP_address>

EXAMPLE

/tmp/check_vmware_ports.sh 192.168.101.10

EXAMPLE OUTPUT

Initiating SYN Stealth Scan at 10:23
Scanning 192.168.101.6 [1000 ports]
Discovered open port 80/tcp on 192.168.101.6
Discovered open port 443/tcp on 192.168.101.6
Discovered open port 22/tcp on 192.168.101.6
Discovered open port 5989/tcp on 192.168.101.6
Discovered open port 9080/tcp on 192.168.101.6
Discovered open port 8000/tcp on 192.168.101.6
Discovered open port 902/tcp on 192.168.101.6
Discovered open port 8300/tcp on 192.168.101.6
Completed SYN Stealth Scan at 10:23, 4.83s elapsed (1000 total ports)
Initiating Service scan at 10:23
Scanning 8 services on 192.168.101.6
Service scan Timing: About 50.00% done; ETC: 10:24 (0:00:47 remaining)