Knowing what services are running on your systems, and being able to identify if and when any of those services change, is the first step in securing your netwsork. Many tools can accomplish this, but ...
Port 22, for example, is reserved for SSH connections and port 80 is reserved for HTTP web traffic. You should only scan ports on networks where you have explicit permission to do so. Port scanning ...