![Traffic data and patterns: (a) port 137, protocol = UDP, (b) port 139,... | Download Scientific Diagram Traffic data and patterns: (a) port 137, protocol = UDP, (b) port 139,... | Download Scientific Diagram](https://www.researchgate.net/publication/224146895/figure/fig1/AS:302838145142785@1449213648310/Traffic-data-and-patterns-a-port-137-protocol-UDP-b-port-139-protocol-TCP.png)
Traffic data and patterns: (a) port 137, protocol = UDP, (b) port 139,... | Download Scientific Diagram
![NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing](https://miloserdov.org/wp-content/uploads/2020/03/netbios-nmap-udp.png)
NetBIOS: what it is, how it works and how to use in information security - Ethical hacking and penetration testing
![networking - Does communication through UDP Port 137 always mean there is a port scan done on the host? - Super User networking - Does communication through UDP Port 137 always mean there is a port scan done on the host? - Super User](https://i.stack.imgur.com/5HRYS.jpg)
networking - Does communication through UDP Port 137 always mean there is a port scan done on the host? - Super User
![Traffic data and patterns: (a) port 137, protocol = UDP, (b) port 139,... | Download Scientific Diagram Traffic data and patterns: (a) port 137, protocol = UDP, (b) port 139,... | Download Scientific Diagram](https://www.researchgate.net/profile/Hui-Zhang-190/publication/224146895/figure/fig1/AS:302838145142785@1449213648310/Traffic-data-and-patterns-a-port-137-protocol-UDP-b-port-139-protocol-TCP_Q320.jpg)