Call Us! 1-800-383-5193
Call Us! 1-800-383-5193
Call Us! 1-800-383-5193

Need Help?

Emergency Response Time custom

Our experts have had an average response time of 11.06 minutes in March 2021 to fix urgent issues.

We will keep your servers stable, secure and fast at all times for one fixed price.

Port 113 IDENT Requests – How to disable

by | Mar 29, 2021

Wondering how to disable Port 113 IDENT Requests? We can help you.

The Ident Protocol (Identification Protocol, Ident), is an Internet protocol that helps identify the user of a particular TCP connection. One popular daemon program for providing the ident service is identd.

Auth/Ident servers that usually run on the local user’s machine often end up with open port 113 and listen for incoming connections and queries from remote machines.

Generally, these querying machines provide a local and remote “port pair” describing some other already-existing connection between the machines. As a result, The user’s “ident” server is tasked with looking up and returning the connection’s “USER ID” and perhaps additional information, such as an email address, full name,

Here at Bobcares, we often get requests from our customers to fix issues regarding port 113 IDENT requests as a part of our Server Management Services. Today, let’s see how our Support techs disable this for our customers.

What causes Port 113 IDENT Requests

Generally, we can see port 113 return requests in any of the following:

1. From Nagios XI server to the originating host when submitting NSCA passive results.

2. While checking NRPE services.

3.  On the firewall logs.

Common causes for this issue is given below:

1. This is usually seen when we are running an NRPE check through XINETD with USERID included on the log_on_success or log_on_failure options in remote hosts /etc/xinetd.d/nrpe file.
2. It could also be because we are submitting passive results to the XI server through NSCA (which is running under XINETD) /etc/xinetd.d/nsca with the same options.

We must keep in mind that the USERID option requires an IDENT request to port 113 on the originating server to determine the USERID, that is why we can see it.

How to Disable Port 113 IDENT Requests

Then remove the USERID option from the log_on_failure AND log_on_success to stop the IDENT from occurring.

The file we need to change depends on:

1.  NRPE on remote host
2.  NSCA on Nagios XI server

We can either comment this line out or remove it completely:

# default: on
# description: NSCA (Nagios Service Check Acceptor)
service nsca
flags = REUSE
socket_type = stream
wait = no
user = nagios
group = nagios
server = /usr/local/nagios/bin/nsca
server_args = -c /usr/local/nagios/etc/nsca.cfg --inetd
log_on_failure += USERID
disable = no
only_from =

Once the changes are made, we need to restart the xinetd service using either of the commands below:

RHEL 7+|CentOS 7+|Oracle Linux 7+|Debian|Ubuntu 16/18/20
systemctl restart xinetd.service

[Need Assistance? We are available 24*7]


In short, we saw what causes port 113 IDENT requests along with the steps that our Support Techs follow to disable this for our customers.


Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.


var google_conversion_label = "owonCMyG5nEQ0aD71QM";


Submit a Comment

Your email address will not be published. Required fields are marked *

server management

Spend time on your business, not on your servers.


Or click here to learn more.

server management

Spend time on your business, not on your servers.


Or click here to learn more.