TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "at"

<< < 5 6 7 8 9 10 11 12 13 > >>
Port: 4937/UDP
4937/UDP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • atsc-mh-ssc
    ATSC-M/H Service Signaling Channel
    IANA
Port: 4983/TCP
4983/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • att-intercom
    AT&T Intercom
    SANS
Port: 4983/UDP
4983/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • att-intercom
    AT&T Intercom
    SANS
Port: 5150/UDP
5150/UDP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • atmp
    Ascend Tunnel Management Protocol
    IANA
  •  
    ATMP Ascend Tunnel Management Protocol (Unofficial)
    WIKI
  •  
    Malware Cerberus RAT (Official)
    WIKI
Port: 5150/TCP
5150/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  • atmp
    Ascend Tunnel Management Protocol
    IANA
  •  
    ATMP Ascend Tunnel Management Protocol (Unofficial)
    WIKI
  •  
    Malware Cerberus RAT (Official)
    WIKI
  • trojan
    [trojan] Pizza. Remote Access. Works on Windows. Aliases: Backdoor.Pizza
    Simovits
Port: 5678/UDP
5678/UDP - Known port assignments (7 records found)
  • Service
    Details
    Source
  •  
    Mikrotik RouterOS Neighbor Discovery Protocol (MNDP) (Unofficial)
    WIKI
  • rrac
    Remote Replication Agent Connection
    IANA
  • rrac
    SNATMAP server. The SNATMAP service on port 5678 is used to determine the external Internet address of hosts so that connections between iChat users can properly function behind network address translation (NAT). The SNATMAP service simply communicates to clients the Internet address that connected to it. This service runs on an Apple server, but does not send personal information to Apple. When certain iChat AV features are used, this service will be contacted. Blocking this service may cause issues with iChat AV connections with hosts on networks that use NAT.
    Apple
  • threat
    [threat] osagent communication
    Bekkoame
  • threat
    [threat] A port for remote execution using the crexd/srexd services.
    Bekkoame
  • threat
    [threat] A frequent port some picks at random.
    Bekkoame
  • threat
    [threat] Port 5678 was originally specified for the PPTP protocol, but when the standard was ratified, port 1723 was chosen instead.
    Bekkoame
Port: 5678/TCP
5678/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  • rrac
    Remote Replication Agent Connection
    IANA
  • threat
    [threat] Port 5678 is the default port for the com.hp.util.rcat Java package (from Hewlett-Packard). This is a simple debugging package.
    Bekkoame
  • threat
    [threat] A frequent port some picks at random.
    Bekkoame
  • threat
    [threat] A port for remote execution using the crexd/srexd services.
    Bekkoame
  • threat
    [threat] Port 5678 was originally specified for the PPTP protocol, but when the standard was ratified, port 1723 was chosen instead.
    Bekkoame
Port: 6000/TCP
6000/TCP - Known port assignments (8 records found)
  • Service
    Details
    Source
  • x11
    X Window System
    IANA
  •  
    X11 - used between an X client and server over the network (Official)
    WIKI
  • threat
    [threat] Lovgate
    Bekkoame
  • threat
    [threat] The Thing
    Bekkoame
  • thething
    [trojan] The Thing
    SANS
  • trojan
    [trojan] Aladino. Anti-protection trojan / Remote Access / Keylogger / Proxy / FTP server / Telnet server. Works on Windows 95, 98, ME, NT and 2000. Telnet can also be used to access the server. Aliases: Backdoor.Aladino, Asuit
    Simovits
  • trojan
    [trojan] NetBus. Remote Access / Keylogger / Eavesdropper. Works on Windows 95, 98, NT and 2000. Also with Unix (Linux). There also exists hacked versions of NetBus 2.0 by Atomic Toxic and Azote. ? Source code is available (v 1.53). Aliases: Sysedit, Backdoor.Netbus, W95.NetBus, Michal
    Simovits
  • trojan
    [trojan] The Thing. Remote Access / ICQ trojan. Works on Windows 95, 98 and NT, together with ICQ. Version 1.6 autoloads through altering System.ini and Win.ini. 1.5 uses Registry and System.ini to autoload. Aliases: Win32.TheThing.16 Trojan, XZip, Backdoor.TheThing, Backdoor.AB
    Simovits
Port: 6556/TCP
6556/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] W32.Toxbot
    Bekkoame
  • trojan
    [trojan] AutoSpY. Anti-protection trojan / Remote Access / Worm / Network trojan / DoS tool / Telnet server / Virus dropper / Prank trojan. Works on Windows 95 and 98, together with MS Outlook. At least on version 1.2 Apocalipse, Telnet can be used as client. Aliases: AntiSpy, Backdoor.AntiSpy, Backdoor.AutoSpy
    Simovits
Port: 6776/UDP
6776/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • hnmp
    [threat] RAT:SubSeven This port often seen as part of the Sub7 communication. You may see a steady stream of connection attempts: this is because it uses this port separately from the command port in order to transfer information. Sometimes the control-connection thinks the agent is alive, and will continue to attempt this connection as well. Backdoor port in Sub7
    Bekkoame
<< < 5 6 7 8 9 10 11 12 13 > >>

About TCP/UDP ports

TCP port 4937 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 4937 in the same order in which they were sent. Guaranteed communication over TCP port 4937 is the main difference between TCP and UDP. UDP port 4937 would not have guaranteed communication as TCP.
UDP on port 4937 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 4937 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States3.236.214.123