TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "available"

Port: 1645/TCP
1645/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  • sightline
    SightLine
    IANA
  •  
    radius auth, RADIUS authentication protocol (default for Cisco and Juniper Networks RADIUS servers, but see port 1812 below) (Unofficial)
    WIKI
  • datametrics
    datametrics
    SANS
  • threat
    [threat] Remote Authentication Dial In User Service (RADIUS) RADIUS, or Remote Authentication Dial-In User service, is a freely available distributed security system developed by Lucent Technologies InterNetworking Systems. Lucent has worked with the Internet Engineering Task Force (IETF) to define RADIUS as an interoperable method for distributed security on the Internet. RADIUS was designed based on a previous recommendation from the IETF's Network Access Server Working Requirements Group.
    Bekkoame
Port: 1645/UDP
1645/UDP - Known port assignments (5 records found)
  • Service
    Details
    Source
  • sightline
    SightLine
    IANA
  •  
    radius auth, RADIUS authentication protocol (default for Cisco and Juniper Networks RADIUS servers, but see port 1812 below) (Unofficial)
    WIKI
  • datametrics
    datametrics
    SANS
  • radius
    radius authentication
    SANS
  • threat
    [threat] Remote Authentication Dial In User Service (RADIUS) RADIUS, or Remote Authentication Dial-In User service, is a freely available distributed security system developed by Lucent Technologies InterNetworking Systems. Lucent has worked with the Internet Engineering Task Force (IETF) to define RADIUS as an interoperable method for distributed security on the Internet. RADIUS was designed based on a previous recommendation from the IETF's Network Access Server Working Requirements Group.
    Bekkoame
Port: 1680/UDP
1680/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • microcom-sbp
    microcom-sbp
    IANA
  • threat
    [threat] Carbon Copy v5.0 Carbon Copy is a remote control and file transfer software package that available for use under the Microsoft Windows Environment.
    Bekkoame
Port: 1680/TCP
1680/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • microcom-sbp
    microcom-sbp
    IANA
  • carboncopy
    Carbon Copy
    SANS
  • threat
    [threat] Carbon Copy v5.0 Carbon Copy is a remote control and file transfer software package that available for use under the Microsoft Windows Environment.
    Bekkoame
Port: 6000/TCP
6000/TCP - Known port assignments (8 records found)
  • Service
    Details
    Source
  • x11
    X Window System
    IANA
  •  
    X11 - used between an X client and server over the network (Official)
    WIKI
  • threat
    [threat] Lovgate
    Bekkoame
  • threat
    [threat] The Thing
    Bekkoame
  • thething
    [trojan] The Thing
    SANS
  • trojan
    [trojan] Aladino. Anti-protection trojan / Remote Access / Keylogger / Proxy / FTP server / Telnet server. Works on Windows 95, 98, ME, NT and 2000. Telnet can also be used to access the server. Aliases: Backdoor.Aladino, Asuit
    Simovits
  • trojan
    [trojan] NetBus. Remote Access / Keylogger / Eavesdropper. Works on Windows 95, 98, NT and 2000. Also with Unix (Linux). There also exists hacked versions of NetBus 2.0 by Atomic Toxic and Azote. ? Source code is available (v 1.53). Aliases: Sysedit, Backdoor.Netbus, W95.NetBus, Michal
    Simovits
  • trojan
    [trojan] The Thing. Remote Access / ICQ trojan. Works on Windows 95, 98 and NT, together with ICQ. Version 1.6 autoloads through altering System.ini and Win.ini. 1.5 uses Registry and System.ini to autoload. Aliases: Win32.TheThing.16 Trojan, XZip, Backdoor.TheThing, Backdoor.AB
    Simovits
Port: 12310/TCP
12310/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • precursor
    [trojan] PreCursor
    SANS
  • trojan
    [trojan] PreCursor. Remote Access / AOL trojan / IRC trojan / AIM trojan. Works on Windows 95, 98, ME and 2000, together with AOL, AIM and mIRC. Source code is not available but to a choosen few. Aliases: Backdoor.PreCursor
    Simovits
Port: 12345/TCP
12345/TCP - Known port assignments (28 records found)
  • Service
    Details
    Source
  • italk
    Italk Chat System
    IANA
  • threat
    [threat] Amitis
    Bekkoame
  • threat
    [threat] Ashley
    Bekkoame
  • threat
    [threat] cron / crontab
    Bekkoame
  • threat
    [threat] Fat Bitch trojan
    Bekkoame
  • threat
    [threat] GabanBus
    Bekkoame
  • threat
    [threat] icmp_client.c
    Bekkoame
  • threat
    [threat] icmp_pipe.c
    Bekkoame
  • threat
    [threat] Mypic
    Bekkoame
  • threat
    [threat] NetBus
    Bekkoame
  • threat
    [threat] NetBus Toy
    Bekkoame
  • threat
    [threat] NetBus worm
    Bekkoame
  • threat
    [threat] Notice how this port is the sequence of numbers "1 2 3 4 5". This is common chosen whenever somebody is asked to configure a port number. It is likewise chosen by programmers when creating default port numbers for their products. One very famous such uses is with NetBus. Trend Micro's OfficeScan products use this port.
    Bekkoame
  • threat
    [threat] Pie Bill Gates
    Bekkoame
  • threat
    [threat] Whack Job
    Bekkoame
  • threat
    [threat] X-bill
    Bekkoame
  • netbus
    [trojan] NetBus
    SANS
  • trojan
    [trojan] Ashley. Worm / IRC trojan / Mail trojan / Downloading trojan. Works on Windows 95, 98 and ME, together with MS Outlook and mIRC and Ircn.
    Simovits
  • trojan
    [trojan] BlueIce 2000. Works on Windows. Aliases: Backdoor.BlueIce
    Simovits
  • trojan
    [trojan] Mypic. Remote Access / Trojan dropper. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] NetBus. Remote Access / Keylogger / Eavesdropper. Works on Windows 95, 98, NT and 2000. Also with Unix (Linux). There also exists hacked versions of NetBus 2.0 by Atomic Toxic and Azote. ? Source code is available (v 1.53). Aliases: Sysedit, Backdoor.Netbus, W95.NetBus, Michal
    Simovits
  • trojan
    [trojan] Pie Bill Gates. Remote Access / Trojan dropper. Works on Windows 95, 98 and NT. Aliases: Bill.zip
    Simovits
  • trojan
    [trojan] Q-taz. Remote Access / Keylogger. Works on Windows. Aliases: Qtaz, Backdoor.Qtaz
    Simovits
  • trojan
    [trojan] Sensive. Remote Access. Works on Windows 98. Aliases: Backdoor.Sensive
    Simovits
  • trojan
    [trojan] Snape. Works on Windows. Aliases: Backdoor.Snape
    Simovits
  • trojan
    [trojan] Vagr Nocker. Remote Access / Steals passwords. Works on Windows. Aliases: Backdoor.Latinus.14, VAGR
    Simovits
  • trojan
    [trojan] ValvNet. Remote Access. Works on Windows 95, 98, ME and NT. Aliases: Valv - Not Earthy Trojan, Valv-Net
    Simovits
  • trojan
    [trojan] Whack Job. Remote Access / Trojan dropper. Works on Windows 95, 98 and NT.
    Simovits
Port: 12346/TCP
12346/TCP - Known port assignments (10 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] Fat Bitch trojan
    Bekkoame
  • threat
    [threat] GabanBus
    Bekkoame
  • threat
    [threat] NetBus
    Bekkoame
  • threat
    [threat] X-bill
    Bekkoame
  • fatbitchtrojan
    [trojan] Fat Bitch trojan
    SANS
  • gabanbus
    [trojan] GabanBus
    SANS
  • netbus
    [trojan] NetBus
    SANS
  • x-bill
    [trojan] X-bill
    SANS
  • trojan
    [trojan] NetBus. Remote Access / Keylogger / Eavesdropper. Works on Windows 95, 98, NT and 2000. Also with Unix (Linux). There also exists hacked versions of NetBus 2.0 by Atomic Toxic and Azote. ? Source code is available (v 1.53). Aliases: Sysedit, Backdoor.Netbus, W95.NetBus, Michal
    Simovits

About TCP/UDP ports

TCP port 1645 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 1645 in the same order in which they were sent. Guaranteed communication over TCP port 1645 is the main difference between TCP and UDP. UDP port 1645 would not have guaranteed communication as TCP.
UDP on port 1645 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 1645 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States3.239.57.87