TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "cd"

<< < 1 2 3 4
Port: 15858/TCP
15858/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] CDK
    Bekkoame
  • cdk
    [trojan] CDK
    SANS
Port: 31337/UDP
31337/UDP - Known port assignments (6 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • backorifice
    cDc Back Orifice remote admin tool
    SANS
  • threat
    [threat] Back Orifice Back Orifice is a backdoor program that commonly runs at this port. Scans on this port are usually looking for Back Orifice.
    Bekkoame
  • threat
    [threat] Deep BO
    Bekkoame
  • trojan
    [trojan] Back Orifice. Remote Access. Works on Windows 95 and 98. There exists several hacked versions of Back Orifice. There are also client versions for Unix and Macintosh. Boclient 57,856 bytes is DOS-client. Aliases: BO, cdc-BO, BoServe, BoClient, Orifice.dr, Trojan.Win32.BO, Body Odor, BackOrifice, Windows Trojan, Backdoor-N
    Simovits
  • trojan
    [trojan] Deep BO. Remote Access. Works on Windows 95, 98 and NT.
    Simovits
Port: 31338/TCP
31338/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • backorifice
    [trojan] Back Orifice
    SANS
  • buttfunnel
    [trojan] Butt Funnel
    SANS
  • trojan
    [trojan] Back Orifice. Remote Access. Works on Windows 95 and 98. There exists several hacked versions of Back Orifice. There are also client versions for Unix and Macintosh. Boclient 57,856 bytes is DOS-client. Aliases: BO, cdc-BO, BoServe, BoClient, Orifice.dr, Trojan.Win32.BO, Body Odor, BackOrifice, Windows Trojan, Backdoor-N
    Simovits
  • trojan
    [trojan] Butt Funnel. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] NetSpy (DK). Remote Access / Steals passwords. Works on Windows 95, 98, ME and NT. Aliases: DK NetSpy, Backdoor.NetSpy, W32.Gara
    Simovits
<< < 1 2 3 4

About TCP/UDP ports

TCP port 15858 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 15858 in the same order in which they were sent. Guaranteed communication over TCP port 15858 is the main difference between TCP and UDP. UDP port 15858 would not have guaranteed communication as TCP.
UDP on port 15858 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 15858 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States3.238.5.144