TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "cisco"

<< < 1 2 3 4 5 6 7 8 9 > >>
Port: 1995/UDP
1995/UDP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • perf-port
    cisco perf port
    IANA
Port: 1995/TCP
1995/TCP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • perf-port
    cisco perf port
    IANA
Port: 1996/UDP
1996/UDP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • tr-rsrb-port
    cisco Remote SRB port
    IANA
Port: 1996/TCP
1996/TCP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • tr-rsrb-port
    cisco Remote SRB port
    IANA
Port: 1997/UDP
1997/UDP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • gdp-port
    cisco Gateway Discovery Protocol
    IANA
Port: 1997/TCP
1997/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • gdp-port
    cisco Gateway Discovery Protocol
    IANA
  •  
    Chizmo Networks Transfer Tool (Official)
    WIKI
Port: 1998/TCP
1998/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • x25-svc-port
    cisco X.25 service (XOT)
    IANA
  •  
    Cisco X.25 over TCP (XOT) service (Official)
    WIKI
Port: 1998/UDP
1998/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • x25-svc-port
    cisco X.25 service (XOT)
    IANA
  •  
    Cisco X.25 over TCP (XOT) service (Official)
    WIKI
Port: 1999/UDP
1999/UDP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • tcp-id-port
    cisco identification port
    IANA
Port: 1999/TCP
1999/TCP - Known port assignments (11 records found)
  • Service
    Details
    Source
  • tcp-id-port
    cisco identification port
    IANA
  • threat
    [threat] Back Door
    Bekkoame
  • threat
    [threat] Bifrose
    Bekkoame
  • threat
    [threat] SubSeven
    Bekkoame
  • threat
    [threat] TransScout
    Bekkoame
  • backdoor
    [trojan] BackDoor
    SANS
  • subseven
    [trojan] SubSeven
    SANS
  • transscout
    [trojan] TransScout
    SANS
  • trojan
    [trojan] Back Door. Remote Access / ICQ trojan. Works on Windows 95, 98 and NT.
    Simovits
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] TransScout. Remote Access / Keylogger / Steals passwords. Works on Windows 95 and 98. Possibly also on NT. Aliases: Transmission Scout, Backdoor.TScout, Tscout
    Simovits
<< < 1 2 3 4 5 6 7 8 9 > >>

About TCP/UDP ports

TCP port 1995 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 1995 in the same order in which they were sent. Guaranteed communication over TCP port 1995 is the main difference between TCP and UDP. UDP port 1995 would not have guaranteed communication as TCP.
UDP on port 1995 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 1995 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States3.145.23.123