TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "dcom"

Port: 135/TCP
135/TCP - Known port assignments (22 records found)
  • Service
    Details
    Source
  •  
    DCE endpoint resolution (Official)
    WIKI
  • epmap
    DCE endpoint resolution
    IANA
  •  
    Microsoft EPMAP (End Point Mapper), also known as DCE/RPC Locator service, used to remotely manage services including DHCP server, DNS server and WINS. Also used by DCOM (Unofficial)
    WIKI
  • loc-srv
    NCS local location broker
    SANS
  • threat
    [threat] Secefa
    Bekkoame
  • threat
    [threat] W32.Kiman
    Bekkoame
  • threat
    [threat] Femot
    Bekkoame
  • threat
    [threat] W32.Blaster.Worm
    Bekkoame
  • threat
    [threat] W32.Francette.Worm
    Bekkoame
  • threat
    [threat] W32.Explet
    Bekkoame
  • threat
    [threat] W32.Kibuv.Worm
    Bekkoame
  • threat
    [threat] W32.Lovgate
    Bekkoame
  • threat
    [threat] W32.Maslan
    Bekkoame
  • threat
    [threat] W32.Mytob
    Bekkoame
  • threat
    [threat] W32.Reatle
    Bekkoame
  • threat
    [threat] W32.Spybot
    Bekkoame
  • threat
    [threat] W32.Welchia
    Bekkoame
  • threat
    [threat] W32.Yaha
    Bekkoame
  • threat
    [threat] W32.Cissi
    Bekkoame
  • threat
    [threat] W32.HLLW.Gaobot
    Bekkoame
  • threat
    [threat] W32.HLLW.Polybot
    Bekkoame
  • threat
    [threat] W32.Kassbot
    Bekkoame
Port: 135/UDP
135/UDP - Known port assignments (20 records found)
  • Service
    Details
    Source
  • epmap
    DCE endpoint resolution
    IANA
  •  
    Microsoft EPMAP (End Point Mapper), also known as DCE/RPC Locator service, used to remotely manage services including DHCP server, DNS server and WINS. Also used by DCOM (Unofficial)
    WIKI
  •  
    DCE endpoint resolution (Official)
    WIKI
  • loc-srv
    Location Service
    SANS
  • threat
    [threat] W32.Blaster.Worm
    Bekkoame
  • threat
    [threat] W32.Cissi
    Bekkoame
  • threat
    [threat] W32.Explet
    Bekkoame
  • threat
    [threat] W32.Francette.Worm
    Bekkoame
  • threat
    [threat] W32.HLLW.Gaobot
    Bekkoame
  • threat
    [threat] W32.HLLW.Polybot
    Bekkoame
  • threat
    [threat] W32.Kassbot
    Bekkoame
  • threat
    [threat] W32.Kibuv.Worm
    Bekkoame
  • threat
    [threat] W32.Lovgate
    Bekkoame
  • threat
    [threat] W32.Maslan
    Bekkoame
  • threat
    [threat] W32.Mytob
    Bekkoame
  • threat
    [threat] W32.Reatle
    Bekkoame
  • threat
    [threat] W32.Spybot
    Bekkoame
  • threat
    [threat] W32.Welchia
    Bekkoame
  • threat
    [threat] W32.Yaha
    Bekkoame
  • threat
    [threat] Femot
    Bekkoame
Port: 1026/TCP
1026/TCP - Known port assignments (11 records found)
  • Service
    Details
    Source
  • cap
    Calendar Access Protocol
    IANA
  •  
    Often used by Microsoft DCOM services (Unofficial)
    WIKI
  • trojan
    [trojan] BDDT. Remote Access. Works on Windows.
    Simovits
  • trojan
    [trojan] Dark IRC. Remote Access / FTP server / IRC trojan / Distributed DoS tool. Works on Windows, together with an IRC software. Aliases: Backdoor.IRC.Dark, Backdoor.Darkirc, Palukka, Backdoor.Palukka, Backdoor.QZ, Win32.DarkIRC, DDoS.Win32.Palukka, Troj/Palukka
    Simovits
  • trojan
    [trojan] DataSpy Network X. Remote Access / Keylogger / Downloading trojan / Port scanner / DoS tool / IRC trojan / Port proxy / Hacking tool / Destructive trojan. Works on Windows. Aliases: DSNX, Win32.DSNX, Backdoor.DSNX, BackDoor.UK, Trojan.Win32.DSNX, Troj/Dsnx
    Simovits
  • trojan
    [trojan] Delta Remote Access. Remote Access / Trojan dropper. Works on Windows. Aliases: DRA, Backdoor.DRA
    Simovits
  • trojan
    [trojan] Dosh. Remote Access. Works on Windows. Aliases: Backdoor.Dosh
    Simovits
  • trojan
    [trojan] Duddie. Remote Access / Keylogger / Destructive trojan. Works on Windows. Aliases: Backdoor.Duddie
    Simovits
  • trojan
    [trojan] IRC Contact. Remote Access / IRC trojan. Works on Windows 95, 98 and ME, together with mIRC and Pirch. Aliases: IRC Contact Configuration Tool, IrcContact, Backdoor.IRC.Contact
    Simovits
  • trojan
    [trojan] Remote Explorer 2000. Remote Access / Steals passwords. Works on Windows. Aliases: RE2K, Backdoor.RE2K
    Simovits
  • trojan
    [trojan] RUX The TIc.K. Remote Access / Downloading trojan. Works on Windows. Used homepage is http://www.livelist.rnsys.org/. Aliases: Backdoor.RUX, Backdoor.RUX.Tick.40.b, Rux the Flu, Globale Project Rux
    Simovits
Port: 1029/TCP
1029/TCP - Known port assignments (8 records found)
  • Service
    Details
    Source
  • solid-mux
    Solid Mux Server
    IANA
  •  
    Often used by Microsoft DCOM services (Official)
    WIKI
  • threat
    [threat] W32.Kipis
    Bekkoame
  • threat
    [threat] W32.Kobot
    Bekkoame
  • trojan
    [trojan] Clandestine. Works on Windows. Aliases: TrojanDropper.Win32.Small.f, Backdoor.RSC
    Simovits
  • trojan
    [trojan] KWM. Remote Access / Keylogger / Steals passwords / Downloading trojan. Works on Windows. Aliases: Backdoor.KWM
    Simovits
  • trojan
    [trojan] Litmus. Remote Access / IRC trojan. Works on Windows, together with an IRC software. Aliases: Backdoor.Litmus, Backdoor.JZ, LTM
    Simovits
  • trojan
    [trojan] SubSARI. Remote Access / Keylogger / Steals passwords / FTP server. Works on Windows 95, 98 and ME. Aliases: Backdoor.SubSARI
    Simovits

About TCP/UDP ports

TCP port 135 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 135 in the same order in which they were sent. Guaranteed communication over TCP port 135 is the main difference between TCP and UDP. UDP port 135 would not have guaranteed communication as TCP.
UDP on port 135 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 135 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States3.92.84.253