TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "exploit"

1 2 > >>
Port: 1234/TCP
1234/TCP - Known port assignments (10 records found)
  • Service
    Details
    Source
  • search-agent
    Infoseek Search Agent
    IANA
  • hotline
    -
    SANS
  • threat
    [threat] Ultors Trojan
    Bekkoame
  • threat
    [threat] W32.Beagle
    Bekkoame
  • threat
    [threat] The bindshell.c program puts a backdoor root shell on this port by default. This assumes that you've already been compromised by some other exploit and that the hacker uses the default port.
    Bekkoame
  • trojan
    [trojan] Ultors Trojan. Remote Access. Works on Windows 3.1, 95, 98, ME, NT, 2000 and XP. Uses Telnet as the client. Aliases: Ultors Telnet Trojan, Utlor, Backdoor.Ultor
    Simovits
  • subsevenjavaclient
    [trojan] SubSeven Java client
    SANS
  • ultorstrojan
    [trojan] Ultors Trojan
    SANS
  • trojan
    [trojan] KiLo. Remote Access. Works on Windows.
    Simovits
  • threat
    [threat] SubSeven Java client
    Bekkoame
Port: 1234/UDP
1234/UDP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • search-agent
    Infoseek Search Agent
    IANA
  •  
    VLC media player default port for UDP/RTP stream (Official)
    WIKI
  • threat
    [threat] The bindshell.c program puts a backdoor root shell on this port by default. This assumes that you've already been compromised by some other exploit and that the hacker uses the default port.
    Bekkoame
Port: 1703/TCP
1703/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  • hb-engine
    hb-engine
    IANA
  • threat
    [threat] Exploiter
    Bekkoame
  • exploiter
    [trojan] Exploiter
    SANS
  • trojan
    [trojan] Exploiter. Remote Access / Steals passwords / Mail proxy. Works on Windows 95, 98 and ME. Exploiter was built on GirlFriend's source code.
    Simovits
Port: 2222/TCP
2222/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  • EtherNet/IP-1
    EtherNet/IP I/O
    IANA
  •  
    DirectAdmin default & ESET Remote Administration (Official)
    WIKI
  • amd
    [trojan] Rootshell left by AMD exploit
    SANS
  • trojan
    [trojan] SweetHeart. Remote Access. Works on Windows. Aliases: Backdoor.Zhang, Zhang
    Simovits
  • trojan
    [trojan] Way. Remote Access. Works on Windows. Aliases: Backdoor.Way, DeathQueen Island
    Simovits
Port: 3879/TCP
3879/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • appss-lm
    appss license manager
    IANA
  • threat
    [threat] An exploit for the gdm XDMCP vulnerability will bind a root shell to this port.
    Bekkoame
Port: 5760/TCP
5760/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] Portmap Remote Root Linux Exploit
    Bekkoame
  • portmapremoteroot
    [trojan] Portmap Remote Root Linux Exploit
    SANS
  • prrle
    [trojan] Portmap Remote Root Linux Exploit
    SANS
Port: 7000/TCP
7000/TCP - Known port assignments (26 records found)
  • Service
    Details
    Source
  •  
    Default for Vuze's built in HTTPS Bittorrent Tracker (Unofficial)
    WIKI
  • afs3-fileserver
    file server itself msdos
    SANS
  •  
    Avira Server Management Console (Unofficial)
    WIKI
  • afs3-fileserver
    file server itself
    IANA
  • threat
    [threat] Kazimas
    Bekkoame
  • threat
    [threat] Remote Grab
    Bekkoame
  • threat
    [threat] Spyboter
    Bekkoame
  • threat
    [threat] SubSeven
    Bekkoame
  • threat
    [threat] SubSeven 2.1 Gold
    Bekkoame
  • threat
    [threat] W32.Gaobot
    Bekkoame
  • threat
    [threat] W32.Mydoom
    Bekkoame
  • threat
    [threat] W32.Mytob
    Bekkoame
  • exploittranslation
    [trojan] Exploit Translation Server
    SANS
  • kazimas
    [trojan] Kazimas
    SANS
  • remotegrab
    [trojan] Remote Grab
    SANS
  • subseven2.1gold
    [trojan] SubSeven 2.1 Gold
    SANS
  • subseven
    [trojan] SubSeven
    SANS
  • trojan
    [trojan] Aladino. Anti-protection trojan / Remote Access / Keylogger / Proxy / FTP server / Telnet server. Works on Windows 95, 98, ME, NT and 2000. Telnet can also be used to access the server. Aliases: Backdoor.Aladino, Asuit
    Simovits
  • trojan
    [trojan] Gunsan. Anti-protection trojan / Remote Access / Worm / IRC trojan / Network trojan / Yahoo trojan / Destructive trojan / Virus / HTTP server. Works on Windows 95, 98, ME, NT, 2000 and XP, together with MS Outlook, Outlook Express and Yahoo! messenger. Aliases: W32.Gunsan, Backdoor.AHF, Skyliner, W32/Skyliner, Backdoor.Gunsan, Win32/[email protected]
    Simovits
  • trojan
    [trojan] Remote Grab. Screen shot capturer. Works on Windows 95 and 98. Aliases: MprMod
    Simovits
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] SubSeven 2.1 Gold. Anti-protection trojan / Remote Access / ICQ trojan / Hacking tool / Port scanner / Port proxy. Works on Windows 95, 98 and NT. I may have troubble autoloading on NT. Aliases: Sub 7
    Simovits
  • trojan
    [trojan] Theef. Anti-protection trojan / Remote Access / Keylogger / Port proxy / FTP server / Remote peeker. Works on Windows 95, 98, ME, NT and XP. Aliases: Backdoor.Theef, BackDoor.QW, Bkdr_Delf.AX
    Simovits
  • threat
    [threat] "xfont" (X Windows font server)
    Bekkoame
  • threat
    [threat] BAT.Boohoo.Worm
    Bekkoame
  • threat
    [threat] Exploit Translation Server
    Bekkoame
Port: 9704/UDP
9704/UDP - Known port assignments (4 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  •  
    EMC2 (Legato) Networker or Sun Solcitice Backup (Official)
    WIKI
  •  
    QuickTime Streaming Server
    Apple
  • threat
    [threat] A popular wu-fptd exploit drops a root shell on this port.
    Bekkoame
Port: 9704/TCP
9704/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  •  
    EMC2 (Legato) Networker or Sun Solcitice Backup (Official)
    WIKI
  •  
    Unassigned
    IANA
  • threat
    [threat] A popular Linux rpc.statd exploit will drop a root shell on this port.
    Bekkoame
  • threat
    [threat] A popular wu-fptd exploit drops a root shell on this port.
    Bekkoame
Port: 10008/UDP
10008/UDP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • octopus
    Octopus Multiplexer
    IANA
  •  
    Octopus Multiplexer, primary port for the CROMP protocol, which provides a platform-independent means for communication of objects across a network (Unofficial)
    WIKI
  • threat
    [threat] cheese worm In early year 2001, many exploit scripts for DNS TSIG name overflow would place a root shell on this port. In mid-2001, a worm was created that enters the system via this port (left behind by some other attacker), then starts scanning other machines from this port.
    Bekkoame
1 2 > >>

About TCP/UDP ports

TCP port 1234 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 1234 in the same order in which they were sent. Guaranteed communication over TCP port 1234 is the main difference between TCP and UDP. UDP port 1234 would not have guaranteed communication as TCP.
UDP on port 1234 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 1234 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States35.171.146.16