TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "hacking"

<< < 1 2 3 4 5 6 > >>
Port: 10008/TCP
10008/TCP - Known port assignments (7 records found)
  • Service
    Details
    Source
  • octopus
    Octopus Multiplexer
    IANA
  •  
    Octopus Multiplexer, primary port for the CROMP protocol, which provides a platform-independent means for communication of objects across a network (Unofficial)
    WIKI
  • threat
    [threat] cheese worm In early year 2001, many exploit scripts for DNS TSIG name overflow would place a root shell on this port. In mid-2001, a worm was created that enters the system via this port (left behind by some other attacker), then starts scanning other machines from this port.
    Bekkoame
  • cheeseworm
    [trojan] Cheese worm
    SANS
  • lion
    [trojan] Lion
    SANS
  • lionworm
    [trojan] Lion Worm (exploits Solaris saadmind)
    SANS
  • trojan
    [trojan] li0n. Worm / Steals passwords / Rootkit dropper / Hacking tool / Distributed DoS tool. Works on Unix (Linux), together with BIND 8.2. Aliases: The Lion worm, Linux/Lion, 1i0n, Lion
    Simovits
Port: 11000/TCP
11000/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  • irisa
    IRISA
    IANA
  • threat
    [threat] Senna Spy Trojan Generator
    Bekkoame
  • sennaspytrojangenerator
    [trojan] Senna Spy Trojan Generator
    SANS
  • sennaspy
    [trojan] Senna Spy
    SANS
  • trojan
    [trojan] DataRape. Remote Access / Keylogger / Steals passwords. Works on Windows. Aliases: Backdoor.Latinus.c, Backdoor.Latinus.h
    Simovits
  • trojan
    [trojan] Senna Spy Trojan Generator. Anti-protection trojan / Remote Access / Hacking tool / Trojan constructor / Downloading trojan. Works on Windows 95, 98, ME, NT and 2000. Telnet is used as client. Aliases: Sstrojg, SSTG, Backdoor.Senna, Trojan Generator
    Simovits
Port: 12349/TCP
12349/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] BioNet
    Bekkoame
  • bionet
    [trojan] BioNet
    SANS
  • webhead
    [trojan] Webhead
    SANS
  • trojan
    [trojan] BioNet. Anti-protection trojan / Remote Access / Keylogger / Steals passwords / ICQ trojan / IRC trojan / AOL trojan / Port scanner / IP scanner / DoS tool / Remote peeker / Eavesdropper / Downloading trojan. Works on Windows 95, 98, ME, NT, 2000 and XP, together with ICQ and IRC software. Only versions 0.9x and later, works on NT. BioNet versions 3.x are not compatible with versions 2.x. Aliases: GCI BioNet, BN, Backdoor.Bionet, Bio, Backdoor.FK
    Simovits
  • trojan
    [trojan] The Saint. Remote Access / Hacking tool. Works on Windows. Aliases: WebHead
    Simovits
Port: 13000/TCP
13000/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] W32.Spybot
    Bekkoame
  • sennaspy
    [trojan] Senna Spy
    SANS
  • trojan
    [trojan] Senna Spy Trojan Generator. Anti-protection trojan / Remote Access / Hacking tool / Trojan constructor / Downloading trojan. Works on Windows 95, 98, ME, NT and 2000. Telnet is used as client. Aliases: Sstrojg, SSTG, Backdoor.Senna, Trojan Generator
    Simovits
Port: 16959/TCP
16959/TCP - Known port assignments (7 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] SubSeven
    Bekkoame
  • threat
    [threat] Subseven 2.1.4 DefCon 8
    Bekkoame
  • subseven2.1.4defcon8
    [trojan] Subseven 2.1.4 DefCon 8
    SANS
  • subseven
    [trojan] SubSeven
    SANS
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] Subseven 2.1.4 DefCon 8. Remote Access / Hacking tool / ICQ trojan. Works on Windows 95, 98 and NT, together with ICQ. Aliases: Troj_Sub7.214DC8, Troj_Sub7.382883
    Simovits
Port: 20331/TCP
20331/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] BLA trojan
    Bekkoame
  • blatrojan
    [trojan] BLA trojan
    SANS
  • trojan
    [trojan] BLA trojan. Anti-protection trojan / Remote Access / Keylogger / Steals passwords / Hacking tool / Proxy / Destructive trojan. Works on Windows 95 and 98. Aliases: Asian trojan, Backdoor.Trojan
    Simovits
Port: 27374/TCP
27374/TCP - Known port assignments (21 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] Bad Blood
    Bekkoame
  • threat
    [threat] Baste
    Bekkoame
  • threat
    [threat] Ramen
    Bekkoame
  • threat
    [threat] Seeker
    Bekkoame
  • threat
    [threat] SubSeven
    Bekkoame
  • threat
    [threat] Subseven 2.1.4 DefCon 8
    Bekkoame
  • threat
    [threat] SubSeven Muie
    Bekkoame
  • threat
    [threat] Ttfloader
    Bekkoame
  • subseven
    [trojan] SubSeven
    SANS
  • trojan
    [trojan] Bad Blood. Remote Access / Mail trojan. Works on Windows 95 and 98 (maybe on NT), together with MS Outlook Express. Aliases: Badblood
    Simovits
  • trojan
    [trojan] Fake SubSeven. Works on Windows 95, 98 and ME. Aliases: SubSeven 2.2
    Simovits
  • trojan
    [trojan] li0n. Worm / Steals passwords / Rootkit dropper / Hacking tool / Distributed DoS tool. Works on Unix (Linux), together with BIND 8.2. Aliases: The Lion worm, Linux/Lion, 1i0n, Lion
    Simovits
  • trojan
    [trojan] Ramen. Worm / HTML trojan / HTTP server / Hacking tool / Destructive trojan. Works on Unix (Linux). Linux Red Hat 6.x and early versions of 7.0. May also work on other Unix dialects such as FreeBSD and Linux SuSE, Mandrake and Cladera. The mail addresses used are [email protected] and [email protected]. Aliases: Linux.Ramen, Worm.Ramen, Elf.Ramen
    Simovits
  • trojan
    [trojan] Seeker. JavaScript trojan. Works on Windows 95 and 98, together with MS Internet Explorer and Netscape Navigator. Aliases: SEEKER.B, JS.Trojan.Seeker.b, JetHome, Troj/JetHome, JS_SEEKER.B, JS/Seeker.B, JS/Seeker.gen
    Simovits
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] SubSeven 2.1 Gold. Anti-protection trojan / Remote Access / ICQ trojan / Hacking tool / Port scanner / Port proxy. Works on Windows 95, 98 and NT. I may have troubble autoloading on NT. Aliases: Sub 7
    Simovits
  • trojan
    [trojan] Subseven 2.1.4 DefCon 8. Remote Access / Hacking tool / ICQ trojan. Works on Windows 95, 98 and NT, together with ICQ. Aliases: Troj_Sub7.214DC8, Troj_Sub7.382883
    Simovits
  • trojan
    [trojan] SubSeven 2.2. Remote Access / Keylogger / Steals passwords / Eavesdropper / Remote peeker / Sniffer / Proxy server / Hacking tool / FTP server. Works on Windows 95, 98, ME, NT and 2000. Aliases: Backdoor.SubSeven, Backdoor-G, BackDoor-G2, BackDoor-G22, TSB Trojan, Serbian Badman Trojan, Badman Trojan, Troj_Sub7.22
    Simovits
  • trojan
    [trojan] SubSeven Muie. Works on Windows 95, 98 and NT. Aliases: Backdoor.Muie, Troj_Muie, TROJ_SUB7.MUIE, Muie, BackDoor-EP
    Simovits
  • trojan
    [trojan] The Saint. Remote Access / Hacking tool. Works on Windows. Aliases: WebHead
    Simovits
Port: 33567/TCP
33567/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • lion
    [trojan] Lion
    SANS
  • t0rnrootkit
    [trojan] T0rn Rootkit
    SANS
  • trojan
    [trojan] li0n. Worm / Steals passwords / Rootkit dropper / Hacking tool / Distributed DoS tool. Works on Unix (Linux), together with BIND 8.2. Aliases: The Lion worm, Linux/Lion, 1i0n, Lion
    Simovits
  • trojan
    [trojan] T0rn Rootkit. Rootkit. Works on Unix (Linux). Aliases: Torn Rootkit
    Simovits
Port: 33568/TCP
33568/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • lion
    [trojan] Lion
    SANS
  • t0rnrootkit
    [trojan] T0rn Rootkit
    SANS
  • trojan
    [trojan] li0n. Worm / Steals passwords / Rootkit dropper / Hacking tool / Distributed DoS tool. Works on Unix (Linux), together with BIND 8.2. Aliases: The Lion worm, Linux/Lion, 1i0n, Lion
    Simovits
  • trojan
    [trojan] T0rn Rootkit. Rootkit. Works on Unix (Linux). Aliases: Torn Rootkit
    Simovits
Port: 51966/TCP
51966/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • threat
    [threat] Cafeini
    Bekkoame
  • cafeini
    [trojan] Cafeini
    SANS
  • trojan
    [trojan] Cafeini. Anti-protection trojan / Remote Access / Steals passwords / Hacking tool. Works on Windows 95, 98, NT and 2000. Telnet can also be used as client. Aliases: TROJ_CAFEIN
    Simovits
<< < 1 2 3 4 5 6 > >>

About TCP/UDP ports

TCP port 10008 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 10008 in the same order in which they were sent. Guaranteed communication over TCP port 10008 is the main difference between TCP and UDP. UDP port 10008 would not have guaranteed communication as TCP.
UDP on port 10008 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 10008 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States54.172.95.106