TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "log"

<< < 5 6 7 8 9 10 > >>
Port: 8010/TCP
8010/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  •  
    EMC2 (Legato) Networker or Sun Solcitice Backup (Official)
    WIKI
  •  
    XMPP File transfers (Unofficial)
    WIKI
  •  
    Unassigned
    IANA
  • wingate
    wingate protocol
    SANS
  • irdmi
    Web service, iTunes Radio streams
    Apple
  • threat
    [threat] WinGate v2.1 has a webserver on port 8010 for the "LogFile Service". If this port is open, then anyone can connect to WinGate in order read not only the logfiles, but any othe file on the drive WinGate was installed on.
    Bekkoame
Port: 8101/TCP
8101/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • ldoms-migr
    Logical Domains Migration
    IANA
  •  
    EMC2 (Legato) Networker or Sun Solcitice Backup (Official)
    WIKI
  • irdmi
    Web service, iTunes Radio streams
    Apple
Port: 9000/UDP
9000/UDP - Known port assignments (5 records found)
  • Service
    Details
    Source
  • cslistener
    CSlistener
    IANA
  •  
    EMC2 (Legato) Networker or Sun Solcitice Backup (Official)
    WIKI
  •  
    UDPCast (Official)
    WIKI
  •  
    QuickTime Streaming Server
    Apple
  • threat
    [threat] Asheron's Call This port is used in Microsoft's massively-multiplayer game called "Asheron's Call". The game can continue to contact the player even after the player has logged out.
    Bekkoame
Port: 12975/TCP
12975/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    LogMeIn Hamachi (VPN tunnel software; also port 32976) - used to connect to Mediation Server (bibi.hamachi.cc); will attempt to use SSL (TCP port 443) if both 12975 & 32976 fail to connect (Unofficial)
    WIKI
  •  
    Unassigned
    IANA
  • backdoor-qr
    [trojan] QR keylogger/remote access
    SANS
Port: 13216/UDP
13216/UDP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • bcslogc
    Black Crow Software application logging
    IANA
Port: 13216/TCP
13216/TCP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • bcslogc
    Black Crow Software application logging
    IANA
Port: 16162/TCP
16162/TCP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • solaris-audit
    Solaris Audit - secure remote audit log
    IANA
Port: 16959/TCP
16959/TCP - Known port assignments (7 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] SubSeven
    Bekkoame
  • threat
    [threat] Subseven 2.1.4 DefCon 8
    Bekkoame
  • subseven2.1.4defcon8
    [trojan] Subseven 2.1.4 DefCon 8
    SANS
  • subseven
    [trojan] SubSeven
    SANS
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] Subseven 2.1.4 DefCon 8. Remote Access / Hacking tool / ICQ trojan. Works on Windows 95, 98 and NT, together with ICQ. Aliases: Troj_Sub7.214DC8, Troj_Sub7.382883
    Simovits
Port: 23023/TCP
23023/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] Logged
    Bekkoame
  • logged
    [trojan] Logged
    SANS
  • trojan
    [trojan] Logged. Remote Access / Keylogger. Works on Windows 95, 98 and NT. Aliases: Backdoor.Logged
    Simovits
Port: 27374/TCP
27374/TCP - Known port assignments (21 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] Bad Blood
    Bekkoame
  • threat
    [threat] Baste
    Bekkoame
  • threat
    [threat] Ramen
    Bekkoame
  • threat
    [threat] Seeker
    Bekkoame
  • threat
    [threat] SubSeven
    Bekkoame
  • threat
    [threat] Subseven 2.1.4 DefCon 8
    Bekkoame
  • threat
    [threat] SubSeven Muie
    Bekkoame
  • threat
    [threat] Ttfloader
    Bekkoame
  • subseven
    [trojan] SubSeven
    SANS
  • trojan
    [trojan] Bad Blood. Remote Access / Mail trojan. Works on Windows 95 and 98 (maybe on NT), together with MS Outlook Express. Aliases: Badblood
    Simovits
  • trojan
    [trojan] Fake SubSeven. Works on Windows 95, 98 and ME. Aliases: SubSeven 2.2
    Simovits
  • trojan
    [trojan] li0n. Worm / Steals passwords / Rootkit dropper / Hacking tool / Distributed DoS tool. Works on Unix (Linux), together with BIND 8.2. Aliases: The Lion worm, Linux/Lion, 1i0n, Lion
    Simovits
  • trojan
    [trojan] Ramen. Worm / HTML trojan / HTTP server / Hacking tool / Destructive trojan. Works on Unix (Linux). Linux Red Hat 6.x and early versions of 7.0. May also work on other Unix dialects such as FreeBSD and Linux SuSE, Mandrake and Cladera. The mail addresses used are [email protected] and [email protected]. Aliases: Linux.Ramen, Worm.Ramen, Elf.Ramen
    Simovits
  • trojan
    [trojan] Seeker. JavaScript trojan. Works on Windows 95 and 98, together with MS Internet Explorer and Netscape Navigator. Aliases: SEEKER.B, JS.Trojan.Seeker.b, JetHome, Troj/JetHome, JS_SEEKER.B, JS/Seeker.B, JS/Seeker.gen
    Simovits
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] SubSeven 2.1 Gold. Anti-protection trojan / Remote Access / ICQ trojan / Hacking tool / Port scanner / Port proxy. Works on Windows 95, 98 and NT. I may have troubble autoloading on NT. Aliases: Sub 7
    Simovits
  • trojan
    [trojan] Subseven 2.1.4 DefCon 8. Remote Access / Hacking tool / ICQ trojan. Works on Windows 95, 98 and NT, together with ICQ. Aliases: Troj_Sub7.214DC8, Troj_Sub7.382883
    Simovits
  • trojan
    [trojan] SubSeven 2.2. Remote Access / Keylogger / Steals passwords / Eavesdropper / Remote peeker / Sniffer / Proxy server / Hacking tool / FTP server. Works on Windows 95, 98, ME, NT and 2000. Aliases: Backdoor.SubSeven, Backdoor-G, BackDoor-G2, BackDoor-G22, TSB Trojan, Serbian Badman Trojan, Badman Trojan, Troj_Sub7.22
    Simovits
  • trojan
    [trojan] SubSeven Muie. Works on Windows 95, 98 and NT. Aliases: Backdoor.Muie, Troj_Muie, TROJ_SUB7.MUIE, Muie, BackDoor-EP
    Simovits
  • trojan
    [trojan] The Saint. Remote Access / Hacking tool. Works on Windows. Aliases: WebHead
    Simovits
<< < 5 6 7 8 9 10 > >>

About TCP/UDP ports

TCP port 8010 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 8010 in the same order in which they were sent. Guaranteed communication over TCP port 8010 is the main difference between TCP and UDP. UDP port 8010 would not have guaranteed communication as TCP.
UDP on port 8010 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 8010 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States18.188.142.146