TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "root"

<< < 1 2 3 4 5 6 > >>
Port: 1094/TCP
1094/TCP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • rootd
    ROOTD
    IANA
Port: 1234/UDP
1234/UDP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • search-agent
    Infoseek Search Agent
    IANA
  •  
    VLC media player default port for UDP/RTP stream (Official)
    WIKI
  • threat
    [threat] The bindshell.c program puts a backdoor root shell on this port by default. This assumes that you've already been compromised by some other exploit and that the hacker uses the default port.
    Bekkoame
Port: 1234/TCP
1234/TCP - Known port assignments (10 records found)
  • Service
    Details
    Source
  • search-agent
    Infoseek Search Agent
    IANA
  • hotline
    -
    SANS
  • threat
    [threat] Ultors Trojan
    Bekkoame
  • threat
    [threat] W32.Beagle
    Bekkoame
  • threat
    [threat] The bindshell.c program puts a backdoor root shell on this port by default. This assumes that you've already been compromised by some other exploit and that the hacker uses the default port.
    Bekkoame
  • trojan
    [trojan] Ultors Trojan. Remote Access. Works on Windows 3.1, 95, 98, ME, NT, 2000 and XP. Uses Telnet as the client. Aliases: Ultors Telnet Trojan, Utlor, Backdoor.Ultor
    Simovits
  • subsevenjavaclient
    [trojan] SubSeven Java client
    SANS
  • ultorstrojan
    [trojan] Ultors Trojan
    SANS
  • trojan
    [trojan] KiLo. Remote Access. Works on Windows.
    Simovits
  • threat
    [threat] SubSeven Java client
    Bekkoame
Port: 1711/TCP
1711/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • pptconference
    pptconference
    IANA
  • trojan
    [trojan] yoyo. Rootkit / Remote Access. Works on Unix (Linux).
    Simovits
Port: 2222/TCP
2222/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  • EtherNet/IP-1
    EtherNet/IP I/O
    IANA
  •  
    DirectAdmin default & ESET Remote Administration (Official)
    WIKI
  • amd
    [trojan] Rootshell left by AMD exploit
    SANS
  • trojan
    [trojan] SweetHeart. Remote Access. Works on Windows. Aliases: Backdoor.Zhang, Zhang
    Simovits
  • trojan
    [trojan] Way. Remote Access. Works on Windows. Aliases: Backdoor.Way, DeathQueen Island
    Simovits
Port: 2407/TCP
2407/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • orion
    Orion
    IANA
  • trojan
    [trojan] yoyo. Rootkit / Remote Access. Works on Unix (Linux).
    Simovits
Port: 2555/TCP
2555/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  • compaq-wcp
    Compaq WCP
    IANA
  • lion
    [trojan] Lion
    SANS
  • t0rnrootkit
    [trojan] T0rn Rootkit
    SANS
  • trojan
    [trojan] li0n. Worm / Steals passwords / Rootkit dropper / Hacking tool / Distributed DoS tool. Works on Unix (Linux), together with BIND 8.2. Aliases: The Lion worm, Linux/Lion, 1i0n, Lion
    Simovits
  • trojan
    [trojan] T0rn Rootkit. Rootkit. Works on Unix (Linux). Aliases: Torn Rootkit
    Simovits
Port: 2600/TCP
2600/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  • hpstgmgr
    HPSTGMGR
    IANA
  • zebrasrv
    zebra service
    SANS
  • threat
    [threat] Digital RootBeer
    Bekkoame
  • digitalrootbeer
    [trojan] Digital RootBeer
    SANS
  • trojan
    [trojan] Digital RootBeer. Remote Access. Works on Windows 95 and 98. Aliases: Backdoor.Rootbeer
    Simovits
Port: 3879/TCP
3879/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • appss-lm
    appss license manager
    IANA
  • threat
    [threat] An exploit for the gdm XDMCP vulnerability will bind a root shell to this port.
    Bekkoame
Port: 5002/TCP
5002/TCP - Known port assignments (10 records found)
  • Service
    Details
    Source
  • rfe
    Radio Free Ethernet
    SANS
  •  
    SOLICARD ARX (Official)
    WIKI
  • rfe
    radio free ethernet
    IANA
  • threat
    [threat] Shaft DDoS analysis
    Bekkoame
  • cd00r
    [trojan] cd00r
    SANS
  • linuxrootkitiv(4)
    [trojan] Linux Rootkit IV (4)
    SANS
  • shaft
    [trojan] Shaft
    SANS
  • trojan
    [trojan] Shaft. Distributed DoS tool / Steals passwords. Works on Unix.
    Simovits
  • threat
    [threat] cd00r
    Bekkoame
  • threat
    [threat] W32.Spybot
    Bekkoame
<< < 1 2 3 4 5 6 > >>

About TCP/UDP ports

TCP port 1094 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 1094 in the same order in which they were sent. Guaranteed communication over TCP port 1094 is the main difference between TCP and UDP. UDP port 1094 would not have guaranteed communication as TCP.
UDP on port 1094 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 1094 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States3.17.187.116