TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "sec"

1 2 3 4 5 6 7 8 9 > >>
Port: 4/TCP
4/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] Midnight Commander Sometimes this program is assigned to this prot
    Bekkoame
  • threat
    [threat] Self-Certifying File System(SFS) sfssd acceps connections on TCP port 4 and passes them to the appropriate SFS daemon. SFS is a secure, global file system with completely decentralized control. SFS uses NFS 3 as the underlying protocol for file access.
    Bekkoame
Port: 22/TCP
22/TCP - Known port assignments (7 records found)
  • Service
    Details
    Source
  • ssh
    Secure Shell (SSH).
    Apple
  •  
    Secure Shell (SSH) - used for secure logins, file transfers (scp, sftp) and port forwarding (Official)
    WIKI
  • ssh
    The Secure Shell (SSH) Protocol
    IANA
  • trojan
    [trojan] Skun. Remote Access / Destructive trojan. Works on Windows. Aliases: Backdoor.Skun
    Simovits
  • trojan
    [trojan] InCommand. Remote Access / Keylogger / Steals passwords / Remote peeker / ICQ trojan / IRC trojan / FTP server. Works on Windows 95 and 98, together with ICQ. Uses Blade Runner source code. Uses plug-ins. Aliases: Backdoor.InCommand, BackDoor.DB, Trojan.Win32.InCommand, InCommander, Incomm
    Simovits
  • trojan
    [trojan] Shaft. Distributed DoS tool / Steals passwords. Works on Unix.
    Simovits
  • threat
    [threat] Shaft
    Bekkoame
Port: 22/UDP
22/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • ssh
    The Secure Shell (SSH) Protocol
    IANA
  • threat
    [threat] pcAnywhere(Used in older versions, though newer version still use it for backwards compatibility.)
    Bekkoame
Port: 90/TCP
90/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • dnsix
    DNSIX Securit Attribute Token Map
    IANA
  •  
    dnsix (DoD Network Security for Information Exchange) Securit Attribute Token Map (Official)
    WIKI
  •  
    Pointcast (Unofficial)
    WIKI
Port: 90/UDP
90/UDP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • dnsix
    DNSIX Securit Attribute Token Map
    IANA
  •  
    dnsix (DoD Network Security for Information Exchange) Securit Attribute Token Map (Official)
    WIKI
  •  
    Pointcast (Unofficial)
    WIKI
Port: 115/TCP
115/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • sftp
    Simple File Transfer Protocol
    IANA
  •  
    Simple File Transfer Protocol (SFTP) (Official)
    WIKI
  • sftp
    Secure File Transfer Program (SFTP). Note: Some authorities reference a "Simple File Transport Protocol" or "Secured File Transport Protocol" on this port.
    Apple
Port: 124/TCP
124/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • ansatrader
    ANSA REX Trader
    IANA
  •  
    SecureID v1
    Bekkoame
Port: 135/TCP
135/TCP - Known port assignments (22 records found)
  • Service
    Details
    Source
  •  
    DCE endpoint resolution (Official)
    WIKI
  • epmap
    DCE endpoint resolution
    IANA
  •  
    Microsoft EPMAP (End Point Mapper), also known as DCE/RPC Locator service, used to remotely manage services including DHCP server, DNS server and WINS. Also used by DCOM (Unofficial)
    WIKI
  • loc-srv
    NCS local location broker
    SANS
  • threat
    [threat] Secefa
    Bekkoame
  • threat
    [threat] W32.Kiman
    Bekkoame
  • threat
    [threat] Femot
    Bekkoame
  • threat
    [threat] W32.Blaster.Worm
    Bekkoame
  • threat
    [threat] W32.Francette.Worm
    Bekkoame
  • threat
    [threat] W32.Explet
    Bekkoame
  • threat
    [threat] W32.Kibuv.Worm
    Bekkoame
  • threat
    [threat] W32.Lovgate
    Bekkoame
  • threat
    [threat] W32.Maslan
    Bekkoame
  • threat
    [threat] W32.Mytob
    Bekkoame
  • threat
    [threat] W32.Reatle
    Bekkoame
  • threat
    [threat] W32.Spybot
    Bekkoame
  • threat
    [threat] W32.Welchia
    Bekkoame
  • threat
    [threat] W32.Yaha
    Bekkoame
  • threat
    [threat] W32.Cissi
    Bekkoame
  • threat
    [threat] W32.HLLW.Gaobot
    Bekkoame
  • threat
    [threat] W32.HLLW.Polybot
    Bekkoame
  • threat
    [threat] W32.Kassbot
    Bekkoame
Port: 256/TCP
256/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  • rap
    RAP
    IANA
  • fw1-sync
    Checkpoint Firewall-1 state table sync
    SANS
  • rap
    -
    SANS
  • threat
    [threat] FW1 Certificate/key distribution. VPN clients (SecuRemote) can download keys on this port.
    Bekkoame
  • threat
    [threat] SpBot
    Bekkoame
Port: 257/TCP
257/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • set
    Secure Electronic Transaction
    IANA
  • fw1
    Checkpoint Firewall-1
    SANS
  • threat
    [threat] FW1 logging
    Bekkoame
1 2 3 4 5 6 7 8 9 > >>

About TCP/UDP ports

TCP port 4 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 4 in the same order in which they were sent. Guaranteed communication over TCP port 4 is the main difference between TCP and UDP. UDP port 4 would not have guaranteed communication as TCP.
UDP on port 4 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 4 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States54.226.25.246