TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "sock"

<< < 1 2 3 4 > >>
Port: 19216/TCP
19216/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • trojan
    [trojan] BackGate Kit. Remote Access / Rootkit / Steals passwords / Downloading trojan / FTP proxy / HTTP proxy / Telnet proxy / SOCKs proxy / Winsock proxy / FTP server. Works on Windows NT, together with MS Internet Information Server (IIS). Aliases: Backdoor.NTHack, NT Hack, Unicode Rootkit
    Simovits
Port: 29292/TCP
29292/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  •  
    TMO Integration Service Communications Port, Used by Transaction Manager SaaS (HighJump Software) (Unofficial)
    WIKI
  •  
    Unassigned
    IANA
  • backgate
    [trojan] BackGate
    SANS
  • trojan
    [trojan] BackGate Kit. Remote Access / Rootkit / Steals passwords / Downloading trojan / FTP proxy / HTTP proxy / Telnet proxy / SOCKs proxy / Winsock proxy / FTP server. Works on Windows NT, together with MS Internet Information Server (IIS). Aliases: Backdoor.NTHack, NT Hack, Unicode Rootkit
    Simovits
Port: 30303/TCP
30303/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] Sockets de Troie (A French Trojan Horse and virus)
    Bekkoame
  • socketsdestroie
    [trojan] Sockets des Troie
    SANS
  • socketsdetroie
    [trojan] Sockets de Troie
    SANS
  • trojan
    [trojan] Sockets des Troie. Remote Access / ICQ trojan / Virus. Works on Windows 95 and 98, together with ICQ. Features as telnet and finger. Aliases: Sockets23, Lame, BACKDOOR.KAMIKAZE, IRC_TROJAN, TROJ_BACKDOOR, W32/Cheval.gen , Backdoor.Sockets23, Control Du Sockets, W32.HLLP.DeTroie, DeTroie.drp
    Simovits
Port: 30303/UDP
30303/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] Sockets de Troie (A French Trojan Horse and virus)
    Bekkoame
Port: 31337/TCP
31337/TCP - Known port assignments (50 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • elite
    Sometimes interesting stuff can be found here here
    SANS
  • threat
    [threat] Back Orifice
    Bekkoame
  • threat
    [threat] Back Orifice 1.20 patches
    Bekkoame
  • threat
    [threat] Back Orifice russian
    Bekkoame
  • threat
    [threat] Baron Night
    Bekkoame
  • threat
    [threat] Beeone
    Bekkoame
  • threat
    [threat] BO client
    Bekkoame
  • threat
    [threat] BO Facil
    Bekkoame
  • threat
    [threat] BO spy
    Bekkoame
  • threat
    [threat] BO2
    Bekkoame
  • threat
    [threat] cron / crontab
    Bekkoame
  • threat
    [threat] Emcommander
    Bekkoame
  • threat
    [threat] Freak2k
    Bekkoame
  • threat
    [threat] Freak88
    Bekkoame
  • threat
    [threat] icmp_pipe.c
    Bekkoame
  • threat
    [threat] Sockdmini
    Bekkoame
  • threat
    [threat] W32.HLLW.Gool
    Bekkoame
  • admworm
    [trojan] ADM worm
    SANS
  • backfire
    [trojan] Back Fire
    SANS
  • backorifice1.20patches
    [trojan] Back Orifice 1.20 patches
    SANS
  • backorifice(lm)
    [trojan] Back Orifice (Lm)
    SANS
  • backorificerussian
    [trojan] Back Orifice russian
    SANS
  • baronnight
    [trojan] Baron Night
    SANS
  • beeone
    [trojan] Beeone
    SANS
  • bindshell
    [trojan] bindshell
    SANS
  • bo2
    [trojan] BO2
    SANS
  • boclient
    [trojan] BO client
    SANS
  • bofacil
    [trojan] BO Facil
    SANS
  • bospy
    [trojan] BO spy
    SANS
  • cron/crontab
    [trojan] cron / crontab
    SANS
  • deepbo
    [trojan] Deep BO
    SANS
  • freak2k
    [trojan] Freak2k
    SANS
  • freak88
    [trojan] Freak88
    SANS
  • gummo
    [trojan] Gummo
    SANS
  • icmp_pipe.c
    [trojan] icmp_pipe.c
    SANS
  • linuxrootkitiv
    [trojan] Linux Rootkit IV
    SANS
  • trojan
    [trojan] ADM worm. Worm / Rootkit / Backdoor. Works on Unix (Linux). Affects Linux RedHat 4.0 to 5.2. Aliases: ADM Inet w0rm, Linux.ADM.Worm
    Simovits
  • trojan
    [trojan] Back Fire. Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] Back Orifice (Lm). Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] Back Orifice russian. Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] BlitzNet. IRC trojan / DoS tool. Works on Unix (Linux).
    Simovits
  • trojan
    [trojan] BO client. Works on Windows 95 and 98. BO client is using the ordinary BO server.
    Simovits
  • trojan
    [trojan] BO Facil. Works on Windows 95 and 98. Aliases: Back Orifice Facil
    Simovits
  • trojan
    [trojan] BO2. Remote Access. Works on Windows 95 and 98. Bo2 is a Back Orifice client application.
    Simovits
  • trojan
    [trojan] Freak88. Distributed DoS tool. Works on Windows 95, 98 and NT. Aliases: Freak 2000
    Simovits
  • trojan
    [trojan] Freak2k. Distributed DoS tool. Works on Windows 95, 98 and NT. Aliases: Freak 2000
    Simovits
  •  
    Back Orifice - remote administration tool (often Trojan horse) (Unofficial)
    WIKI
  • trojan
    [trojan] NoBackO. Remote Access / Sniffer. Works on Windows.
    Simovits
  • threat
    [threat] Back Fire
    Bekkoame
Port: 45092/TCP
45092/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • trojan
    [trojan] BackGate Kit. Remote Access / Rootkit / Steals passwords / Downloading trojan / FTP proxy / HTTP proxy / Telnet proxy / SOCKs proxy / Winsock proxy / FTP server. Works on Windows NT, together with MS Internet Information Server (IIS). Aliases: Backdoor.NTHack, NT Hack, Unicode Rootkit
    Simovits
Port: 50505/UDP
50505/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  • threat
    [threat] Sockets de Troie (A French Trojan Horse and virus)
    Bekkoame
Port: 50505/TCP
50505/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • threat
    [threat] Sockets de Troie (A French Trojan Horse and virus)
    Bekkoame
  • socketsdestroie
    [trojan] Sockets des Troie
    SANS
  • socketsdetroie
    [trojan] Sockets de Troie
    SANS
  • trojan
    [trojan] Sockets des Troie. Remote Access / ICQ trojan / Virus. Works on Windows 95 and 98, together with ICQ. Features as telnet and finger. Aliases: Sockets23, Lame, BACKDOOR.KAMIKAZE, IRC_TROJAN, TROJ_BACKDOOR, W32/Cheval.gen , Backdoor.Sockets23, Control Du Sockets, W32.HLLP.DeTroie, DeTroie.drp
    Simovits
Port: 60000/TCP
60000/TCP - Known port assignments (11 records found)
  • Service
    Details
    Source
  •  
    Xsan. Xsan Filesystem Access
    Apple
  •  
    Dynamic and/or Private Ports
    IANA
  • threat
    [threat] Foreplay
    Bekkoame
  • threat
    [threat] Sockets des Troie
    Bekkoame
  • deepthroat
    [trojan] Deep Throat
    SANS
  • foreplay
    [trojan] Foreplay
    SANS
  • socketsdestroie
    [trojan] Sockets des Troie
    SANS
  • trojan
    [trojan] Deep Throat. Remote Access / FTP server / Steals passwords. Works on Windows 95, 98 and NT. There is a Global Master Password backdoor in all the servers: v 2.0 - whothefuckdoyouthinkiamgoddamnit2v 2.1 - whothefuckdoyouthinkiamgoddamnit1v 3.* - whothefuckdoyouthinkiamgoddamnit3 Aliases: Win32.DeepThroat, DTV2, DTV3, BackDoor.J, Backdoor.DeepThroat, W95/Backdoor.Tray
    Simovits
  • trojan
    [trojan] Foreplay. Remote Access / FTP server. Works on Windows. Aliases: F0replay, WiNNUke eXtreame, Reduced Foreplay
    Simovits
  • trojan
    [trojan] Sockets des Troie. Remote Access / ICQ trojan / Virus. Works on Windows 95 and 98, together with ICQ. Features as telnet and finger. Aliases: Sockets23, Lame, BACKDOOR.KAMIKAZE, IRC_TROJAN, TROJ_BACKDOOR, W32/Cheval.gen , Backdoor.Sockets23, Control Du Sockets, W32.HLLP.DeTroie, DeTroie.drp
    Simovits
  • threat
    [threat] Deep Throat
    Bekkoame
Port: 63908/TCP
63908/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  • phatbot-socks
    Phatbot Socks Proxy
    SANS
  •  
    Xsan. Xsan Filesystem Access
    Apple
<< < 1 2 3 4 > >>

About TCP/UDP ports

TCP port 19216 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 19216 in the same order in which they were sent. Guaranteed communication over TCP port 19216 is the main difference between TCP and UDP. UDP port 19216 would not have guaranteed communication as TCP.
UDP on port 19216 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 19216 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States3.17.28.48