TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "sometimes"

1 2 3 4 > >>
Port: 3/TCP
3/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • compressnet
    Compression Process
    IANA
  •  
    CompressNET Compression Process (Official)
    WIKI
  • compressnet
    [threat] Midnight Commander Sometimes this program is assigned to this port
    Bekkoame
Port: 3/UDP
3/UDP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • compressnet
    Compression Process
    IANA
  •  
    CompressNET Compression Process (Official)
    WIKI
  • compressnet
    [threat] Midnight Commander Sometimes this program is assigned to this port
    Bekkoame
Port: 4/TCP
4/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] Midnight Commander Sometimes this program is assigned to this prot
    Bekkoame
  • threat
    [threat] Self-Certifying File System(SFS) sfssd acceps connections on TCP port 4 and passes them to the appropriate SFS daemon. SFS is a secure, global file system with completely decentralized control. SFS uses NFS 3 as the underlying protocol for file access.
    Bekkoame
Port: 40/TCP
40/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] Midnight Commander Sometimes access FTP servers running at this port.
    Bekkoame
Port: 737/UDP
737/UDP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • sometimes-rpc2
    Rusersd on my OpenBSD box
    SANS
  • ipcserver
    Mac OS X RPC-based services. Used by NetInfo, for example.
    Apple
Port: 6776/UDP
6776/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • hnmp
    [threat] RAT:SubSeven This port often seen as part of the Sub7 communication. You may see a steady stream of connection attempts: this is because it uses this port separately from the command port in order to transfer information. Sometimes the control-connection thinks the agent is alive, and will continue to attempt this connection as well. Backdoor port in Sub7
    Bekkoame
Port: 6776/TCP
6776/TCP - Known port assignments (13 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] 2000 Cracks
    Bekkoame
  • threat
    [threat] BackDoor-G
    Bekkoame
  • threat
    [threat] VP Killer
    Bekkoame
  • hnmp
    [threat] RAT:SubSeven This port often seen as part of the Sub7 communication. You may see a steady stream of connection attempts: this is because it uses this port separately from the command port in order to transfer information. Sometimes the control-connection thinks the agent is alive, and will continue to attempt this connection as well. Backdoor port in Sub7
    Bekkoame
  • 2000cracks
    [trojan] 2000 Cracks
    SANS
  • backdoor-g
    [trojan] BackDoor-G
    SANS
  • subseven
    [trojan] SubSeven
    SANS
  • vpkiller
    [trojan] VP Killer
    SANS
  • trojan
    [trojan] 2000 Cracks. Works on Windows 95, 98 and NT.
    Simovits
  • trojan
    [trojan] BackDoor-G. Remote Access. Works on Windows 95 and 98. Aliases: Sub Seven, Sub7
    Simovits
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] VP Killer. Remote Access. Works on Windows.
    Simovits
Port: 8000/TCP
8000/TCP - Known port assignments (8 records found)
  • Service
    Details
    Source
  • irdmi
    iRDMI
    IANA
  •  
    EMC2 (Legato) Networker or Sun Solcitice Backup (Official)
    WIKI
  •  
    iRDMI (Intel Remote Desktop Management Interface) - sometimes erroneously used instead of port 8080 (Unofficial)
    WIKI
  •  
    Commonly used for internet radio streams such as those using SHOUTcast (Unofficial)
    WIKI
  • irdmi
    Web service, iTunes Radio streams
    Apple
  • threat
    [threat] W32.Mytob
    Bekkoame
  • threat
    [threat] W32.Spybot
    Bekkoame
  • threat
    [threat] W32.Gaobot
    Bekkoame
Port: 8000/UDP
8000/UDP - Known port assignments (4 records found)
  • Service
    Details
    Source
  • irdmi
    iRDMI
    IANA
  •  
    EMC2 (Legato) Networker or Sun Solcitice Backup (Official)
    WIKI
  •  
    iRDMI (Intel Remote Desktop Management Interface) - sometimes erroneously used instead of port 8080 (Unofficial)
    WIKI
  •  
    QuickTime Streaming Server
    Apple
Port: 31337/TCP
31337/TCP - Known port assignments (50 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • elite
    Sometimes interesting stuff can be found here here
    SANS
  • threat
    [threat] Back Orifice
    Bekkoame
  • threat
    [threat] Back Orifice 1.20 patches
    Bekkoame
  • threat
    [threat] Back Orifice russian
    Bekkoame
  • threat
    [threat] Baron Night
    Bekkoame
  • threat
    [threat] Beeone
    Bekkoame
  • threat
    [threat] BO client
    Bekkoame
  • threat
    [threat] BO Facil
    Bekkoame
  • threat
    [threat] BO spy
    Bekkoame
  • threat
    [threat] BO2
    Bekkoame
  • threat
    [threat] cron / crontab
    Bekkoame
  • threat
    [threat] Emcommander
    Bekkoame
  • threat
    [threat] Freak2k
    Bekkoame
  • threat
    [threat] Freak88
    Bekkoame
  • threat
    [threat] icmp_pipe.c
    Bekkoame
  • threat
    [threat] Sockdmini
    Bekkoame
  • threat
    [threat] W32.HLLW.Gool
    Bekkoame
  • admworm
    [trojan] ADM worm
    SANS
  • backfire
    [trojan] Back Fire
    SANS
  • backorifice1.20patches
    [trojan] Back Orifice 1.20 patches
    SANS
  • backorifice(lm)
    [trojan] Back Orifice (Lm)
    SANS
  • backorificerussian
    [trojan] Back Orifice russian
    SANS
  • baronnight
    [trojan] Baron Night
    SANS
  • beeone
    [trojan] Beeone
    SANS
  • bindshell
    [trojan] bindshell
    SANS
  • bo2
    [trojan] BO2
    SANS
  • boclient
    [trojan] BO client
    SANS
  • bofacil
    [trojan] BO Facil
    SANS
  • bospy
    [trojan] BO spy
    SANS
  • cron/crontab
    [trojan] cron / crontab
    SANS
  • deepbo
    [trojan] Deep BO
    SANS
  • freak2k
    [trojan] Freak2k
    SANS
  • freak88
    [trojan] Freak88
    SANS
  • gummo
    [trojan] Gummo
    SANS
  • icmp_pipe.c
    [trojan] icmp_pipe.c
    SANS
  • linuxrootkitiv
    [trojan] Linux Rootkit IV
    SANS
  • trojan
    [trojan] ADM worm. Worm / Rootkit / Backdoor. Works on Unix (Linux). Affects Linux RedHat 4.0 to 5.2. Aliases: ADM Inet w0rm, Linux.ADM.Worm
    Simovits
  • trojan
    [trojan] Back Fire. Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] Back Orifice (Lm). Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] Back Orifice russian. Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] BlitzNet. IRC trojan / DoS tool. Works on Unix (Linux).
    Simovits
  • trojan
    [trojan] BO client. Works on Windows 95 and 98. BO client is using the ordinary BO server.
    Simovits
  • trojan
    [trojan] BO Facil. Works on Windows 95 and 98. Aliases: Back Orifice Facil
    Simovits
  • trojan
    [trojan] BO2. Remote Access. Works on Windows 95 and 98. Bo2 is a Back Orifice client application.
    Simovits
  • trojan
    [trojan] Freak88. Distributed DoS tool. Works on Windows 95, 98 and NT. Aliases: Freak 2000
    Simovits
  • trojan
    [trojan] Freak2k. Distributed DoS tool. Works on Windows 95, 98 and NT. Aliases: Freak 2000
    Simovits
  •  
    Back Orifice - remote administration tool (often Trojan horse) (Unofficial)
    WIKI
  • trojan
    [trojan] NoBackO. Remote Access / Sniffer. Works on Windows.
    Simovits
  • threat
    [threat] Back Fire
    Bekkoame
1 2 3 4 > >>

About TCP/UDP ports

TCP port 3 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 3 in the same order in which they were sent. Guaranteed communication over TCP port 3 is the main difference between TCP and UDP. UDP port 3 would not have guaranteed communication as TCP.
UDP on port 3 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 3 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States3.145.85.178