TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "tel"

<< < 1 2 3 4 5 6 7 8 9 > >>
Port: 1054/TCP
1054/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  • brvread
    BRVREAD
    IANA
  • threat
    [threat] AckCmd
    Bekkoame
  • ackcmd
    [trojan] AckCmd
    SANS
  • trojan
    [trojan] AckCmd. Remote Access / Tunneling software. Works on Windows 2000 and XP.
    Simovits
  • trojan
    [trojan] RemoteNC. Remote Access / Telnet server. Works on Windows NT, 2000 and XP. Can be used with a Telnet client. Aliases: Backdoor.RemoteNC
    Simovits
Port: 1111/TCP
1111/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  • lmsocialserver
    LM Social Server
    IANA
  • threat
    [threat] W32.Suclove
    Bekkoame
  • threat
    [threat] AIMVision
    Bekkoame
  • threat
    [threat] Hatckel
    Bekkoame
  • trojan
    [trojan] Daodan. Remote Access. Works on Windows. Aliases: Backdoor.Daodan
    Simovits
  • trojan
    [trojan] Ultors Trojan. Remote Access. Works on Windows 3.1, 95, 98, ME, NT, 2000 and XP. Uses Telnet as the client. Aliases: Ultors Telnet Trojan, Utlor, Backdoor.Ultor
    Simovits
Port: 1234/TCP
1234/TCP - Known port assignments (10 records found)
  • Service
    Details
    Source
  • search-agent
    Infoseek Search Agent
    IANA
  • hotline
    -
    SANS
  • threat
    [threat] Ultors Trojan
    Bekkoame
  • threat
    [threat] W32.Beagle
    Bekkoame
  • threat
    [threat] The bindshell.c program puts a backdoor root shell on this port by default. This assumes that you've already been compromised by some other exploit and that the hacker uses the default port.
    Bekkoame
  • trojan
    [trojan] Ultors Trojan. Remote Access. Works on Windows 3.1, 95, 98, ME, NT, 2000 and XP. Uses Telnet as the client. Aliases: Ultors Telnet Trojan, Utlor, Backdoor.Ultor
    Simovits
  • subsevenjavaclient
    [trojan] SubSeven Java client
    SANS
  • ultorstrojan
    [trojan] Ultors Trojan
    SANS
  • trojan
    [trojan] KiLo. Remote Access. Works on Windows.
    Simovits
  • threat
    [threat] SubSeven Java client
    Bekkoame
Port: 1380/TCP
1380/TCP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • telesis-licman
    Telesis Network License Manager
    IANA
Port: 1380/UDP
1380/UDP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • telesis-licman
    Telesis Network License Manager
    IANA
Port: 1474/TCP
1474/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • telefinder
    Telefinder
    IANA
  • telefinder
    -
    SANS
Port: 1474/UDP
1474/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • telefinder
    Telefinder
    IANA
  • telefinder
    -
    SANS
Port: 1503/TCP
1503/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  • imtc-mcs
    Databeam
    IANA
  •  
    Windows Live Messenger (Whiteboard and Application Sharing) (Official)
    WIKI
  • netmeeting
    Microsoft Netmeeting
    SANS
  • threat
    [threat] T.120 teleconferencing protocol
    Bekkoame
Port: 1503/UDP
1503/UDP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • imtc-mcs
    Databeam
    IANA
  •  
    Windows Live Messenger (Whiteboard and Application Sharing) (Official)
    WIKI
  • threat
    [threat] T.120 teleconferencing protocol
    Bekkoame
Port: 1560/TCP
1560/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  • asci-val
    ASCI-RemoteSHADOW
    IANA
  • asci-val
    asci-val
    SANS
  • trojan
    [trojan] Big Gluck. Remote Access / Steals passwords. Works on Windows 95, 98 and NT. Uses Telnet as the client. It's looks very much as Girl Friend. Aliases: TN, Backdoor.GF
    Simovits
  • trojan
    [trojan] Duddie. Remote Access / Keylogger / Destructive trojan. Works on Windows. Aliases: Backdoor.Duddie
    Simovits
<< < 1 2 3 4 5 6 7 8 9 > >>

About TCP/UDP ports

TCP port 1054 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 1054 in the same order in which they were sent. Guaranteed communication over TCP port 1054 is the main difference between TCP and UDP. UDP port 1054 would not have guaranteed communication as TCP.
UDP on port 1054 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 1054 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States3.85.241.10