TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "bi"

<< < 1 2 3 4 5 6 7 8 9 > >>
Port: 1033/TCP
1033/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  • netinfo-local
    local netinfo port
    IANA
  • trojan
    [trojan] Dosh. Remote Access. Works on Windows. Aliases: Backdoor.Dosh
    Simovits
  • trojan
    [trojan] KWM. Remote Access / Keylogger / Steals passwords / Downloading trojan. Works on Windows. Aliases: Backdoor.KWM
    Simovits
  • trojan
    [trojan] Little Witch. Remote Access / Steals passwords / FTP server. Works on Windows. Aliases: Backdoor.LittleWitch, Little Bitch, LW
    Simovits
  • trojan
    [trojan] Net Advance. Remote Access. Works on Windows 95, 98, NT, 2000 and XP. Aliases: Backdoor.NetAdvance
    Simovits
Port: 1208/TCP
1208/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  • seagull-ais
    SEAGULL AIS
    IANA
  • threat
    [threat] Infector
    Bekkoame
  • infector
    [trojan] Infector
    SANS
  • trojan
    [trojan] Infector. Keylogger / Steals passwords / ICQ trojan / IRC trojan / Downloading trojan / EXE binder / Trojan dropper. Works on Windows 95, 98 and ME, together with ICQ. Aliases: The Infector, FC Infector, Backdoor.Infector
    Simovits
Port: 1234/TCP
1234/TCP - Known port assignments (10 records found)
  • Service
    Details
    Source
  • search-agent
    Infoseek Search Agent
    IANA
  • hotline
    -
    SANS
  • threat
    [threat] Ultors Trojan
    Bekkoame
  • threat
    [threat] W32.Beagle
    Bekkoame
  • threat
    [threat] The bindshell.c program puts a backdoor root shell on this port by default. This assumes that you've already been compromised by some other exploit and that the hacker uses the default port.
    Bekkoame
  • trojan
    [trojan] Ultors Trojan. Remote Access. Works on Windows 3.1, 95, 98, ME, NT, 2000 and XP. Uses Telnet as the client. Aliases: Ultors Telnet Trojan, Utlor, Backdoor.Ultor
    Simovits
  • subsevenjavaclient
    [trojan] SubSeven Java client
    SANS
  • ultorstrojan
    [trojan] Ultors Trojan
    SANS
  • trojan
    [trojan] KiLo. Remote Access. Works on Windows.
    Simovits
  • threat
    [threat] SubSeven Java client
    Bekkoame
Port: 1234/UDP
1234/UDP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • search-agent
    Infoseek Search Agent
    IANA
  •  
    VLC media player default port for UDP/RTP stream (Official)
    WIKI
  • threat
    [threat] The bindshell.c program puts a backdoor root shell on this port by default. This assumes that you've already been compromised by some other exploit and that the hacker uses the default port.
    Bekkoame
Port: 1236/TCP
1236/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • bvcontrol
    bvcontrol
    IANA
  •  
    Symantec BindView Control UNIX Default port for TCP management server connections (Official)
    WIKI
Port: 1409/TCP
1409/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • here-lm
    Here License Manager
    IANA
  • threat
    [threat] Brakkeshell
    Bekkoame
  • threat
    [threat] IRC.Bifrut
    Bekkoame
Port: 1409/UDP
1409/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • here-lm
    Here License Manager
    IANA
  • threat
    [threat] IRC.Bifrut
    Bekkoame
Port: 1534/TCP
1534/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • micromuse-lm
    micromuse-lm
    IANA
  • micromuse-lm
    -
    SANS
  • threat
    [threat] W32.Bizex
    Bekkoame
Port: 1534/UDP
1534/UDP - Known port assignments (4 records found)
  • Service
    Details
    Source
  • micromuse-lm
    micromuse-lm
    IANA
  •  
    Eclipse Target Communication Framework (TCF) agent discovery (Official)
    WIKI
  • micromuse-lm
    -
    SANS
  • threat
    [threat] W32.Bizex
    Bekkoame
Port: 1560/TCP
1560/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  • asci-val
    ASCI-RemoteSHADOW
    IANA
  • asci-val
    asci-val
    SANS
  • trojan
    [trojan] Big Gluck. Remote Access / Steals passwords. Works on Windows 95, 98 and NT. Uses Telnet as the client. It's looks very much as Girl Friend. Aliases: TN, Backdoor.GF
    Simovits
  • trojan
    [trojan] Duddie. Remote Access / Keylogger / Destructive trojan. Works on Windows. Aliases: Backdoor.Duddie
    Simovits
<< < 1 2 3 4 5 6 7 8 9 > >>

About TCP/UDP ports

TCP port 1033 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 1033 in the same order in which they were sent. Guaranteed communication over TCP port 1033 is the main difference between TCP and UDP. UDP port 1033 would not have guaranteed communication as TCP.
UDP on port 1033 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 1033 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States54.224.52.210