TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "hacker"

1 2 > >>
Port: 23/TCP
23/TCP - Known port assignments (20 records found)
  • Service
    Details
    Source
  •  
    Telnet protocol - unencrypted text communications (Official)
    WIKI
  • telnet
    -
    SANS
  • telnet
    Telnet.
    Apple
  • telnet
    Telnet
    IANA
  • threat
    [threat] Tiny Telnet Server - TTS
    Bekkoame
  • threat
    [threat] Truva Atl
    Bekkoame
  • telnet
    [threat] Telnet
    Bekkoame
  • trojan
    [trojan] ADM worm. Worm / Rootkit / Backdoor. Works on Unix (Linux). Affects Linux RedHat 4.0 to 5.2. Aliases: ADM Inet w0rm, Linux.ADM.Worm
    Simovits
  • trojan
    [trojan] Aphex's Remote Packet Sniffer. Remote Access / Network sniffer. Works on Windows. Aliases: Asniffer
    Simovits
  • trojan
    [trojan] AutoSpY. Anti-protection trojan / Remote Access / Worm / Network trojan / DoS tool / Telnet server / Virus dropper / Prank trojan. Works on Windows 95 and 98, together with MS Outlook. At least on version 1.2 Apocalipse, Telnet can be used as client. Aliases: AntiSpy, Backdoor.AntiSpy, Backdoor.AutoSpy
    Simovits
  • trojan
    [trojan] ButtMan. Remote Access. Works on Windows 95, 98 and NT. Aliases: BM, Backdoor.Buttman, Backdoor.Tubma, Backdoor.BR, Tubma
    Simovits
  • trojan
    [trojan] Fire HacKer. Remote Access. Works on Windows. Aliases: Backdoor.FireHacker
    Simovits
  • trojan
    [trojan] My Very Own trojan. Remote Access / FTP server. Works on Windows 95, 98 and ME. Telnet is used as client.
    Simovits
  • trojan
    [trojan] Pest. Remote Access / Keylogger / Steals passwords / Remote peeker / MSN trojan / Port scanner / Destructive trojan. Works on Windows 95, 98, ME, NT, 2000 and XP, together with MS MSN Messenger. the first version(s) did NOT work on Windows 2000. Aliases: Pestdoor, Backdoor.Pestdoor, Antilam, Backdoor.Antilam.g1, Juntador, TrojanDropper.Win32.Juntador.c
    Simovits
  • trojan
    [trojan] RTB 666. Remote Access / FTP server / IP scanner. Works on Windows, together with MS Internet Explorer. Aliases: Backdoor.RTB
    Simovits
  • trojan
    [trojan] Tiny Telnet Server - TTS. Remote Access. Works on Windows. Telnet server.
    Simovits
  • trojan
    [trojan] Truva Atl. Anti-protection trojan / Remote Access. Works on Windows 95 and 98. Aliases: Komut, Backdoor.Komut, Warhome, BKDR_Warhome
    Simovits
  • threat
    [threat] Dagonit
    Bekkoame
  • threat
    [threat] Fire HacKer
    Bekkoame
  • threat
    [threat] MindControl
    Bekkoame
Port: 31/TCP
31/TCP - Known port assignments (8 records found)
  • Service
    Details
    Source
  • msg-auth
    MSG Authentication
    IANA
  • threat
    [threat] Agent 31, Hackers Paradise, Masters Paradise
    Bekkoame
  • agent31
    [trojan] Agent 31
    SANS
  • mastersparadise
    [trojan] Masters Paradise
    SANS
  • trojan
    [trojan] Agent 40421. Backdoor. Works on Windows Windows 95, 98 and ME. Opens port 40421 for Master's Paradise 8.5.
    Simovits
  • trojan
    [trojan] Masters Paradise. Remote Access. Works on Windows 95, 98 and NT. Aliases: Masters Paradise 98, Paradise Agent, Paradise trojan, Backdoor.MasterP
    Simovits
  • hackersparadise
    [trojan] Hackers Paradise
    SANS
  • trojan
    [trojan] Skun. Remote Access / Destructive trojan. Works on Windows. Aliases: Backdoor.Skun
    Simovits
Port: 139/TCP
139/TCP - Known port assignments (23 records found)
  • Service
    Details
    Source
  • netbios-ssn
    Server Message Block (SMB). Used by Microsoft Windows file and print services, such as Windows Sharing in Mac OS X.
    Apple
  •  
    NetBIOS NetBIOS Session Service (Official)
    WIKI
  • netbios-ssn
    NETBIOS Session Service
    IANA
  • threat
    [threat] Netlog
    Bekkoame
  • threat
    [threat] Network
    Bekkoame
  • threat
    [threat] Qaz
    Bekkoame
  • threat
    [threat] W32.Cissi
    Bekkoame
  • threat
    [threat] W32.HLLW.Deborms
    Bekkoame
  • threat
    [threat] W32.HLLW.Moega
    Bekkoame
  • threat
    [threat] W32.Kiman
    Bekkoame
  • threat
    [threat] W32.Licum
    Bekkoame
  • threat
    [threat] W32.Reidana
    Bekkoame
  • threat
    [threat] W32.Spybot
    Bekkoame
  • threat
    [threat] W32.Yaha
    Bekkoame
  • threat
    [threat] Chode
    Bekkoame
  • trojan
    [trojan] Chode. Worm / Network trojan / Autodialing trojan / Destructive trojan. Works on Windows 3.x, 95 and 98 (maybe also on NT). Aliases: BAT/911-A, BAT/911-B, BAT.Chode.Worm, W95/Firkin.worm, Foreskin, BAT911, 911, DickHair, Bat/Firkin.A, Bat/Firkin.B, Firkin, Chode 911
    Simovits
  • trojan
    [trojan] Fire HacKer. Remote Access. Works on Windows. Aliases: Backdoor.FireHacker
    Simovits
  • trojan
    [trojan] Msinit. Worm / Destructive trojan / Network trojan. Works on Windows 95, 98 and ME. Aliases: Troj_Msinet.A, MSINIT.A, W32/Msinit, Win32.Trojan.Bymer, W32.HLLW.Bymer, Dnet.Dropper, Trojan.Win32.Bymer, W32/Bymer-A, Worm_Bymer_a, Wininit, Worm.RC5, Worm/Dnet_Winit
    Simovits
  • trojan
    [trojan] Nimda. Virus / Worm / Mail trojan / Network trojan / Hacking tool. Works on Windows 95, 98, ME, NT, 2000 and XP, together with MS Internet Information Server (IIS), MS Internet Explorer 5.5 SP1, MS Outlook , MS Outlook Express and MS Word. Aliases: Concept Virus (CV) v.5, W32.Nimda, Minda, W32.Minda, I-Worm.Nimda, Code Rainbow , PE_Nimda.A, CV-5
    Simovits
  • trojan
    [trojan] Opaserv. Worm / Network trojan. Works on Windows 95, 98, ME, NT, 2000 and XP. Aliases: Scrup, W32.Opaserv.Worm, Opasoft, Backdoor.Opasoft, Backdoor.ALB
    Simovits
  • trojan
    [trojan] Qaz. Remote Access / Downloading trojan / Worm / Network trojan. Works on Windows 95, 98, ME, NT and 2000. Aliases: Worm.Qaz, W32.HLLW.Qaz, Notepad, W32/QAZ.worm, Note.com, Qazwsx, W95/Qaz
    Simovits
  • threat
    [threat] God Message worm
    Bekkoame
  • threat
    [threat] Msinit
    Bekkoame
Port: 456/TCP
456/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  • macon-tcp
    macon-tcp
    IANA
  • macon-tcp
    -
    SANS
  • threat
    [threat] Hackers Paradise
    Bekkoame
  • hackersparadise
    [trojan] Hackers Paradise
    SANS
Port: 1052/TCP
1052/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  • ddt
    Dynamic DNS Tools
    IANA
  • threat
    [threat] W32.Reatle
    Bekkoame
  • trojan
    [trojan] Fire HacKer. Remote Access. Works on Windows. Aliases: Backdoor.FireHacker
    Simovits
  • trojan
    [trojan] Slapper. Backdoor / Worm / IRC trojan / Proxy / Distributed DoS tool. Works on Unix (Linux - SuSe, Mandrake, RedHat, Slackware, Debian, Gentoo), together with Apache Web server. Aliases: Linux.Slapper.Worm, Apache/mod_ssl Worm, PUD, ELF/Slapper
    Simovits
  • trojan
    [trojan] The Hobbit Daemon. Remote Access. Works on Windows. Aliases: Hobbit, Backdoor.Hobbit
    Simovits
Port: 1234/TCP
1234/TCP - Known port assignments (10 records found)
  • Service
    Details
    Source
  • search-agent
    Infoseek Search Agent
    IANA
  • hotline
    -
    SANS
  • threat
    [threat] Ultors Trojan
    Bekkoame
  • threat
    [threat] W32.Beagle
    Bekkoame
  • threat
    [threat] The bindshell.c program puts a backdoor root shell on this port by default. This assumes that you've already been compromised by some other exploit and that the hacker uses the default port.
    Bekkoame
  • trojan
    [trojan] Ultors Trojan. Remote Access. Works on Windows 3.1, 95, 98, ME, NT, 2000 and XP. Uses Telnet as the client. Aliases: Ultors Telnet Trojan, Utlor, Backdoor.Ultor
    Simovits
  • subsevenjavaclient
    [trojan] SubSeven Java client
    SANS
  • ultorstrojan
    [trojan] Ultors Trojan
    SANS
  • trojan
    [trojan] KiLo. Remote Access. Works on Windows.
    Simovits
  • threat
    [threat] SubSeven Java client
    Bekkoame
Port: 1234/UDP
1234/UDP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • search-agent
    Infoseek Search Agent
    IANA
  •  
    VLC media player default port for UDP/RTP stream (Official)
    WIKI
  • threat
    [threat] The bindshell.c program puts a backdoor root shell on this port by default. This assumes that you've already been compromised by some other exploit and that the hacker uses the default port.
    Bekkoame
Port: 7777/TCP
7777/TCP - Known port assignments (17 records found)
  • Service
    Details
    Source
  •  
    Windows backdoor program tini.exe default (Unofficial)
    WIKI
  • oracle-portal
    Oracle 9i Portal - Apache HTTP (default)
    SANS
  •  
    Xivio.com Chat Server Interface (Unofficial)
    WIKI
  •  
    Terraria default server (Unofficial)
    WIKI
  • cbt
    iChat server file transfer proxy (unregistered use).
    Apple
  • cbt
    cbt
    IANA
  •  
    Unreal Tournament series default server (Unofficial)
    WIKI
  •  
    GFI EventsManager 7 & 8 (Official)
    WIKI
  •  
    iChat server file transfer proxy (Unofficial)
    WIKI
  •  
    Oracle Cluster File System 2 (Unofficial)
    WIKI
  • fwtk-authsvr
    FWTK-Gauntlet authentication server
    SANS
  • trojan
    [trojan] God Message. Virus / Remote Access / ActiveX trojan / Downloading trojan / Worm / Mail trojan / IRC trojan / Network trojan. Works on Windows 95, 98, ME, NT and 2000, together with MS Internet Explorer 5, MS Outlook and mIRC. Aliases: BackDoor.AB.gen (?), JS.Trojan.WindowBomb
    Simovits
  • threat
    [threat] Darkmoon
    Bekkoame
  • threat
    [threat] Hacker can spoof UDP packets to this port in order to control the cable-modem. God Message, Tini
    Bekkoame
  • godmessage
    [trojan] God Message
    SANS
  • thething(modified)
    [trojan] The Thing (modified)
    SANS
  • tini
    [trojan] Tini
    SANS
Port: 7777/UDP
7777/UDP - Known port assignments (4 records found)
  • Service
    Details
    Source
  • cbt
    cbt
    IANA
  •  
    Unreal Tournament series default server (Unofficial)
    WIKI
  •  
    QuickTime Streaming Server
    Apple
  • threat
    [threat] Hacker can spoof UDP packets to this port in order to control the cable-modem. God Message, Tini
    Bekkoame
Port: 13010/TCP
13010/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] Hacker Brasil - HBR
    Bekkoame
  • bitchcontroller
    [trojan] BitchController
    SANS
  • hackerbrasilhbr
    [trojan] Hacker Brasil - HBR
    SANS
  • hackerbrasil
    [trojan] Hacker Brasil - HBR
    SANS
1 2 > >>

About TCP/UDP ports

TCP port 23 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 23 in the same order in which they were sent. Guaranteed communication over TCP port 23 is the main difference between TCP and UDP. UDP port 23 would not have guaranteed communication as TCP.
UDP on port 23 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 23 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States3.89.200.155