TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "icmp"

Port: 5813/TCP
5813/TCP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • icmpd
    ICMPD
    IANA
Port: 5813/UDP
5813/UDP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • icmpd
    ICMPD
    IANA
Port: 12345/TCP
12345/TCP - Known port assignments (28 records found)
  • Service
    Details
    Source
  • italk
    Italk Chat System
    IANA
  • threat
    [threat] Amitis
    Bekkoame
  • threat
    [threat] Ashley
    Bekkoame
  • threat
    [threat] cron / crontab
    Bekkoame
  • threat
    [threat] Fat Bitch trojan
    Bekkoame
  • threat
    [threat] GabanBus
    Bekkoame
  • threat
    [threat] icmp_client.c
    Bekkoame
  • threat
    [threat] icmp_pipe.c
    Bekkoame
  • threat
    [threat] Mypic
    Bekkoame
  • threat
    [threat] NetBus
    Bekkoame
  • threat
    [threat] NetBus Toy
    Bekkoame
  • threat
    [threat] NetBus worm
    Bekkoame
  • threat
    [threat] Notice how this port is the sequence of numbers "1 2 3 4 5". This is common chosen whenever somebody is asked to configure a port number. It is likewise chosen by programmers when creating default port numbers for their products. One very famous such uses is with NetBus. Trend Micro's OfficeScan products use this port.
    Bekkoame
  • threat
    [threat] Pie Bill Gates
    Bekkoame
  • threat
    [threat] Whack Job
    Bekkoame
  • threat
    [threat] X-bill
    Bekkoame
  • netbus
    [trojan] NetBus
    SANS
  • trojan
    [trojan] Ashley. Worm / IRC trojan / Mail trojan / Downloading trojan. Works on Windows 95, 98 and ME, together with MS Outlook and mIRC and Ircn.
    Simovits
  • trojan
    [trojan] BlueIce 2000. Works on Windows. Aliases: Backdoor.BlueIce
    Simovits
  • trojan
    [trojan] Mypic. Remote Access / Trojan dropper. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] NetBus. Remote Access / Keylogger / Eavesdropper. Works on Windows 95, 98, NT and 2000. Also with Unix (Linux). There also exists hacked versions of NetBus 2.0 by Atomic Toxic and Azote. ? Source code is available (v 1.53). Aliases: Sysedit, Backdoor.Netbus, W95.NetBus, Michal
    Simovits
  • trojan
    [trojan] Pie Bill Gates. Remote Access / Trojan dropper. Works on Windows 95, 98 and NT. Aliases: Bill.zip
    Simovits
  • trojan
    [trojan] Q-taz. Remote Access / Keylogger. Works on Windows. Aliases: Qtaz, Backdoor.Qtaz
    Simovits
  • trojan
    [trojan] Sensive. Remote Access. Works on Windows 98. Aliases: Backdoor.Sensive
    Simovits
  • trojan
    [trojan] Snape. Works on Windows. Aliases: Backdoor.Snape
    Simovits
  • trojan
    [trojan] Vagr Nocker. Remote Access / Steals passwords. Works on Windows. Aliases: Backdoor.Latinus.14, VAGR
    Simovits
  • trojan
    [trojan] ValvNet. Remote Access. Works on Windows 95, 98, ME and NT. Aliases: Valv - Not Earthy Trojan, Valv-Net
    Simovits
  • trojan
    [trojan] Whack Job. Remote Access / Trojan dropper. Works on Windows 95, 98 and NT.
    Simovits
Port: 12345/UDP
12345/UDP - Known port assignments (17 records found)
  • Service
    Details
    Source
  • italk
    Italk Chat System
    IANA
  • threat
    [threat] Amitis
    Bekkoame
  • threat
    [threat] Ashley
    Bekkoame
  • threat
    [threat] cron / crontab
    Bekkoame
  • threat
    [threat] Fat Bitch trojan
    Bekkoame
  • threat
    [threat] GabanBus
    Bekkoame
  • threat
    [threat] icmp_client.c
    Bekkoame
  • threat
    [threat] Mypic
    Bekkoame
  • threat
    [threat] NetBus
    Bekkoame
  • threat
    [threat] NetBus Toy
    Bekkoame
  • threat
    [threat] NetBus worm
    Bekkoame
  • threat
    [threat] Notice how this port is the sequence of numbers "1 2 3 4 5". This is common chosen whenever somebody is asked to configure a port number. It is likewise chosen by programmers when creating default port numbers for their products. One very famous such uses is with NetBus. Trend Micro's OfficeScan products use this port.
    Bekkoame
  • threat
    [threat] Pie Bill Gates
    Bekkoame
  • threat
    [threat] Whack Job
    Bekkoame
  • threat
    [threat] X-bill
    Bekkoame
  • threat
    [threat] icmp_pipe.c
    Bekkoame
  • trojan
    [trojan] BlueIce 2000. Works on Windows. Aliases: Backdoor.BlueIce
    Simovits
Port: 31337/TCP
31337/TCP - Known port assignments (50 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • elite
    Sometimes interesting stuff can be found here here
    SANS
  • threat
    [threat] Back Orifice
    Bekkoame
  • threat
    [threat] Back Orifice 1.20 patches
    Bekkoame
  • threat
    [threat] Back Orifice russian
    Bekkoame
  • threat
    [threat] Baron Night
    Bekkoame
  • threat
    [threat] Beeone
    Bekkoame
  • threat
    [threat] BO client
    Bekkoame
  • threat
    [threat] BO Facil
    Bekkoame
  • threat
    [threat] BO spy
    Bekkoame
  • threat
    [threat] BO2
    Bekkoame
  • threat
    [threat] cron / crontab
    Bekkoame
  • threat
    [threat] Emcommander
    Bekkoame
  • threat
    [threat] Freak2k
    Bekkoame
  • threat
    [threat] Freak88
    Bekkoame
  • threat
    [threat] icmp_pipe.c
    Bekkoame
  • threat
    [threat] Sockdmini
    Bekkoame
  • threat
    [threat] W32.HLLW.Gool
    Bekkoame
  • admworm
    [trojan] ADM worm
    SANS
  • backfire
    [trojan] Back Fire
    SANS
  • backorifice1.20patches
    [trojan] Back Orifice 1.20 patches
    SANS
  • backorifice(lm)
    [trojan] Back Orifice (Lm)
    SANS
  • backorificerussian
    [trojan] Back Orifice russian
    SANS
  • baronnight
    [trojan] Baron Night
    SANS
  • beeone
    [trojan] Beeone
    SANS
  • bindshell
    [trojan] bindshell
    SANS
  • bo2
    [trojan] BO2
    SANS
  • boclient
    [trojan] BO client
    SANS
  • bofacil
    [trojan] BO Facil
    SANS
  • bospy
    [trojan] BO spy
    SANS
  • cron/crontab
    [trojan] cron / crontab
    SANS
  • deepbo
    [trojan] Deep BO
    SANS
  • freak2k
    [trojan] Freak2k
    SANS
  • freak88
    [trojan] Freak88
    SANS
  • gummo
    [trojan] Gummo
    SANS
  • icmp_pipe.c
    [trojan] icmp_pipe.c
    SANS
  • linuxrootkitiv
    [trojan] Linux Rootkit IV
    SANS
  • trojan
    [trojan] ADM worm. Worm / Rootkit / Backdoor. Works on Unix (Linux). Affects Linux RedHat 4.0 to 5.2. Aliases: ADM Inet w0rm, Linux.ADM.Worm
    Simovits
  • trojan
    [trojan] Back Fire. Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] Back Orifice (Lm). Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] Back Orifice russian. Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] BlitzNet. IRC trojan / DoS tool. Works on Unix (Linux).
    Simovits
  • trojan
    [trojan] BO client. Works on Windows 95 and 98. BO client is using the ordinary BO server.
    Simovits
  • trojan
    [trojan] BO Facil. Works on Windows 95 and 98. Aliases: Back Orifice Facil
    Simovits
  • trojan
    [trojan] BO2. Remote Access. Works on Windows 95 and 98. Bo2 is a Back Orifice client application.
    Simovits
  • trojan
    [trojan] Freak88. Distributed DoS tool. Works on Windows 95, 98 and NT. Aliases: Freak 2000
    Simovits
  • trojan
    [trojan] Freak2k. Distributed DoS tool. Works on Windows 95, 98 and NT. Aliases: Freak 2000
    Simovits
  •  
    Back Orifice - remote administration tool (often Trojan horse) (Unofficial)
    WIKI
  • trojan
    [trojan] NoBackO. Remote Access / Sniffer. Works on Windows.
    Simovits
  • threat
    [threat] Back Fire
    Bekkoame

About TCP/UDP ports

TCP port 5813 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 5813 in the same order in which they were sent. Guaranteed communication over TCP port 5813 is the main difference between TCP and UDP. UDP port 5813 would not have guaranteed communication as TCP.
UDP on port 5813 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 5813 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States35.168.112.145