TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "j"

<< < 1 2 3 4 5 6 7 8 9 > >>
Port: 170/TCP
170/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  • print-srv
    Network PostScript
    IANA
  •  
    Print-srv, Network PostScript (Official)
    WIKI
  • threat
    [threat] A-trojan
    Bekkoame
  • atrojan
    [trojan] A-trojan
    SANS
  • a-trojan
    [trojan] A-trojan
    SANS
  • trojan
    [trojan] A-trojan. Remote Access / Steals passwords. Works on Windows 95, 98 and 2000. Aliases: WinCrash.B, Joke_Flipped, Atrojan, Troj_Wincrash.B, Trojan.PSW.Atrojan
    Simovits
Port: 171/TCP
171/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • multiplex
    Network Innovations Multiplex
    IANA
  • trojan
    [trojan] A-trojan. Remote Access / Steals passwords. Works on Windows 95, 98 and 2000. Aliases: WinCrash.B, Joke_Flipped, Atrojan, Troj_Wincrash.B, Trojan.PSW.Atrojan
    Simovits
Port: 175/TCP
175/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • vmnet
    VMNET
    IANA
  •  
    VMNET (IBM z/VM, z/OS & z/VSE - Network Job Entry(NJE)) (Official)
    WIKI
  • vmnet
    -
    SANS
Port: 445/TCP
445/TCP - Known port assignments (38 records found)
  • Service
    Details
    Source
  •  
    Microsoft-DS Active Directory, Windows shares (Official)
    WIKI
  •  
    Microsoft-DS SMB file sharing (Official)
    WIKI
  • microsoft-ds
    Win2k+ Server Message Block
    SANS
  • microsoft-ds
    Microsoft SMB Domain Server.
    Apple
  • microsoft-ds
    Microsoft-DS
    IANA
  • threat
    [threat] W32.Aizu
    Bekkoame
  • threat
    [threat] W32.Bobax
    Bekkoame
  • threat
    [threat] W32.Bolgi.Worm
    Bekkoame
  • threat
    [threat] W32.Cissi
    Bekkoame
  • threat
    [threat] W32.Cycle
    Bekkoame
  • threat
    [threat] W32.Explet
    Bekkoame
  • threat
    [threat] W32.HLLW.Deborms
    Bekkoame
  • threat
    [threat] W32.HLLW.Deloder
    Bekkoame
  • threat
    [threat] W32.HLLW.Gaobot
    Bekkoame
  • threat
    [threat] W32.HLLW.Lioten
    Bekkoame
  • threat
    [threat] W32.HLLW.Moega
    Bekkoame
  • threat
    [threat] W32.HLLW.Nebiwo
    Bekkoame
  • threat
    [threat] W32.HLLW.Polybot
    Bekkoame
  • threat
    [threat] W32.Ifbo
    Bekkoame
  • threat
    [threat] W32.Janx
    Bekkoame
  • threat
    [threat] W32.Kibuv.Worm
    Bekkoame
  • threat
    [threat] W32.Kiman
    Bekkoame
  • threat
    [threat] W32.Korgo
    Bekkoame
  • threat
    [threat] W32.Mytob
    Bekkoame
  • threat
    [threat] W32.Reatle
    Bekkoame
  • threat
    [threat] W32.Sasser
    Bekkoame
  • threat
    [threat] W32.Scane
    Bekkoame
  • threat
    [threat] W32.Slackor
    Bekkoame
  • threat
    [threat] W32.Spybot
    Bekkoame
  • threat
    [threat] W32.Wallz
    Bekkoame
  • threat
    [threat] W32.Welchia
    Bekkoame
  • threat
    [threat] W32.Yaha, Randex
    Bekkoame
  • threat
    [threat] W32.Zotob
    Bekkoame
  • trojan
    [trojan] Nimda. Virus / Worm / Mail trojan / Network trojan / Hacking tool. Works on Windows 95, 98, ME, NT, 2000 and XP, together with MS Internet Information Server (IIS), MS Internet Explorer 5.5 SP1, MS Outlook , MS Outlook Express and MS Word. Aliases: Concept Virus (CV) v.5, W32.Nimda, Minda, W32.Minda, I-Worm.Nimda, Code Rainbow , PE_Nimda.A, CV-5
    Simovits
  • threat
    [threat] Netdepix
    Bekkoame
  • threat
    [threat] Otinet
    Bekkoame
  • threat
    [threat] Rtkit
    Bekkoame
  • threat
    [threat] Secefa
    Bekkoame
Port: 517/TCP
517/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • talk
    like tenex link, but across machine - unfortunately, doesn't use link protocol (this is actually just a rendezvous port from which a tcp connection is established)
    Bekkoame
  • talk
    like tenex link but across
    SANS
Port: 517/UDP
517/UDP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Talk (Official)
    WIKI
  • talk
    like tenex link, but across machine - unfortunately, doesn't use link protocol (this is actually just a rendezvous port from which a tcp connection is established)
    Bekkoame
  • talk
    like tenex link but across
    SANS
Port: 777/TCP
777/TCP - Known port assignments (7 records found)
  • Service
    Details
    Source
  • jconfig
    Hummingbird Exceed jconfig
    SANS
  • ipcserver
    Mac OS X RPC-based services. Used by NetInfo, for example.
    Apple
  • multiling-http
    Multiling HTTP
    IANA
  • trojan
    [trojan] Undetected. Remote Access / Keylogger / Steals passwords / EXE binder. Works on Windows 95, 98 and ME. Aliases: Backdoor.TDS.Muerte, Backdoor.TDS.4F, 4Fuk, Trojan.Win32.TrojanRunner.Levil, TDS, Backdoor.TDS.SE, Un-Detected, U4, Muerter, X-Mas
    Simovits
  • threat
    [threat] NetCrack
    Bekkoame
  • threat
    [threat] AimSpy
    Bekkoame
  • threat
    [threat] Undetected
    Bekkoame
Port: 901/TCP
901/TCP - Known port assignments (10 records found)
  • Service
    Details
    Source
  • smpnameres
    SMPNAMERES
    IANA
  •  
    VMware Virtual Infrastructure Client (UDP from server being managed to management console) (Unofficial)
    WIKI
  •  
    Samba Web Administration Tool (SWAT) (Unofficial)
    WIKI
  • realsecure
    RealSecure sensor
    SANS
  • samba-swat
    Samba SWAT tool
    SANS
  • ipcserver
    Mac OS X RPC-based services. Used by NetInfo, for example.
    Apple
  • trojan
    [trojan] Net-Devil. Anti-protection trojan / Remote Access / Keylogger / Steals passwords / Remote peeker. Works on Windows NT, 2000 and XP. tr|force is invvolved in the NetDevil project. Aliases: Backdoor.Net Devil, NetDevil, BackDoor.RP, BDS.NetDev, Win32.NetDevil, Troj.NetDevil
    Simovits
  • threat
    [threat] SWAT is an HTTP interface to SAMBA.
    Bekkoame
  • threat
    [threat] ISS RealSecure The IDS sensor listens on this port for communication from the console.
    Bekkoame
  • trojan
    [trojan] Pest. Remote Access / Keylogger / Steals passwords / Remote peeker / MSN trojan / Port scanner / Destructive trojan. Works on Windows 95, 98, ME, NT, 2000 and XP, together with MS MSN Messenger. the first version(s) did NOT work on Windows 2000. Aliases: Pestdoor, Backdoor.Pestdoor, Antilam, Backdoor.Antilam.g1, Juntador, TrojanDropper.Win32.Juntador.c
    Simovits
Port: 902/TCP
902/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  • ideafarm-door
    self documenting Telnet Door
    IANA
  •  
    VMware Server Console (TCP from management console to server being Managed) (Unofficial)
    WIKI
  •  
    ideafarm-door (Official)
    WIKI
  • ipcserver
    Mac OS X RPC-based services. Used by NetInfo, for example.
    Apple
  • trojan
    [trojan] Net-Devil. Anti-protection trojan / Remote Access / Keylogger / Steals passwords / Remote peeker. Works on Windows NT, 2000 and XP. tr|force is invvolved in the NetDevil project. Aliases: Backdoor.Net Devil, NetDevil, BackDoor.RP, BDS.NetDev, Win32.NetDevil, Troj.NetDevil
    Simovits
  • trojan
    [trojan] Pest. Remote Access / Keylogger / Steals passwords / Remote peeker / MSN trojan / Port scanner / Destructive trojan. Works on Windows 95, 98, ME, NT, 2000 and XP, together with MS MSN Messenger. the first version(s) did NOT work on Windows 2000. Aliases: Pestdoor, Backdoor.Pestdoor, Antilam, Backdoor.Antilam.g1, Juntador, TrojanDropper.Win32.Juntador.c
    Simovits
Port: 1005/TCP
1005/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • ipcserver
    Mac OS X RPC-based services. Used by NetInfo, for example.
    Apple
  • trojan
    [trojan] Pest. Remote Access / Keylogger / Steals passwords / Remote peeker / MSN trojan / Port scanner / Destructive trojan. Works on Windows 95, 98, ME, NT, 2000 and XP, together with MS MSN Messenger. the first version(s) did NOT work on Windows 2000. Aliases: Pestdoor, Backdoor.Pestdoor, Antilam, Backdoor.Antilam.g1, Juntador, TrojanDropper.Win32.Juntador.c
    Simovits
  • trojan
    [trojan] Theef. Anti-protection trojan / Remote Access / Keylogger / Port proxy / FTP server / Remote peeker. Works on Windows 95, 98, ME, NT and XP. Aliases: Backdoor.Theef, BackDoor.QW, Bkdr_Delf.AX
    Simovits
<< < 1 2 3 4 5 6 7 8 9 > >>

About TCP/UDP ports

TCP port 170 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 170 in the same order in which they were sent. Guaranteed communication over TCP port 170 is the main difference between TCP and UDP. UDP port 170 would not have guaranteed communication as TCP.
UDP on port 170 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 170 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States18.226.222.12