TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "pa"

<< < 72 73 74 75 76
Port: 56565/TCP
56565/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • trojan
    [trojan] Osiris. Remote Access / Keylogger / Steals passwords. Works on Windows 95, 98, ME, NT, 2000 and XP. Aliases: Backdoor.Osiris, Osirdoor, BackDoor.ABT, Backdoor.Osirdoor.b, Backdoor.VB.am for server(gentil)
    Simovits
Port: 60000/TCP
60000/TCP - Known port assignments (11 records found)
  • Service
    Details
    Source
  •  
    Xsan. Xsan Filesystem Access
    Apple
  •  
    Dynamic and/or Private Ports
    IANA
  • threat
    [threat] Foreplay
    Bekkoame
  • threat
    [threat] Sockets des Troie
    Bekkoame
  • deepthroat
    [trojan] Deep Throat
    SANS
  • foreplay
    [trojan] Foreplay
    SANS
  • socketsdestroie
    [trojan] Sockets des Troie
    SANS
  • trojan
    [trojan] Deep Throat. Remote Access / FTP server / Steals passwords. Works on Windows 95, 98 and NT. There is a Global Master Password backdoor in all the servers: v 2.0 - whothefuckdoyouthinkiamgoddamnit2v 2.1 - whothefuckdoyouthinkiamgoddamnit1v 3.* - whothefuckdoyouthinkiamgoddamnit3 Aliases: Win32.DeepThroat, DTV2, DTV3, BackDoor.J, Backdoor.DeepThroat, W95/Backdoor.Tray
    Simovits
  • trojan
    [trojan] Foreplay. Remote Access / FTP server. Works on Windows. Aliases: F0replay, WiNNUke eXtreame, Reduced Foreplay
    Simovits
  • trojan
    [trojan] Sockets des Troie. Remote Access / ICQ trojan / Virus. Works on Windows 95 and 98, together with ICQ. Features as telnet and finger. Aliases: Sockets23, Lame, BACKDOOR.KAMIKAZE, IRC_TROJAN, TROJ_BACKDOOR, W32/Cheval.gen , Backdoor.Sockets23, Control Du Sockets, W32.HLLP.DeTroie, DeTroie.drp
    Simovits
  • threat
    [threat] Deep Throat
    Bekkoame
Port: 60008/TCP
60008/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • lion
    [trojan] Lion
    SANS
  • t0rnrootkit
    [trojan] T0rn Rootkit
    SANS
  • trojan
    [trojan] li0n. Worm / Steals passwords / Rootkit dropper / Hacking tool / Distributed DoS tool. Works on Unix (Linux), together with BIND 8.2. Aliases: The Lion worm, Linux/Lion, 1i0n, Lion
    Simovits
  • trojan
    [trojan] T0rn Rootkit. Rootkit. Works on Unix (Linux). Aliases: Torn Rootkit
    Simovits
Port: 60411/TCP
60411/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • threat
    [threat] Connection
    Bekkoame
  • connection
    [trojan] Connection
    SANS
  • trojan
    [trojan] Connection. Remote Access / Steals passwords / Virus dropper / Virus. Works on Windows 95, 98, ME, NT and 2000.
    Simovits
Port: 60551/TCP
60551/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • trojan
    [trojan] R0xr4t. Anti-protection trojan / Remote Access / Keylogger / Steals passwords / FTP server. Works on Windows 95, 98, ME, NT, 2000 and XP. Aliases: Roxrat, Backdoor.Roxrat, Backdoor.AIQ
    Simovits
Port: 60552/TCP
60552/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • trojan
    [trojan] R0xr4t. Anti-protection trojan / Remote Access / Keylogger / Steals passwords / FTP server. Works on Windows 95, 98, ME, NT, 2000 and XP. Aliases: Roxrat, Backdoor.Roxrat, Backdoor.AIQ
    Simovits
Port: 61115/TCP
61115/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • trojan
    [trojan] Protoss. Remote Access / Steals passwords. Works on Windows. Aliases: Backdoor.Zerg, Backdoor.Protoss, Zerg
    Simovits
Port: 61282/TCP
61282/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • threat
    [threat] W32.Pandem.B.Worm
    Bekkoame
  • threat
    [threat] W32.Squirm@mm
    Bekkoame
Port: 65530/TCP
65530/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • windowsmite
    [trojan] Windows Mite
    SANS
  • trojan
    [trojan] Windows Mite. Remote Access / Steals passwords / Destructive trojan. Works on Windows. Aliases: BackDoor.EB, Backdoor.WindowsMite, WinMite.10, TROJ_WINMITE.10
    Simovits
<< < 72 73 74 75 76

About TCP/UDP ports

TCP port 56565 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 56565 in the same order in which they were sent. Guaranteed communication over TCP port 56565 is the main difference between TCP and UDP. UDP port 56565 would not have guaranteed communication as TCP.
UDP on port 56565 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 56565 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States3.135.183.89