TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "str"

<< < 1 2 3 4 5 6 7 8 9 > >>
Port: 5026/TCP
5026/TCP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • strexec-d
    Storix I/O daemon (data)
    IANA
Port: 5026/UDP
5026/UDP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • strexec-d
    Storix I/O daemon (data)
    IANA
Port: 5027/TCP
5027/TCP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • strexec-s
    Storix I/O daemon (stat)
    IANA
Port: 5027/UDP
5027/UDP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • strexec-s
    Storix I/O daemon (stat)
    IANA
Port: 5397/TCP
5397/TCP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • stresstester
    StressTester(tm) Injector
    IANA
Port: 5397/UDP
5397/UDP - Known port assignments (1 record found)
  • Service
    Details
    Source
  • stresstester
    StressTester(tm) Injector
    IANA
Port: 5402/TCP
5402/TCP - Known port assignments (11 records found)
  • Service
    Details
    Source
  • mftp
    OmniCast MFTP
    IANA
  •  
    mftp, Stratacache OmniCast content delivery system MFTP file sharing protocol (Official)
    WIKI
  • threat
    [threat] Back Construction
    Bekkoame
  • threat
    [threat] Blade Runner
    Bekkoame
  • backconstruction
    [trojan] Back Construction
    SANS
  • bladerunner
    [trojan] Blade Runner
    SANS
  • mneah
    [trojan] Mneah
    SANS
  • trojan
    [trojan] Back Construction. Remote Access / FTP server. Works on Windows 95 and 98. Aliases: Nightmare.B, Backdoor.Nightmare.B
    Simovits
  • trojan
    [trojan] Blade Runner. Remote Access. Works on Windows 95 and 98. The Client.zip-file also includes 32 WAV-files and 6 BMP-files. Aliases: Backdoor.BladeRunner
    Simovits
  • trojan
    [trojan] Digital Spy. Remote Access / FTP server. Works on Windows.
    Simovits
  • trojan
    [trojan] Mneah. Remote Access. Works on Windows 95, 98 and ME. Aliases: Backdoor.Mneah
    Simovits
Port: 5402/UDP
5402/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • mftp
    OmniCast MFTP
    IANA
  •  
    mftp, Stratacache OmniCast content delivery system MFTP file sharing protocol (Official)
    WIKI
Port: 6776/TCP
6776/TCP - Known port assignments (13 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] 2000 Cracks
    Bekkoame
  • threat
    [threat] BackDoor-G
    Bekkoame
  • threat
    [threat] VP Killer
    Bekkoame
  • hnmp
    [threat] RAT:SubSeven This port often seen as part of the Sub7 communication. You may see a steady stream of connection attempts: this is because it uses this port separately from the command port in order to transfer information. Sometimes the control-connection thinks the agent is alive, and will continue to attempt this connection as well. Backdoor port in Sub7
    Bekkoame
  • 2000cracks
    [trojan] 2000 Cracks
    SANS
  • backdoor-g
    [trojan] BackDoor-G
    SANS
  • subseven
    [trojan] SubSeven
    SANS
  • vpkiller
    [trojan] VP Killer
    SANS
  • trojan
    [trojan] 2000 Cracks. Works on Windows 95, 98 and NT.
    Simovits
  • trojan
    [trojan] BackDoor-G. Remote Access. Works on Windows 95 and 98. Aliases: Sub Seven, Sub7
    Simovits
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] VP Killer. Remote Access. Works on Windows.
    Simovits
Port: 6776/UDP
6776/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • hnmp
    [threat] RAT:SubSeven This port often seen as part of the Sub7 communication. You may see a steady stream of connection attempts: this is because it uses this port separately from the command port in order to transfer information. Sometimes the control-connection thinks the agent is alive, and will continue to attempt this connection as well. Backdoor port in Sub7
    Bekkoame
<< < 1 2 3 4 5 6 7 8 9 > >>

About TCP/UDP ports

TCP port 5026 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 5026 in the same order in which they were sent. Guaranteed communication over TCP port 5026 is the main difference between TCP and UDP. UDP port 5026 would not have guaranteed communication as TCP.
UDP on port 5026 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 5026 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States3.21.246.123