TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "worm"

<< < 5 6 7 8 9 10 > >>
Port: 27374/TCP
27374/TCP - Known port assignments (21 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] Bad Blood
    Bekkoame
  • threat
    [threat] Baste
    Bekkoame
  • threat
    [threat] Ramen
    Bekkoame
  • threat
    [threat] Seeker
    Bekkoame
  • threat
    [threat] SubSeven
    Bekkoame
  • threat
    [threat] Subseven 2.1.4 DefCon 8
    Bekkoame
  • threat
    [threat] SubSeven Muie
    Bekkoame
  • threat
    [threat] Ttfloader
    Bekkoame
  • subseven
    [trojan] SubSeven
    SANS
  • trojan
    [trojan] Bad Blood. Remote Access / Mail trojan. Works on Windows 95 and 98 (maybe on NT), together with MS Outlook Express. Aliases: Badblood
    Simovits
  • trojan
    [trojan] Fake SubSeven. Works on Windows 95, 98 and ME. Aliases: SubSeven 2.2
    Simovits
  • trojan
    [trojan] li0n. Worm / Steals passwords / Rootkit dropper / Hacking tool / Distributed DoS tool. Works on Unix (Linux), together with BIND 8.2. Aliases: The Lion worm, Linux/Lion, 1i0n, Lion
    Simovits
  • trojan
    [trojan] Ramen. Worm / HTML trojan / HTTP server / Hacking tool / Destructive trojan. Works on Unix (Linux). Linux Red Hat 6.x and early versions of 7.0. May also work on other Unix dialects such as FreeBSD and Linux SuSE, Mandrake and Cladera. The mail addresses used are [email protected] and [email protected]. Aliases: Linux.Ramen, Worm.Ramen, Elf.Ramen
    Simovits
  • trojan
    [trojan] Seeker. JavaScript trojan. Works on Windows 95 and 98, together with MS Internet Explorer and Netscape Navigator. Aliases: SEEKER.B, JS.Trojan.Seeker.b, JetHome, Troj/JetHome, JS_SEEKER.B, JS/Seeker.B, JS/Seeker.gen
    Simovits
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] SubSeven 2.1 Gold. Anti-protection trojan / Remote Access / ICQ trojan / Hacking tool / Port scanner / Port proxy. Works on Windows 95, 98 and NT. I may have troubble autoloading on NT. Aliases: Sub 7
    Simovits
  • trojan
    [trojan] Subseven 2.1.4 DefCon 8. Remote Access / Hacking tool / ICQ trojan. Works on Windows 95, 98 and NT, together with ICQ. Aliases: Troj_Sub7.214DC8, Troj_Sub7.382883
    Simovits
  • trojan
    [trojan] SubSeven 2.2. Remote Access / Keylogger / Steals passwords / Eavesdropper / Remote peeker / Sniffer / Proxy server / Hacking tool / FTP server. Works on Windows 95, 98, ME, NT and 2000. Aliases: Backdoor.SubSeven, Backdoor-G, BackDoor-G2, BackDoor-G22, TSB Trojan, Serbian Badman Trojan, Badman Trojan, Troj_Sub7.22
    Simovits
  • trojan
    [trojan] SubSeven Muie. Works on Windows 95, 98 and NT. Aliases: Backdoor.Muie, Troj_Muie, TROJ_SUB7.MUIE, Muie, BackDoor-EP
    Simovits
  • trojan
    [trojan] The Saint. Remote Access / Hacking tool. Works on Windows. Aliases: WebHead
    Simovits
Port: 30464/TCP
30464/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • threat
    [threat] SMTP ETRN overflow A known Netwin ESMTP exploit binds a root shell to TCP port 30464.
    Bekkoame
  • trojan
    [trojan] Slapper. Backdoor / Worm / IRC trojan / Proxy / Distributed DoS tool. Works on Unix (Linux - SuSe, Mandrake, RedHat, Slackware, Debian, Gentoo), together with Apache Web server. Aliases: Linux.Slapper.Worm, Apache/mod_ssl Worm, PUD, ELF/Slapper
    Simovits
Port: 31337/TCP
31337/TCP - Known port assignments (50 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • elite
    Sometimes interesting stuff can be found here here
    SANS
  • threat
    [threat] Back Orifice
    Bekkoame
  • threat
    [threat] Back Orifice 1.20 patches
    Bekkoame
  • threat
    [threat] Back Orifice russian
    Bekkoame
  • threat
    [threat] Baron Night
    Bekkoame
  • threat
    [threat] Beeone
    Bekkoame
  • threat
    [threat] BO client
    Bekkoame
  • threat
    [threat] BO Facil
    Bekkoame
  • threat
    [threat] BO spy
    Bekkoame
  • threat
    [threat] BO2
    Bekkoame
  • threat
    [threat] cron / crontab
    Bekkoame
  • threat
    [threat] Emcommander
    Bekkoame
  • threat
    [threat] Freak2k
    Bekkoame
  • threat
    [threat] Freak88
    Bekkoame
  • threat
    [threat] icmp_pipe.c
    Bekkoame
  • threat
    [threat] Sockdmini
    Bekkoame
  • threat
    [threat] W32.HLLW.Gool
    Bekkoame
  • admworm
    [trojan] ADM worm
    SANS
  • backfire
    [trojan] Back Fire
    SANS
  • backorifice1.20patches
    [trojan] Back Orifice 1.20 patches
    SANS
  • backorifice(lm)
    [trojan] Back Orifice (Lm)
    SANS
  • backorificerussian
    [trojan] Back Orifice russian
    SANS
  • baronnight
    [trojan] Baron Night
    SANS
  • beeone
    [trojan] Beeone
    SANS
  • bindshell
    [trojan] bindshell
    SANS
  • bo2
    [trojan] BO2
    SANS
  • boclient
    [trojan] BO client
    SANS
  • bofacil
    [trojan] BO Facil
    SANS
  • bospy
    [trojan] BO spy
    SANS
  • cron/crontab
    [trojan] cron / crontab
    SANS
  • deepbo
    [trojan] Deep BO
    SANS
  • freak2k
    [trojan] Freak2k
    SANS
  • freak88
    [trojan] Freak88
    SANS
  • gummo
    [trojan] Gummo
    SANS
  • icmp_pipe.c
    [trojan] icmp_pipe.c
    SANS
  • linuxrootkitiv
    [trojan] Linux Rootkit IV
    SANS
  • trojan
    [trojan] ADM worm. Worm / Rootkit / Backdoor. Works on Unix (Linux). Affects Linux RedHat 4.0 to 5.2. Aliases: ADM Inet w0rm, Linux.ADM.Worm
    Simovits
  • trojan
    [trojan] Back Fire. Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] Back Orifice (Lm). Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] Back Orifice russian. Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] BlitzNet. IRC trojan / DoS tool. Works on Unix (Linux).
    Simovits
  • trojan
    [trojan] BO client. Works on Windows 95 and 98. BO client is using the ordinary BO server.
    Simovits
  • trojan
    [trojan] BO Facil. Works on Windows 95 and 98. Aliases: Back Orifice Facil
    Simovits
  • trojan
    [trojan] BO2. Remote Access. Works on Windows 95 and 98. Bo2 is a Back Orifice client application.
    Simovits
  • trojan
    [trojan] Freak88. Distributed DoS tool. Works on Windows 95, 98 and NT. Aliases: Freak 2000
    Simovits
  • trojan
    [trojan] Freak2k. Distributed DoS tool. Works on Windows 95, 98 and NT. Aliases: Freak 2000
    Simovits
  •  
    Back Orifice - remote administration tool (often Trojan horse) (Unofficial)
    WIKI
  • trojan
    [trojan] NoBackO. Remote Access / Sniffer. Works on Windows.
    Simovits
  • threat
    [threat] Back Fire
    Bekkoame
Port: 33567/TCP
33567/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • lion
    [trojan] Lion
    SANS
  • t0rnrootkit
    [trojan] T0rn Rootkit
    SANS
  • trojan
    [trojan] li0n. Worm / Steals passwords / Rootkit dropper / Hacking tool / Distributed DoS tool. Works on Unix (Linux), together with BIND 8.2. Aliases: The Lion worm, Linux/Lion, 1i0n, Lion
    Simovits
  • trojan
    [trojan] T0rn Rootkit. Rootkit. Works on Unix (Linux). Aliases: Torn Rootkit
    Simovits
Port: 33568/TCP
33568/TCP - Known port assignments (5 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • lion
    [trojan] Lion
    SANS
  • t0rnrootkit
    [trojan] T0rn Rootkit
    SANS
  • trojan
    [trojan] li0n. Worm / Steals passwords / Rootkit dropper / Hacking tool / Distributed DoS tool. Works on Unix (Linux), together with BIND 8.2. Aliases: The Lion worm, Linux/Lion, 1i0n, Lion
    Simovits
  • trojan
    [trojan] T0rn Rootkit. Rootkit. Works on Unix (Linux). Aliases: Torn Rootkit
    Simovits
Port: 36794/TCP
36794/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  •  
    Unassigned
    IANA
  • trojan
    [trojan] Bugbear. Anti-protection trojan / Remote Access / Keylogger / Worm / Mail trojan / Network trojan / HTTP server. Works on Windows 95, 98, ME, NT, 2000 and XP, together with MS Internet Explorer and MS Outlook. Aliases: W32.Bugbear@mm, Tanatos, Natosta, Keywo, I-Worm/Keywo
    Simovits
Port: 60008/TCP
60008/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • lion
    [trojan] Lion
    SANS
  • t0rnrootkit
    [trojan] T0rn Rootkit
    SANS
  • trojan
    [trojan] li0n. Worm / Steals passwords / Rootkit dropper / Hacking tool / Distributed DoS tool. Works on Unix (Linux), together with BIND 8.2. Aliases: The Lion worm, Linux/Lion, 1i0n, Lion
    Simovits
  • trojan
    [trojan] T0rn Rootkit. Rootkit. Works on Unix (Linux). Aliases: Torn Rootkit
    Simovits
Port: 61282/TCP
61282/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • threat
    [threat] W32.Pandem.B.Worm
    Bekkoame
  • threat
    [threat] W32.Squirm@mm
    Bekkoame
Port: 65432/TCP
65432/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  •  
    Xsan. Xsan Filesystem Access
    Apple
  • threat
    [threat] The Traitor (= th3tr41t0r)
    Bekkoame
  • thetraitor=th3tr41t0r
    [trojan] The Traitor (= th3tr41t0r)
    SANS
  • thetraitor
    [trojan] The Traitor (= th3tr41t0r)
    SANS
  • trojan
    [trojan] The Traitor (= th3tr41t0r). Worm / IRC trojan. Works on Windows, together with mIRC.
    Simovits
Port: 65432/UDP
65432/UDP - Known port assignments (5 records found)
  • Service
    Details
    Source
  •  
    Dynamic and/or Private Ports
    IANA
  • threat
    [threat] The Traitor (= th3tr41t0r)
    Bekkoame
  • thetraitor=th3tr41t0r
    [trojan] The Traitor (= th3tr41t0r)
    SANS
  • thetraitor
    [trojan] The Traitor (= th3tr41t0r)
    SANS
  • trojan
    [trojan] The Traitor (= th3tr41t0r). Worm / IRC trojan. Works on Windows, together with mIRC.
    Simovits
<< < 5 6 7 8 9 10 > >>

About TCP/UDP ports

TCP port 27374 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 27374 in the same order in which they were sent. Guaranteed communication over TCP port 27374 is the main difference between TCP and UDP. UDP port 27374 would not have guaranteed communication as TCP.
UDP on port 27374 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 27374 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States18.233.223.189