Búsqueda de puerto TCP/UDP

Entre el número del puerto (por ejemplo, 21), servicio (por ejemplo, ssh, ftp) o amenaza (por ejemplo, nimda).
Base de datos actualizada – 30 de marzo 2016

Buscar los resultados de "sometimes"

1 2 3 4 > >>
Puerto: 3/TCP
3/TCP - Asignaciones sabidas de puertos (3 rec. encontrado)
  • Servicio
    Detalles
    Fuente
  • compressnet
    Compression Process
    IANA
  •  
    CompressNET Compression Process (Official)
    WIKI
  • compressnet
    [threat] Midnight Commander Sometimes this program is assigned to this port
    Bekkoame
Puerto: 3/UDP
3/UDP - Asignaciones sabidas de puertos (3 rec. encontrado)
  • Servicio
    Detalles
    Fuente
  • compressnet
    Compression Process
    IANA
  •  
    CompressNET Compression Process (Official)
    WIKI
  • compressnet
    [threat] Midnight Commander Sometimes this program is assigned to this port
    Bekkoame
Puerto: 4/TCP
4/TCP - Asignaciones sabidas de puertos (3 rec. encontrado)
  • Servicio
    Detalles
    Fuente
  •  
    Unassigned
    IANA
  • threat
    [threat] Midnight Commander Sometimes this program is assigned to this prot
    Bekkoame
  • threat
    [threat] Self-Certifying File System(SFS) sfssd acceps connections on TCP port 4 and passes them to the appropriate SFS daemon. SFS is a secure, global file system with completely decentralized control. SFS uses NFS 3 as the underlying protocol for file access.
    Bekkoame
Puerto: 40/TCP
40/TCP - Asignaciones sabidas de puertos (2 rec. encontrado)
  • Servicio
    Detalles
    Fuente
  •  
    Unassigned
    IANA
  • threat
    [threat] Midnight Commander Sometimes access FTP servers running at this port.
    Bekkoame
Puerto: 737/UDP
737/UDP - Asignaciones sabidas de puertos (3 rec. encontrado)
  • Servicio
    Detalles
    Fuente
  •  
    Unassigned
    IANA
  • sometimes-rpc2
    Rusersd on my OpenBSD box
    SANS
  • ipcserver
    Mac OS X RPC-based services. Used by NetInfo, for example.
    Apple
Puerto: 6776/UDP
6776/UDP - Asignaciones sabidas de puertos (2 rec. encontrado)
  • Servicio
    Detalles
    Fuente
  •  
    Unassigned
    IANA
  • hnmp
    [threat] RAT:SubSeven This port often seen as part of the Sub7 communication. You may see a steady stream of connection attempts: this is because it uses this port separately from the command port in order to transfer information. Sometimes the control-connection thinks the agent is alive, and will continue to attempt this connection as well. Backdoor port in Sub7
    Bekkoame
Puerto: 6776/TCP
6776/TCP - Asignaciones sabidas de puertos (13 rec. encontrado)
  • Servicio
    Detalles
    Fuente
  •  
    Unassigned
    IANA
  • threat
    [threat] 2000 Cracks
    Bekkoame
  • threat
    [threat] BackDoor-G
    Bekkoame
  • threat
    [threat] VP Killer
    Bekkoame
  • hnmp
    [threat] RAT:SubSeven This port often seen as part of the Sub7 communication. You may see a steady stream of connection attempts: this is because it uses this port separately from the command port in order to transfer information. Sometimes the control-connection thinks the agent is alive, and will continue to attempt this connection as well. Backdoor port in Sub7
    Bekkoame
  • 2000cracks
    [trojan] 2000 Cracks
    SANS
  • backdoor-g
    [trojan] BackDoor-G
    SANS
  • subseven
    [trojan] SubSeven
    SANS
  • vpkiller
    [trojan] VP Killer
    SANS
  • trojan
    [trojan] 2000 Cracks. Works on Windows 95, 98 and NT.
    Simovits
  • trojan
    [trojan] BackDoor-G. Remote Access. Works on Windows 95 and 98. Aliases: Sub Seven, Sub7
    Simovits
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] VP Killer. Remote Access. Works on Windows.
    Simovits
Puerto: 8000/TCP
8000/TCP - Asignaciones sabidas de puertos (8 rec. encontrado)
  • Servicio
    Detalles
    Fuente
  • irdmi
    iRDMI
    IANA
  •  
    EMC2 (Legato) Networker or Sun Solcitice Backup (Official)
    WIKI
  •  
    iRDMI (Intel Remote Desktop Management Interface) - sometimes erroneously used instead of port 8080 (Unofficial)
    WIKI
  •  
    Commonly used for internet radio streams such as those using SHOUTcast (Unofficial)
    WIKI
  • irdmi
    Web service, iTunes Radio streams
    Apple
  • threat
    [threat] W32.Mytob
    Bekkoame
  • threat
    [threat] W32.Spybot
    Bekkoame
  • threat
    [threat] W32.Gaobot
    Bekkoame
Puerto: 8000/UDP
8000/UDP - Asignaciones sabidas de puertos (4 rec. encontrado)
  • Servicio
    Detalles
    Fuente
  • irdmi
    iRDMI
    IANA
  •  
    EMC2 (Legato) Networker or Sun Solcitice Backup (Official)
    WIKI
  •  
    iRDMI (Intel Remote Desktop Management Interface) - sometimes erroneously used instead of port 8080 (Unofficial)
    WIKI
  •  
    QuickTime Streaming Server
    Apple
Puerto: 31337/TCP
31337/TCP - Asignaciones sabidas de puertos (50 rec. encontrado)
  • Servicio
    Detalles
    Fuente
  •  
    Unassigned
    IANA
  • elite
    Sometimes interesting stuff can be found here here
    SANS
  • threat
    [threat] Back Orifice
    Bekkoame
  • threat
    [threat] Back Orifice 1.20 patches
    Bekkoame
  • threat
    [threat] Back Orifice russian
    Bekkoame
  • threat
    [threat] Baron Night
    Bekkoame
  • threat
    [threat] Beeone
    Bekkoame
  • threat
    [threat] BO client
    Bekkoame
  • threat
    [threat] BO Facil
    Bekkoame
  • threat
    [threat] BO spy
    Bekkoame
  • threat
    [threat] BO2
    Bekkoame
  • threat
    [threat] cron / crontab
    Bekkoame
  • threat
    [threat] Emcommander
    Bekkoame
  • threat
    [threat] Freak2k
    Bekkoame
  • threat
    [threat] Freak88
    Bekkoame
  • threat
    [threat] icmp_pipe.c
    Bekkoame
  • threat
    [threat] Sockdmini
    Bekkoame
  • threat
    [threat] W32.HLLW.Gool
    Bekkoame
  • admworm
    [trojan] ADM worm
    SANS
  • backfire
    [trojan] Back Fire
    SANS
  • backorifice1.20patches
    [trojan] Back Orifice 1.20 patches
    SANS
  • backorifice(lm)
    [trojan] Back Orifice (Lm)
    SANS
  • backorificerussian
    [trojan] Back Orifice russian
    SANS
  • baronnight
    [trojan] Baron Night
    SANS
  • beeone
    [trojan] Beeone
    SANS
  • bindshell
    [trojan] bindshell
    SANS
  • bo2
    [trojan] BO2
    SANS
  • boclient
    [trojan] BO client
    SANS
  • bofacil
    [trojan] BO Facil
    SANS
  • bospy
    [trojan] BO spy
    SANS
  • cron/crontab
    [trojan] cron / crontab
    SANS
  • deepbo
    [trojan] Deep BO
    SANS
  • freak2k
    [trojan] Freak2k
    SANS
  • freak88
    [trojan] Freak88
    SANS
  • gummo
    [trojan] Gummo
    SANS
  • icmp_pipe.c
    [trojan] icmp_pipe.c
    SANS
  • linuxrootkitiv
    [trojan] Linux Rootkit IV
    SANS
  • trojan
    [trojan] ADM worm. Worm / Rootkit / Backdoor. Works on Unix (Linux). Affects Linux RedHat 4.0 to 5.2. Aliases: ADM Inet w0rm, Linux.ADM.Worm
    Simovits
  • trojan
    [trojan] Back Fire. Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] Back Orifice (Lm). Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] Back Orifice russian. Remote Access. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] BlitzNet. IRC trojan / DoS tool. Works on Unix (Linux).
    Simovits
  • trojan
    [trojan] BO client. Works on Windows 95 and 98. BO client is using the ordinary BO server.
    Simovits
  • trojan
    [trojan] BO Facil. Works on Windows 95 and 98. Aliases: Back Orifice Facil
    Simovits
  • trojan
    [trojan] BO2. Remote Access. Works on Windows 95 and 98. Bo2 is a Back Orifice client application.
    Simovits
  • trojan
    [trojan] Freak88. Distributed DoS tool. Works on Windows 95, 98 and NT. Aliases: Freak 2000
    Simovits
  • trojan
    [trojan] Freak2k. Distributed DoS tool. Works on Windows 95, 98 and NT. Aliases: Freak 2000
    Simovits
  •  
    Back Orifice - remote administration tool (often Trojan horse) (Unofficial)
    WIKI
  • trojan
    [trojan] NoBackO. Remote Access / Sniffer. Works on Windows.
    Simovits
  • threat
    [threat] Back Fire
    Bekkoame
1 2 3 4 > >>

Sobre puertos TCP/UDP

El puerto TCP 3 usa el Protocolo de Control de Transmisión. TCP es uno de los protocolos principales en redes TCP/IP. TCP es un protocolo orientado en la conexión, necesita el apretón de manos para determinar comunicaciones de principio a fin. Solo cuando la conexión es determinada, los datos del usuario pueden ser mandados de modo bidireccional por la conexión.
¡Atención! TCP puerto 3 garantiza la entrega de paquetes de datos en la misma orden, en que fueron mandados. La comunicación garantizada por el puerto TCP 3 es la diferencia mayor entre TCP y UDP. El puerto UDP no garantizaría la comunicación como TCP.

UDP puerto 3 provee un servicio poco fidedigno y datagramas pueden llegar en duplicado, descompuestos o perdidos sin aviso. UDP puerto 3 piensa, que la verificación y corrección de errores no es necesaria o cumplida en la aplicación para evitar los gastos generales para el procesamiento en el nivel del interface de red.
UDP (Protocolo del Datagrama del Usuario) es el protocolo mínimo de la Capa de Transporte orientado en el mensaje (el protocolo es documentado en IETF RFC 768). >br/>Los ejemplos de aplicación, que a menudo usan UDP: voz por IP (VoIP), media de flujo y juegos del multi-jugador en tiempo real. Muchas aplicaciones Web usan UDP, por ejemplo, el Sistema del Nombre de Dominio (DNS), Protocolo de información de Enrutamiento (RIP), Protocolo Dinámico de Configuración del Host (DHCP), Protocolo Simple de Tratamiento de Red (SNMP).
TCP vs UDP - TCP: fiable, ordenado, de peso pesado, de flujo; UDP – poco fiable, desordenado, de peso ligero, datagramas.
Su Dirección IP
Estados Unidos18.216.32.116