Network port and detailed explanation

xiaoxiao2021-03-06  93

According to the port number, it can be divided into 3 categories:

(1) Well Known Ports: From 0 to 1023, they are closely bound to some services. Usually the communication of these ports clearly shows the protocol of some service. For example: 80 ports are actually HTTP communication.

(2) Registered ports: from 1024 to 49151. They are loosely bound to some services. That is to say, many services are bound to these ports, which are also used in many other purposes. For example: Many systems processes the dynamic port starting from around 1024.

(3) Dynamic and / or private ports (Dynamic and / or Private Ports): from 49152 to 65535. In theory, these ports should not be assigned to the service. In fact, the machine usually allocates a dynamic port from 1024. But there are also exceptions: Sun's RPC port begins with 32768.

0 usually used to analyze the operating system. This method can work because "0" in some systems is invalid port, which will produce different results when you try to use a usual closing port to connect it. A typical scan: Use the IP address of 0.0.0.0 to set the ACK bit and broadcast in Ethernet layer.

1 TCPMUX TCP Port Service Multiplexer Transfer Control Protocol Port Services Multi-Switch Selector

2 CompressNet Management Utility CompressNet Management Utility

3 CompressNet Compression Process Compression Process

5 RJE Remote Job Entry Remote Job Login

7 echo echo return

9 Discard Discard Discard

11 SYSTAT ACTIVE USERS online user

13 DayTime Daytime Time

17 qotd quote of the day daily reference

18 MSP Message Send Protocol Message Send Agreement

19 Chargen Character Generator Character Generator

20 FTP-DATA File Transfer [Default Data] File Transfer Protocol (Default Data Port)

21 FTP File Transfer [Control] File Transfer Protocol (Control)

22 SSH SSH Remote Login Protocol SSH Remote Login Protocol

23 Telnet Telnet Terminal Simulation Agreement

24 Any Private Mail System reserved for personal mail system

25 SMTP SIMPLE MAIL TRANSFER Simple Mail Send Agreement

27 NSW-Fe NSW User System FE NSW User System Field Engineer

29 MSG-ICP MSG ICP MSG ICP

31 MSG-Auth MSG Authentication MSG Verification

33 DSP Display Support Protocol Display Support Protocol

35 Any Private Printer Server Reserved to Personal Printer Services

37 Time Time Time

38 Rap Route Access Protocol Route Access Protocol

39 RLP Resource Location Protocol Resource Location Protocol

41 Graphics Graphics Graphics

42 Nameserver Wins Host Name Server WINS Host Name Service

43 NICName WHO IS "Nickname" WHO IS Service

44 MPM-Flags MPM Flags Protocol MPM (Message Processing Module) Sign Protocol

45 MPM Message Processing Module [RECV] Message Processing Module

46 MPM-SND MPM [Default Send] Message Process Module (Default Send Port)

47 NI-FTP NI FTP NI FTP

48 Auditd Digital Audit Daemon Digital Audio Background Service 49 TACACS Login Host Protocol (TACACS) TACACS Login Host Protocol 50 RE-MAIL-CK Remote Mail Checking Protocol Remote Mail Check Protocol [Unbeate]

51 la-maint IMP logical address maintenance IMP logical address maintenance

52 XNS-TIME XNS TIME PROTOCOL SETW Network Service System Time Agreement

53 Domain Domain Name Server Domain Name Server

54 XNS-CH XNS Clearinghouse Xerox Network Service System Bill Exchange 55 ISI-GL ISI Graphics Language ISI Graphic Language

56 XNS-Auth XNS Authentication Xerox Network Service System Verification

57? Any Private Terminal Access Reserved Personal Terminal Access

58 XNS-Mail XNS Mail Xerox Network Service System Mail

59 Any Private File Service Reserved personal file service

60 unassigned undefined

61 NI-mail ni mail ni mail?

62 ACAS ACA Services Asynchronous Communication Adapter Service

63 WHOIS WHOIS WHOIS

64 COVIA Communications Integrator (CI) Communication Interface

65 TACACS-DS TACACS-Database Service TACACS Database Services

66 SQL * NET ORACLE SQL * NET ORACLE SQL * NET

67 Bootps Bootstrap Protocol Server Boot Protocol Service

68 Bootpc Bootstrap Protocol Client Boot Protocol Client

69 TFTP Trivial File Transfer Small File Transfer Protocol

70 GOPHER GOPHER Information Retrieval Agreement

71 NETRJS-1 Remote Job Service Remote Job Service

72 NETRJS-2 Remote Job Service Remote Job Services

73 NETRJS-3 Remote Job Service Remote Job Service

74 NETRJS-4 Remote Job Service Remote Job Service

75 ANY Private Dial Out Service Reserved to Personal Dial

76 DEOS Distributed External Object Store Distributed External Object Storage

77 Any Private RJE Service Reserved to Personal Remote Job Enter Service

78 VETTCP VETTCP Fix TCP?

79 Finger Finger query remote host online user, etc.

80 HTTP World Wide Web HTTP Global Information Network Hypertext Transfer Protocol 81 Hosts2-NS Hosts2 Name Server Host2 Name Service

82 XFER XFER Utility Transfer Utility

83 mit-ml-dev mit ml Device Modular Intelligent Terminal ML Equipment

84 CTF Common Trace Facility Public Tracking Equipment 85 ML DEVICE Modular Intelligent Terminal ML Device

86 MFCOBOL Micro Focus Cobol Micro Focus Cobol Programming Language

87 Any Private Terminal LINK reserved to a personal terminal connection

88 Kerberos Kerberos Kerberros Security Authentication System

89 SU-MIT-TG SU / MIT TELNET GATEWAY SU / MIT Terminal Simulation Gateway

90 DNSIX DNSIX Securit Attribute Token Map DNSIx Security Properties Tags 91 Mit-Dov Mit Dover Spooler Mit Dover Spiked

92 NPP Network Printing Protocol Network Print Protocol

93 DCP Device Control Protocol Device Control Protocol

94 Objcall Tivoli Object Dispatcher Tivoli Object Scheduling

95 Supdup SuPDUP

96 DIXIE DIXIE PROTOCOL SPECification DIXIE Agreement Specification

97 SWIFT-RVF (SWIFT Remote Virtural File Protocol) Quick Remote Virtual File Agreement 98 Tacnews Tac News TAC News Protocol

99 Metagram Metagram RELAY

100 NewAcct [Unauthorized USE]

101 = Nic Host Name Server

102 = ISO-TSAP

103 = Genesis Point-to-Point Trans Net

104 = Acr-Nema Digital Imag. & Comm. 300

105 = Mailbox Name Nameserver

106 = 3com-TSMUX3COM-TSMUX

107 = Remote Telnet Service

108 = SNA Gateway Access Server

109 = Post Office Protocol - Version 2

110 = Post Office Protocol - Version 3

111 = Sun RPC

112 = MCIDAS Data Transmission Protocol

113 = Authentication Service

114 = Audio News Multicast

115 = Simple File Transfer Protocol

116 = Ansa Rex Notify

117 = UUCP PATH Service

118 = SQL Servicesqlserv

119 = NetWork News Transfer Protocol

120 = cfdptktcfdptkt

121 = Encore Expedited Remote Pro.Call

122 = SMAKYNETSMAKYNET

123 = NetWork Time Protocol

124 = Ansa Rex Trader

125 = LOCUS PC-Interface Net Map Ser

126 = Unisys Unityary Login

127 = LOCUS PC-Interface Conn Server

128 = GSS X License Verification

129 = Password Generator Protocol

130 = Cisco Fnative

131 = Cisco Tnative132 = Cisco Sysmaint

133 = Statistics Service

134 = INGRES-NET Service

135 = Location Service

136 = Profile Naming System

137 = NetBIOS Name Service

138 = NetBIOS DataGram Service

139 = Netbios Session Service

140 = EMFIS DATA Service

141 = EMFIS Control Service

142 = BRITTON-Lee IDM

143 = Interim Mail Access Protocol V2

144 = Newsnews

145 = UAAC Protocoluaac

146 = ISO-IP0ISO-TP0

147 = ISO-IPISO-IP

148 = cronus-support

149 = AED 512 Emulation Service

150 = SQL-NetSQL-NET

151 = Hemshems

152 = Background File Transfer Program

153 = SGMPSGMP

154 = Netscnetsc-Prod

155 = Netscnetsc-dev

156 = SQL Service

157 = KNET / VM Command / Message Protocol

158 = PCMAIL Serverpcmail-SRV

159 = NSS-RoutingNSS-ROUTING

160 = SGMP-TRAPSSGMP-TRAPS

161 = SNMP

162 = SNMP TRAP

163 = CMIP / TCP Manager

164 = CMIP / TCP Agent

165 = Xeroxxns-Courier

166 = sirius systems

167 = Nampnamp

168 = RSVDRSVD

169 = Send

170 = NetWork PostScript

170 = NetWork PostScript

171 = NetWork Innovations Multiplex

172 = NetWork Innovations CL / 1

173 = XYPLEXXYPLEX-MUX

174 = Mailq

175 = VMNET

176 = Genrad-Muxgenrad-MUX

177 = x Display Manager Control Protocol

178 = NextStep Window Server

179 = Border Gateway Protocol

180 = Intergraphris

181 = Unifyunify

182 = Unisys Audit Sitp

183 = Ocbinderocbinder

184 = OCSERVEROCSERVER

185 = Remote-Kis

186 = Kis Protocolkis

187 = Application Communication Interface

188 = Plus FIVE

401 = Uninterruptible Power Supply

402 = Genie Protocol

403 = DecapDecap

404 = ncednced

405 = nCldNCLD

406 = INTERACTIVE MAIL Support Protocol

407 = Timbuktutimbuktu408 = Prospero Resource Manager Sys .man.

409 = Prospero Resource Manager Node Man.

410 = DECLADEBUG Remote Debug Protocol

411 = Remote MT Protocol

412 = TRAP Convention Port

413 = SMSPSMSP

414 = INFOSEEKINFOSEEK

415 = BNETBNET

416 = SilverPlattersilverPlatter

417 = ONMUXONMUX

418 = Hyper-ghyper-g

419 = Arielariel1

420 = SMPTESMPTE

421 = Arielariel2

422 = Arielariel3

423 = IBM Operations Planning and Control Start

424 = IBM Operations Planning and Control TRACK

425 = ICADICAD-EL

426 = smartsdpsmartsdp

427 = Server Location

429 = OCS_AMU

430 = utsdutmpsd

431 = utmpcdutmpcd

432 = IASDIASD

433 = NNSPNNSP

434 = MobileIP-Agent

435 = mobilip-mn

436 = DNA-CMLDNA-CML

437 = comscmcomscm

439 = DASP, Thomas Obermair

440 = SGCPSGCP

441 = decvms-sysmgtdecvms-sysmgt

442 = CVC_HostDCVC_HOSTD

443 = https

444 = SIMPLE NetWork Paging Protocol

445 = Microsoft-DS

446 = DDM-RDBDDM-RDB

447 = DDM-RFMDDM-DFM

448 = DDM-BYTEDDM-BYTE

449 = AS Server Mapper

450 = TSERVERTSERVER

512 = EXEC, Remote Process Execution

513 = login, Remote Login

514 = cmd, Exec with auto auth.

514 = syslog

515 = Printer Spooler

516 = unassigned

517 = Talk

519 = Unixtime

520 = Extended File Name Server

521 = unassigned

522 = unassigned

523 = Unassigned

524 = unassigned

526 = newdate

530 = RPC Courier

531 = Chatconference

532 = readnewsnetNetNews

533 = for EMERGENCY BROADCASTS

539 = Apertus Technologies Load Determination

540 = uucp

541 = uucp-rlogin

542 = unassigned

543 = klogin

544 = kshell

545 = unassigned

546 = unassigned

547 = unassigned

548 = unassigned549 = unassigned

550 = New-WHO

551 = unassigned

552 = unassigned

553 = unassigned

554 = unassigned

555 = DSF

556 = Remotefs

557-559 = RMonitor

560 = rmonitord

561 = DMONITOR

562 = CHCMD

563 = Unassigned

564 = Plan 9 File Service

565 = WhoAmi

566-569 unassigned

570 = DEMONMETER

571 = udemonmeter

572-599 Unassigned IPC Server

600 = Sun IPC Server

607 = NQS

606 = CRAY UNIFIED RESOURCE MANAGER

608 = sender-initiated / unsolicited file transfer

609 = NPMP-TRAPNPMP-TRAP

610 = npmp-localnpmpmpmp-local

611 = NPMP-GuinPmpMP-GUI

634 = GINADGINAD

666 = DOM ID Software

704 = Errlog COPY / Server Daemon

709 = entrustManager

729 = IBM NetView DM / 6000 Server / Client

730 = IBM NetView DM / 6000 SEND / TCP

731 = IBM NetView DM / 6000 Receive / TCP

741 = NetGwNetGW

742 = NetWork based Rev. Cont. Sys.

744 = flexible license Manager

747 = Fujitsu Device Control

748 = Russell Info Sci Calendar Manager

749 = Kerberos Administration

751 = PUMP

752 = qrh

754 = Send

758 = NLOGIN

759 = con

760 = ns

762 = quotad

763 = CycleServ

765 = Webster

767 = PhonePhonebook

769 = VID

771 = RTIP

772 = CycleServ2

774 = ACMAINT_DBD

775 = ACMAINT_TRANSD

780 = WPGS

786 = ConcertConcert

800 = mdbs_daemon

996 = Central Point Software

997 = Maitrd

999 = PuProuter

1023 = Reserved

1024 = Reserved

1025 = NetWork BlackJack

1030 = BBN IAD

1031 = BBN IAD

1032 = BBN IAD

1067 = Installation Bootstrap Proto. Serv.

1068 = Installation Bootstrap Proto. CLI.

1080 = SOCKS

1083 = Anasoft license Manager

1084 = Anasoft license Manager

1155 = NetWork File Access

1222 = SNI R & D NetWork1248 = HERMES

1346 = Alta Analytics License Manager

1347 = Multi Media Conferencing

1347 = Multi Media Conferencing

1348 = Multi Media Conferencing

1349 = Registration Network Protocol

1350 = Registration Network Protocol

1351 = Digital Tool Works (MIT)

1352 = / Lotus Notelotusnote

1353 = Relief Consulting

1354 = Rightbrain Software

1355 = INTUTIVE EDGE

1356 = Cuillamartin Company

1357 = Electronic Pegboard

1358 = connlcliconnlcli

1359 = ftsrvftsrv

1360 = mimermimimer

1361 = LINX

1362 = Timefliestimeflies

1363 = Network DataMover Requester

1364 = NetWork DataMover Server

1365 = NetWork Software Associates

1366 = Novell NetWare Comm Service Platform

1367 = DCSDCS

1368 = ScreencastScreencast

1369 = GlobalView to Unix Shell

1370 = UNIX Shell to GlobalView

1371 = Fujitsu config protocol

1372 = Fujitsu Config Protocol

1373 = chromagrafxchromagrafx

1374 = EPI Software Systems

1375 = BYTEXBYTEX

1376 = IBM Person to Person Software

1377 = Cichlid License Manager

1378 = Elan license Manager

1379 = INTEGRITY SOLUTIONS

1380 = Telesis Network license Manager

1381 = Apple Network License Manager

1382 = UDT_OS

1383 = GW Hannaway Network license Manager

1384 = Objective Solutions license Manager

1385 = Atex Publishing License Manager

1386 = Checksum License Manager

1387 = Computer Aided Design Software Inc LM

1388 = Objective Solutions Database Cache

1389 = Document Manager

1390 = Storage Controller

1391 = Storage Access Server

1392 = Print ManagericLPV-PM

1393 = NetWork log Server

1394 = NetWork log client

1395 = PC Workstation Manager Software

1396 = DVL ACTIVE MAIL1397 = Audio Active Mail

1398 = Video Active Mail

1399 = Cadkey License Manager

1400 = CADKEY TABLET DAEMON

1401 = Goldleaf License Manager

1402 = Prospero Resource Manager

1403 = Prospero Resource Manager

1404 = Infinite Graphics License Manager

1405 = IBM Remote EXECUTION STARTER

1406 = NetLabs license Manager

1407 = DBSA License Manager

1408 = Sophia License Manager

1409 = Here License Manager

1410 = HIQ LICENSE Manager

1411 = Audiofileaf

1412 = InnosysInnosys

1413 = Innosys-Aclinnosys-ACL

1414 = IBM MQSerIBM-MQSeries

1415 = dbstardbstar

1416 = novell lu6.2novell-lu6.2

1417 = TIMBUKTU Service 1 Port

1417 = TIMBUKTU Service 1 Port

1418 = Timbuktu Service 2 Port

1419 = Timbuktu Service 3 Port

1420 = Timbuktu Service 4 Port

1421 = Gandalf License Manager

1422 = Autodesk License Manager

1423 = EssBase Arbor Software

1424 = Hybrid Encryption Protocol

1425 = Zion Software License Manager

1426 = Satellite-Data Acquisition System 1

1427 = MLOADD MONITORING TOOL

1428 = Informatik License Manager

1429 = Hypercom NMSNMS

1430 = Hypercom TPDUTPDU

1431 = REVERSE GOSIP TRANSPORT

1432 = Blueberry Software License Manager

1433 = Microsoft-SQL-Server

1434 = Microsoft-SQL-MONITOR

1435 = IBM CISCIBM-CICS

1436 = Satellite-Data Acquisition System 2

1437 = Tabulatabula

1438 = Eicon Security Agent / Server

1439 = EICON X25 / SNA GATEWAY

1440 = Eicon Service Location Protocol

1441 = CADIS license Management

1442 = CADIS license management

1443 = INTEGRATED ENGINEERING SOFTWARE

1444 = Marcam License Management

1445 = Proxima license Manager

1446 = Optical Research Associate License Manager1447 = Applied Parallel Research LM

1448 = OpenConnect License Manager

1449 = PeportPeport

1450 = Tandem Distributed Workbench Facility

1451 = IBM INFORMATION management MANAGEMENT

1452 = GTE GOVERNMENT SYSTEMS license Man

1453 = Genie License Manager

1454 = InterhDL License Manager

1454 = InterhDL License Manager

1455 = ESL LICENSE MANAGER

1456 = DCADCA

1457 = ValiSys license Manager

1458 = Nichols Research Corp.

1459 = Proshare Notebook Application

1460 = ProShare Notebook Application

1461 = IBM Wireless LAN

1462 = World License Manager

1463 = NucleusNucleus

1464 = MSL License Manager

1465 = Pipes Platform

1466 = Ocean Software License Manager

1467 = CSDMBaseCSDMBase

1468 = CSDMCSDM

1469 = ACTIVE ANALYSIS LIMITED LICENSE MANAGER

1470 = Universal Analytics

1471 = CSDMBaseCSDMBase

1472 = CSDMCSDM

1473 = OpenMathOpenMathMath

1474 = TelefindertElefinder

1475 = Taligent License Manager

1476 = CLVM-CFGCLVM-CFG

1477 = MS-SNA-Server

1478 = MS-SNA-BASE

1479 = DberegisterDberegister

1480 = PACERFORUMPACERFORUM

1481 = Airsairs

1482 = MITEKSYS LICENSE Manager

1483 = AFS license Manager

1484 = Confluent License Manager

1485 = LansourceLansource

1486 = NMS_TOPO_SERV

1487 = Localinfosrvr

1488 = DOCSTORDOCSTOR

1489 = DMDocBrokerdmdocbroker

1490 = INSITU-Confinsitu-Conf

1491 = AnynetGateway

1492 = stone-design-1

1493 = netmap_lmnetmap_lm

1494 = ICAICA

1495 = CVCCVC

1496 = Liberty-LMLIBERTY-LM

1497 = RFX-LMRFX-LM

1498 = Watcom-Sqlwatcom-SQL

1499 = Federico Heinz Consultora

1500 = VLSI License Manager

1501 = Satellite-Data Acquisition System 31502 = ShivashivAdiscovery

1503 = DATABEAMIMTC-MCS

1504 = EVB Software Engineering License Manager

1505 = funk Software, Inc.

1524 = ingres

1525 = Oracle

1525 = Prospero Directory Service Non-Priv

1526 = Prospero Data Access Prot Non-Priv

1527 = ORACleTLISRV

1529 = Oraclecoauthor

1600 = ISSD

1651 = Proshare conf Audio

1652 = ProShare conf video

1653 = Proshare conf Data

1654 = Proshare conf renest

1655 = ProShare conf Notify

1661 = NetView-AIX-1NetView-AIX-1

1662 = NetView-AIX-2NetView-AIX-2

1663 = NETVIEW-AIX-3NetView-AIX-3

1664 = NETVIEW-AIX-4NetView-AIX-4

1665 = NETVIEW-AIX-5NetView-AIX-5

1666 = NetView-AIX-6NetView-AIX-6

1986 = Cisco License Management

1987 = Cisco Rsrb Priority 1 Port

1988 = Cisco Rsrb Priority 2 Port

1989 = Cisco Rsrb Priority 3 port

1989 = MHSNET SystemMshnet

1990 = Cisco Stun Priority 1 Port

1991 = Cisco Stun Priority 2 Port

1992 = Cisco Stun Priority 3 Port

1992 = ipsendmsgipsendmsg

1993 = Cisco SNMP TCP Port

1994 = Cisco Serial Tunnel Port

1995 = Cisco Perf Port

1996 = Cisco Remote SRB Port

1997 = Cisco Gateway Discovery Protocol

1998 = Cisco X.25 Service (XOT)

1999 = Cisco IDENTIFICATION Port

2009 = WhoscodaMi

2010 = PIPE_SERVER

2011 = RAID

2012 = RAID-AC

2013 = RAD-AM

2015 = RAID-CS

2016 = bootserver

2017 = TerminalDB

2018 = RelPack

2019 = About

2019 = xinupageserver

2020 = xinupageserver

2021 = xinuexpansion1

2021 = DOWN

2022 = xinuexpansion2

2023 = xinuexpansion3

2023 = xinuexpansion4

2024 = xinuexpansion4

2025 = XRIBS

2026 = Scrabble

2027 = ShadowServer

2028 = SubmitServer2039 = Device2

2032 = Blackboard

2033 = Glogger

2034 = scoremgr

2035 = IMSLDOC

2038 = ObjectManager

2040 = LAM

2041 = Interbase

2042 = ISIS

2043 = ISIS-BCAST

2044 = Primsl

2045 = CDFUNC

2047 = DLS

2048 = DLS-MONITOR

2065 = Data Link Switch Read Port Number

2067 = Data Link Switch Write Port Number

2201 = Advanced Training System Program

2500 = Resource TRACKING SYSTEM Server

2501 = Resource TRACKING SYSTEM Client

2564 = HP 3000 NS / VT Block Mode Telnet

2784 = World Wide Web - Developments

3049 = Ccmail

3264 = Ccmail, CC: Mail / Lotus

3333 = DEC-Notes

3984 = Mapper Network Node Manager

3985 = Mapper TCP / IP Server

3986 = Mapper Workstation Server

3421 = BULL APPRISE Portmapper

3900 = Unidata UDT OS

4132 = nuts daemnuts_dem

4133 = NUTS BOOTP SERVER

4343 = unicarl

4444 = KRB524

4672 = Remote File Access Server

5002 = Radio Free Ethernet

5010 = TelepathStarttelelPathStart

5011 = TELEPATHACK

5050 = MultiMedia Conference Control Tool

5145 = rmonitor_secure

5190 = aol, America-online

5300 = ha cluster heartbeat

5301 = HACL-GS # ha cluster general services

5302 = ha cluster configuration

5303 = HACL-PROBE HA Cluster Probing

5305 = HACL-TEST

6000-6063 = x11 x window system

6111 = Sub-Process HP SoftBench Sub-Process Control

6141 / = Meta-Corp Meta Corporation License Manager

6142 = Aspentec-LM Aspen Technology License Manager

6143 = WaterShed-LM Watershed License Manager

6144 = Statsci1-LM Statsci License Manager - 1

6145 = Statsci2-LM Statsci License Manager - 2

6146 = LONEWOLF-LM LONE WOLF SYSTEMS LICENSE Manager

6147 = Montage-LM Montage License Manager7000 = AFS3-FILESERVER FILE Server Itself

7001 = AFS3-CALLBACK CALLBACKS to Cache Managers

7002 = AFS3-PRSERVER USERS & GROUROUPS DATABASE

7003 = AFS3-VLSERVER VOLUME LOCATION DATABASE

7004 = AFS3-Kaserver AFS / KERBEROS Authentication Service

7005 = AFS3-VOLSER VOLUME MANAGMENT Server

7006 = AFS3-ERRORS ERROR Interpretation Service

7007 = AFS3-BOS BASIC OVERSEER Process

7008 = AFS3-UPDATE Server-to-Server Updater

7009 = AFS3-RMTSYS Remote Cache Manager Service

7010 = UPS-ONLINE ONLINET Uninterruptable Power Supplies

7100 = x font service

7200 = FODMS FLIP

7626 = Ice

8010 = Wingate

8181 = iMail

9535 = Man

45576 = E Gene Meat Professional Agent Port

The more specific and supplement explained below.

0 usually used to analyze the operating system. This method can work because "0" in some systems is invalid port, which will produce different results when you try to use a usual closing port to connect it. A typical scan: Use the IP address of 0.0.0.0 to set the ACK bit and broadcast in Ethernet layer.

1 TCPMUX This shows that someone is looking for SGI IRIX machines. IRIX is the main provider of TCPMUX, which is opened in this system by default. IRIS machines are published in the release of several default unconsored accounts such as LP, Guest, UUCP, NUUCP, DEMOS, TUTOR, DIAG, EZSETUP, OUTOFBOX, and 4DGIFTS. Many administrators have forgotten to delete these accounts. Therefore, Hacker searches for TCPMUX on the Internet and uses these accounts.

7 Echo You can see how many people searches for the Fraggle amplifier, sent to XX.x.0 and X.x.x.255. Common DOS Attacks are echo-loops, and an attacker is forged from a UDP packet from one machine to another, and the two machines respond to these packets in their fastest way. Another thing is a TCP connection established by DoubleClick in the word port. There is a product called "Resonate Global Dispatch", which is connected to this port of DNS to determine the nearest route. Harvest / Squid Cache will send UDP Echo from the 3130 port: "If you open the cache's Source_Ping ON option, it will respond to a hit reply on the UDP ECHO port of the original host." This will generate a lot of such packets.

11 SysStat This is a UNIX service that lists all the running processes on the machine and what is started. This provides many information for intruders and threats to the machine, such as exposing programs known to certain weaknesses or accounts. This is similar to the results of the "PS" command in the UNIX system. Again: ICMP has no port, ICMP Port 11 is usually ICMP Type = 11.

19 Chargen This is a service that only sends characters. The UDP version will respond to the package containing the spam after receiving the UDP package. When the TCP connection is connected, the data stream containing the spam will be sent to the connection to close. Hacker uses IP spoof to launch a DOS attack. Forged two UDP packages between two Chargen servers. Since the server attempts to respond to unlimited round-trip data communication between the two servers A Chargen and Echo will cause the server to overload. The same Fraggle DOS attack is broadcast to this port of the target address with a packet with counterfeit victim IP, and the victim is overloaded in order to respond to this data. 21 FTP's most common attacker is used to find ways to open "Anonymous" FTP server. These servers have a readable and writable directory. Hackers or Crackers uses these servers as a node that transmits Warez (private programs) and PR0n (intentional tangle words).

22 SSH PCANYwhere Establishing TCP and this connection can be to find SSH. This service has many weaknesses. If configured as specific modes, many have many vulnerabilities using the RSAREF library. (It is recommended to run SSH in other ports). It should also be noted that the SSH toolkit has a program called make-ssh-known-hosts. It scans the SSH host of the entire domain. You sometimes be used in unintentional scanning. UDP (rather than TCP) is connected to the 5632 port of the other means that there is a scanning of PCANywhere. 5632 (Hexadecimal 0x1600) After the interchange is 0x0016 (22).

23 Telnet invaders are searching for remote landing UNIX. In most cases, the invaders scan this port is to find the operating system that is running. In addition, use other technologies, invaders will find a password.

25 SMTP Against (Spammer) Finding the SMTP server is to deliver their spam. The invader's account is always turned off, and they need to dial to connect to the high-bandwidth E-mail server to pass simple information to different addresses. SMTP servers (especially Sendmail) are one of the most common methods of entering the system, as they must be completely exposed to the Internet and the route of mail is complex (exposed complex = weaknesses).

53 DNS HACKER or CRACKERS may be attempt to perform regional delivery (TCP), deceive DNS (UDP) or hidden other communications. Therefore, the firewall often filters or records 53 ports. It should be noted that you often see the 53 port as the UDP source port. Unstable firewalls typically allow this communication and assume that this is a reply to DNS queries. Hacker often uses this method to penetrate the firewall.

67 & 68 BootP and Bootp / DHCP on DHCP UDP: The firewall that is often sent to broadcast addresses 255.255.255.255 via DSL and Cable-Modem often see data from the broadcast address 255.255.255.255. These machines request an address assignment to the DHCP server. Hacker often enters them allocated an address to initiate a large number of "man-in-middle) attacks as partial routers. The client is configured to the 68-port (Bootps) broadcast request, and the server responds to the 67-port (Bootpc) broadcast. This response uses broadcast because the client still does not know the IP address that can be sent.

69 TFTP (UDP) Many servers are provided with BootP to facilitate download startup code from the system. But they often configure any files from the system, such as password files. They can also be used to write files to the system.

79 Finger Hacker is used to obtain user information, query the operating system, and detect known buffers overflow errors, responding to the machine to other machine finger scans.

80 Web site default 80 is the service port, using TCP or UDP protocol.

98 LinuxConf This program provides simple management of Linux Boxen. Provide a web-based service in the 98 port by integrated HTTP servers. It has found many security issues. Some versions setuid root, trust local area network, build Internet accessible files, and the LANG environment variable has buffer overflow. Also because it contains integrated servers, many typical HTTP vulnerabilities may exist (buffer overflow, overhead directory, etc.) 109 POP2 is not as named by POP3, but many servers provide two services (backward compatible). The vulnerability of POP3 on the same server exists in POP2.

110 POP3 is used for the client access to the server side. POP3 services have many recognized weaknesses. There are at least 20 weaknesses overflow over the username and password switching buffer (this means that Hacker can enter the system before logging in). There are other buffers overflow errors after successfully logging in.

111 SunRPC Portmap Rpcbind Sun RPC portmapper / rpcbind. Access Portmapper is the first step for the scanning system to view which RPC services allowed. Common RPC services include: rpc.mountd, nfs, rpc.statd, rpc.csmd, rpc.ttybd, AMD, etc. The invader found that the allowed RPC service will turn to the specific port test vulnerability of the service. Remember to record Daemon, IDS, or Sniffer in the line, and you can find what program access to the invader is to find what happened.

113 Ident Auth This is a multi-machine running protocol for identifying TCP connections. This service using standard can obtain information of many machines (will be utilized by Hacker). But it can serve as many services, especially those such as FTP, POP, IMAP, SMTP, and IRC. Usually if you have many customers access these services through the firewall, you will see the connection requests for this port. Remember, if you block this port client feels slow connection with the E-mail server on the other side of the firewall. Many firewalls support back RST during the blocking of TCP connections, and will stop this slow connection back.

119 NNTP News News Group Transmission Protocol to carry the USEnet communication. When you link to such as:

News: //comp.security.firewalls/. This port is usually used. The connection at this port is usually looking for a USENET server. Most ISP limits only their customers can access their newsgroup servers. Open the newsgroup server will allow / read anyone's post, access the restricted newsgroup server, post anonymous to post or send a spam.

135 OC-SERV MS RPC END-POINT MAPPER Microsoft runs DCE RPC End-Point Mapper for this port for its DCOM service. This is similar to the functionality of UNIX 111 ports. Use DCOM and / or RPC services to register their location using end-point mapper on your machine. When remote customers are connected to the machine, they queries end-point mapper to find the location of the service. The same HACKER scanning machine is to find Exchange Server on this machine? What version is it? This port can also be used for direct attacks in addition to query services (such as using EPDUMP). There are some DOS attacks directly for this port.

137 NetBIOS Name Service NBTSTAT (UDP) This is the most common information of the firewall administrator.

139 NetBIOS File and Print Sharing Attempts to access the NetBIOS / SMB through this port. This protocol is used for Windows file and printer sharing and Samba. Sharing your own hard drive on the Internet is the most common problem. A large number of ports were started at 1999, and later became less. In 2000, there was a rebound. Some VBS (IE5 VisualBasic scripting) starts copying themselves to this port and trying to breed this port. 143 IMAP and Safety of POP3 above, many IMAP servers have buffer overflow vulnerabilities running in the login process. Remember: A Linux worm (ADMW0RM) will reproduce this port, so many of this port scans from uninformed users who are infected. These vulnerabilities become popular when Radhat allows IMAP by default in their Linux release versions. This is also a widely spread worm after Morris worm. This port is also used in IMAP2, but it is not popular. Some reports have found that some 0 to 143 ports have stem from script.

161 SNMP (UDP) invaders often detect ports. SNMP allows remote management devices. All configurations and running information are stored in the database and are available through SNMP guests. Many administrator error configurations are exposed to the Internet. Crackers will try to use the default password "public" "private" access system. They may test all possible combinations. The SNMP package may be incorrect to point to your network. The Windows machine often uses SNMP for the HP JetDirect Remote Management software because the error configuration. HP Object Identifier will receive an SNMP package. The new version of Win98 uses SNMP to resolve domain names, you will see this package in subnet broadcast (Cable Modem, DSL) query sysname and other information.

162 SNMP TRAP may be due to error configuration

177 XDMCP Many Hackers Access the X-Windows console through it, it needs to open the 6000 port.

513 RWHO may be broadcast from UNIX machines from the subnet using Cable Modem or DSL. These people provide very interesting information for Hacker into their system.

553 CORBA IIOP (UDP) If you use Cable Modem or DSL VLAN, you will see the broadcast of this port. CORBA is an object-oriented RPC (Remote Procedure Call) system. Hacker will use this information to enter the system.

600 PCServer Backdoor Please see the 1524 port.

Some children who play Script think they have completely broken the system through the modification of the Ingreslock and the PCServer file - Alan J. Rosenthal.

635 mountd Linux MountD bug. This is a popular bug that people scan. Most of this port scan is UDP based, but TCP-based mountD has increased (MountD runs on two ports). Remember, MountD can run in any port (which port is in the end, you need to do a portmap query at the port 111), just Linux defaults to 635 port, just like NFS usually runs on the 2049 port.

1024 Many people ask what this port is dry. It is the beginning of a dynamic port. Many programs do not care which port connection network, they request operating systems to assign them "next idle port". Based on this allocation starts from port 1024. This means that the first program that requests the dynamic port to the system will be assigned port 1024. To verify this, you can restart the machine, open Telnet, open a window to run "natstat -a", you will see Telnet assigned 1024 port. The more programs requested, the more dynamic ports. The port assigned by the operating system will gradually become large. Come again, when you browse the web page, use "NetStat" to view, each web page requires a new port. 1025, 1026 See 1024

1080 SOCKS The protocol passes through the firewall in a pipeline, allowing many people behind the firewall to access the Internet through an IP address. In theory it should only allow the internal communication to reach the Internet. However, due to the wrong configuration, it allows the HACKER / CRACKER to pass an attack outside the firewall through the firewall. Or simply respond to a computer located on the Internet, enabling them to attack your direct attack. Wingate is a common Windows personal firewall that often occurs the above error configuration. This will often see this when joining the IRC chat room.

1114 SQL system itself rarely scans this port, but is often part of the SSCAN script.

1243 SUB-7 Trojans (TCP)

1524 Ingreslock Land Door Many Attack Scripts will install a back door shell at this port (especially those for Sendmail and RPC service vulnerabilities in the Sun system, such as STATD, TTDBSERVER, and CMSD). If you just installed your firewall, you see the connection at this port, which is probably the above reasons. You can try Telnet to this port on your machine to see if it will give you a shell. This issue is also available to 600 / PCServer.

2049 NFS NFS program is often running on this port. It usually needs to access portmapper query which port is running, but most of the case is installed after installation, and Hacker / Cracker can pass the portmapper directly to test this port.

3128 Squid This is the default port of the Squid HTTP proxy server. The attacker scans this port is to search for an anonymous access to the Internet. You will also see the ports of other proxy servers: 8000/8001/8080/8888. Another reason for scan this port is that users are entering the chat room. Other users (or server itself) also verify this port to determine if the user's machine supports the agent.

5632 PCANYWERE You will see a lot of this port scan, depending on your location. When the user opens PCAnyWere, it automatically scans the local area network C-class network to find the possible agent (the translator: refers to Agent instead of proxy). Hacker / Cracker will also find a machine that open this service, so you should check the source address of this scan. Some scanning of PCANYWERE often contains the UDP packet of port 22.

6776 SUB-7 Artifact This port is a port that is used to transmit data from the SUB-7 host port. For example, when the controller controls another machine through the telephone line, you will see this when the controlled machine is hung up. Therefore, when another person is dial in this IP, they will see continuous, attempting at this port. (Translator: That is to see the connection attempt of the firewall report, do not mean that you have been controlled by SUB-7.)

6970 Reaudio ReaSuDio receives audio data streams from the UDP port of the server's 6970-7170. This is set by the TCP7070 port externally control connection.

13223 Powwow Powwow is a chat program for TRIBAL VOICE. It allows users to open private chats at this port. This process is very "offensive" for establishing a connection. It will "station" waiting for response in this TCP port. This causes a connection attempt to a heartbeat interval. If you are a dial user, "inherit" from another chat, this is what the IP address is: It seems that many different people are testing this port. This protocol uses "OPNG" as the first four bytes of its connection attempt. 17027 Conducent This is an outgoing connection. This is because someone has a shared software with Conducent "ADBOT" inside the company. Conducent "Adbot" is an advertising service for shared software. A popular software using this service is pkware. Some people test: Blocking this external connection does not have any problems, but the IP address itself will cause the ADBOTS to try to connect multiple times in each second:

The machine will continue to analyze DNS name -ads.conducent.com, ie IP address 216.33.210.40; 216.33.199.77; 216.33.199.80; 216.33.199.81; 216.33.210.41. (Translator: I don't know if Netants used in Radiate also has this phenomenon)

27374 SUB-7 Trojans (TCP)

30100 NetSphere Trojan (TCP) usually this port scan is to find NetSphere Trojans.

31337 Back Orification "Elite" HACKER 31337 reads "Elite" / Ei'li: T / (Translator: French, translated as backbone, essence. That is, 3 = E, 1 = L, 7 = T). So many rear door programs are running on this port. The most famous is Back Orific. This is the most common scan on the Internet for a while. Now it's getting less and less, other Trojans are increasingly popular.

31789 Hack-A-TACK This port UDP communication is usually due to the "HACK-A-TACK" remote access to Trojan (RAT, Remote Access Trojan). This Trojan includes a built-in 31790 port scanner, so any 31789 port to 317890 port means that this invasion is already. (31789 port is control connection, 317890 port is file transfer connection)

32770 ~ 32900 RPC Services The RPC service of Sun Solaris is within this range. Detailed: Early versions of Solaris (2.5.1) placed portmapper in this range even if the low port was closed by the firewall, still allowed Hacker / Cracker to access this port. Scanning this range is not to find portmapper, just to find known RPC services that can be attacked.

33434 ~ 33600 Traceroute If you see the UDP packet within this port (and within this range) may be due to Traceroute.

转载请注明原文地址:https://www.9cbs.com/read-96511.html

New Post(0)