TCP/UDP Portfinder

Geben Sie die Portnummer (z. B., 21), Dienst (z. B., ssh, ftp) oder Gefahr (z. B., nimda) ein.
Database aktualisiert 30. März 2016

Suchen Sie Ergebnisse von "all"

<< < 1 2 3 4 5 6 7 > >>
Port: 6776/TCP
6776/TCP - Bekannte Portzuteilungen (13 Dat. gefunden)
  • Dienst
    Details
    Informationsquelle
  •  
    Unassigned
    IANA
  • threat
    [threat] 2000 Cracks
    Bekkoame
  • threat
    [threat] BackDoor-G
    Bekkoame
  • threat
    [threat] VP Killer
    Bekkoame
  • hnmp
    [threat] RAT:SubSeven This port often seen as part of the Sub7 communication. You may see a steady stream of connection attempts: this is because it uses this port separately from the command port in order to transfer information. Sometimes the control-connection thinks the agent is alive, and will continue to attempt this connection as well. Backdoor port in Sub7
    Bekkoame
  • 2000cracks
    [trojan] 2000 Cracks
    SANS
  • backdoor-g
    [trojan] BackDoor-G
    SANS
  • subseven
    [trojan] SubSeven
    SANS
  • vpkiller
    [trojan] VP Killer
    SANS
  • trojan
    [trojan] 2000 Cracks. Works on Windows 95, 98 and NT.
    Simovits
  • trojan
    [trojan] BackDoor-G. Remote Access. Works on Windows 95 and 98. Aliases: Sub Seven, Sub7
    Simovits
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] VP Killer. Remote Access. Works on Windows.
    Simovits
Port: 7000/TCP
7000/TCP - Bekannte Portzuteilungen (26 Dat. gefunden)
  • Dienst
    Details
    Informationsquelle
  •  
    Default for Vuze's built in HTTPS Bittorrent Tracker (Unofficial)
    WIKI
  • afs3-fileserver
    file server itself msdos
    SANS
  •  
    Avira Server Management Console (Unofficial)
    WIKI
  • afs3-fileserver
    file server itself
    IANA
  • threat
    [threat] Kazimas
    Bekkoame
  • threat
    [threat] Remote Grab
    Bekkoame
  • threat
    [threat] Spyboter
    Bekkoame
  • threat
    [threat] SubSeven
    Bekkoame
  • threat
    [threat] SubSeven 2.1 Gold
    Bekkoame
  • threat
    [threat] W32.Gaobot
    Bekkoame
  • threat
    [threat] W32.Mydoom
    Bekkoame
  • threat
    [threat] W32.Mytob
    Bekkoame
  • exploittranslation
    [trojan] Exploit Translation Server
    SANS
  • kazimas
    [trojan] Kazimas
    SANS
  • remotegrab
    [trojan] Remote Grab
    SANS
  • subseven2.1gold
    [trojan] SubSeven 2.1 Gold
    SANS
  • subseven
    [trojan] SubSeven
    SANS
  • trojan
    [trojan] Aladino. Anti-protection trojan / Remote Access / Keylogger / Proxy / FTP server / Telnet server. Works on Windows 95, 98, ME, NT and 2000. Telnet can also be used to access the server. Aliases: Backdoor.Aladino, Asuit
    Simovits
  • trojan
    [trojan] Gunsan. Anti-protection trojan / Remote Access / Worm / IRC trojan / Network trojan / Yahoo trojan / Destructive trojan / Virus / HTTP server. Works on Windows 95, 98, ME, NT, 2000 and XP, together with MS Outlook, Outlook Express and Yahoo! messenger. Aliases: W32.Gunsan, Backdoor.AHF, Skyliner, W32/Skyliner, Backdoor.Gunsan, Win32/Gnusan.A@mm
    Simovits
  • trojan
    [trojan] Remote Grab. Screen shot capturer. Works on Windows 95 and 98. Aliases: MprMod
    Simovits
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] SubSeven 2.1 Gold. Anti-protection trojan / Remote Access / ICQ trojan / Hacking tool / Port scanner / Port proxy. Works on Windows 95, 98 and NT. I may have troubble autoloading on NT. Aliases: Sub 7
    Simovits
  • trojan
    [trojan] Theef. Anti-protection trojan / Remote Access / Keylogger / Port proxy / FTP server / Remote peeker. Works on Windows 95, 98, ME, NT and XP. Aliases: Backdoor.Theef, BackDoor.QW, Bkdr_Delf.AX
    Simovits
  • threat
    [threat] "xfont" (X Windows font server)
    Bekkoame
  • threat
    [threat] BAT.Boohoo.Worm
    Bekkoame
  • threat
    [threat] Exploit Translation Server
    Bekkoame
Port: 7215/TCP
7215/TCP - Bekannte Portzuteilungen (7 Dat. gefunden)
  • Dienst
    Details
    Informationsquelle
  •  
    Unassigned
    IANA
  • threat
    [threat] SubSeven
    Bekkoame
  • threat
    [threat] SubSeven 2.1 Gold
    Bekkoame
  • subseven2.1gold
    [trojan] SubSeven 2.1 Gold
    SANS
  • subseven
    [trojan] SubSeven
    SANS
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] SubSeven 2.1 Gold. Anti-protection trojan / Remote Access / ICQ trojan / Hacking tool / Port scanner / Port proxy. Works on Windows 95, 98 and NT. I may have troubble autoloading on NT. Aliases: Sub 7
    Simovits
Port: 8002/TCP
8002/TCP - Bekannte Portzuteilungen (5 Dat. gefunden)
  • Dienst
    Details
    Informationsquelle
  • teradataordbms
    Teradata ORDBMS
    IANA
  •  
    EMC2 (Legato) Networker or Sun Solcitice Backup (Official)
    WIKI
  •  
    Cisco Systems Unified Call Manager Intercluster (Official)
    WIKI
  • irdmi
    Web service, iTunes Radio streams
    Apple
  • threat
    [threat] "rcgi" or "PERL.NLM" allows running of PERL scripts on a Novell 4.1 webserver.
    Bekkoame
Port: 9955/TCP
9955/TCP - Bekannte Portzuteilungen (2 Dat. gefunden)
  • Dienst
    Details
    Informationsquelle
  • alljoyn-stm
    Contact Port for AllJoyn standard messaging
    IANA
  • threat
    [threat] W32.Reatle
    Bekkoame
Port: 9955/UDP
9955/UDP - Bekannte Portzuteilungen (2 Dat. gefunden)
  • Dienst
    Details
    Informationsquelle
  • alljoyn-mcm
    Contact Port for AllJoyn multiplexed constrained messaging
    IANA
  •  
    QuickTime Streaming Server
    Apple
Port: 9956/UDP
9956/UDP - Bekannte Portzuteilungen (2 Dat. gefunden)
  • Dienst
    Details
    Informationsquelle
  • alljoyn
    Alljoyn Name Service
    IANA
  •  
    QuickTime Streaming Server
    Apple
Port: 10631/TCP
10631/TCP - Bekannte Portzuteilungen (1 Dat. gefunden)
  • Dienst
    Details
    Informationsquelle
  • printopia
    Port to allow for administration and control of "Printopia" application software,
    IANA
Port: 16959/TCP
16959/TCP - Bekannte Portzuteilungen (7 Dat. gefunden)
  • Dienst
    Details
    Informationsquelle
  •  
    Unassigned
    IANA
  • threat
    [threat] SubSeven
    Bekkoame
  • threat
    [threat] Subseven 2.1.4 DefCon 8
    Bekkoame
  • subseven2.1.4defcon8
    [trojan] Subseven 2.1.4 DefCon 8
    SANS
  • subseven
    [trojan] SubSeven
    SANS
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] Subseven 2.1.4 DefCon 8. Remote Access / Hacking tool / ICQ trojan. Works on Windows 95, 98 and NT, together with ICQ. Aliases: Troj_Sub7.214DC8, Troj_Sub7.382883
    Simovits
Port: 27374/TCP
27374/TCP - Bekannte Portzuteilungen (21 Dat. gefunden)
  • Dienst
    Details
    Informationsquelle
  •  
    Unassigned
    IANA
  • threat
    [threat] Bad Blood
    Bekkoame
  • threat
    [threat] Baste
    Bekkoame
  • threat
    [threat] Ramen
    Bekkoame
  • threat
    [threat] Seeker
    Bekkoame
  • threat
    [threat] SubSeven
    Bekkoame
  • threat
    [threat] Subseven 2.1.4 DefCon 8
    Bekkoame
  • threat
    [threat] SubSeven Muie
    Bekkoame
  • threat
    [threat] Ttfloader
    Bekkoame
  • subseven
    [trojan] SubSeven
    SANS
  • trojan
    [trojan] Bad Blood. Remote Access / Mail trojan. Works on Windows 95 and 98 (maybe on NT), together with MS Outlook Express. Aliases: Badblood
    Simovits
  • trojan
    [trojan] Fake SubSeven. Works on Windows 95, 98 and ME. Aliases: SubSeven 2.2
    Simovits
  • trojan
    [trojan] li0n. Worm / Steals passwords / Rootkit dropper / Hacking tool / Distributed DoS tool. Works on Unix (Linux), together with BIND 8.2. Aliases: The Lion worm, Linux/Lion, 1i0n, Lion
    Simovits
  • trojan
    [trojan] Ramen. Worm / HTML trojan / HTTP server / Hacking tool / Destructive trojan. Works on Unix (Linux). Linux Red Hat 6.x and early versions of 7.0. May also work on other Unix dialects such as FreeBSD and Linux SuSE, Mandrake and Cladera. The mail addresses used are [email protected] and [email protected]. Aliases: Linux.Ramen, Worm.Ramen, Elf.Ramen
    Simovits
  • trojan
    [trojan] Seeker. JavaScript trojan. Works on Windows 95 and 98, together with MS Internet Explorer and Netscape Navigator. Aliases: SEEKER.B, JS.Trojan.Seeker.b, JetHome, Troj/JetHome, JS_SEEKER.B, JS/Seeker.B, JS/Seeker.gen
    Simovits
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] SubSeven 2.1 Gold. Anti-protection trojan / Remote Access / ICQ trojan / Hacking tool / Port scanner / Port proxy. Works on Windows 95, 98 and NT. I may have troubble autoloading on NT. Aliases: Sub 7
    Simovits
  • trojan
    [trojan] Subseven 2.1.4 DefCon 8. Remote Access / Hacking tool / ICQ trojan. Works on Windows 95, 98 and NT, together with ICQ. Aliases: Troj_Sub7.214DC8, Troj_Sub7.382883
    Simovits
  • trojan
    [trojan] SubSeven 2.2. Remote Access / Keylogger / Steals passwords / Eavesdropper / Remote peeker / Sniffer / Proxy server / Hacking tool / FTP server. Works on Windows 95, 98, ME, NT and 2000. Aliases: Backdoor.SubSeven, Backdoor-G, BackDoor-G2, BackDoor-G22, TSB Trojan, Serbian Badman Trojan, Badman Trojan, Troj_Sub7.22
    Simovits
  • trojan
    [trojan] SubSeven Muie. Works on Windows 95, 98 and NT. Aliases: Backdoor.Muie, Troj_Muie, TROJ_SUB7.MUIE, Muie, BackDoor-EP
    Simovits
  • trojan
    [trojan] The Saint. Remote Access / Hacking tool. Works on Windows. Aliases: WebHead
    Simovits
<< < 1 2 3 4 5 6 7 > >>

Über TCP/UDP Ports

Der TCP Port 6776 verwendet das Transmissionskontrollprotokoll. TCP ist eins der Hauptprotokolle in TCP/IP Netzwerken. TCP ist ein auf die Verbindung orientiertes Protokoll, das einen Händedruck braucht, um Ende-bis-Ende Kommunikationen einzustellen. Die Daten eines Benutzers können bidirektional über die Verbindung nur nach der Einstellung der Verbindung gesandt werden.
Achtung! TCP port 6776 garantiert die Lieferung der Datenpackungen in derselben Ordnung, darin sie gesandt wurden. Garantierte Kommunikation über den TCP Port 6776 ist der Hauptunterschied zwischen TCP und UDP. Der UDP hat keine garantierte Kommunikation wie TCP.

UDP port 6776 besorgt einen unzuverlässigen Dienst und Datagramme können ohne Meldung verdoppelt, unzulässig kommen oder verschwinden. UDP port 6776 denkt, dass die Fehlernachprüfung und -korrektion nicht erforderlich ist oder in dieser Anwendung nicht vollgezogen wird, um das Overhead dieser Bearbeitung auf dem Netzwerkschnittstellniveau zu vermeiden.
UDP (Benutzerdatagrammprotokoll) ist ein minimales Transportschichtprotokoll, das auf Meldungen orientiert ist (das Protokoll ist in IETF RFC 768 orientiert). Anwendungsmuster, die UDP oft verwenden: Überstimme IP (VoIP), Strommedia und Echtzeitspiele mit vielen Spielern. Viele Webanwendungen verwenden UDP, z. B., Domänennamensystem (DNS), Routerinformationsprotokoll (RIP), dynamisches Hostcomputerkonfigurationsprotokoll (DHCP), einfaches Netzwerkmanagementprotokoll (SNMP).
TCP versus UDP - TCP: zuverlässig, ordentlich, schwer, strömend; UDP – unzuverlässig, unordentlich, leicht, Datagramme.
Ihre IP Adresse
Vereinigte Staaten3.147.140.206