TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "ash"

Port: 1556/TCP
1556/TCP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • veritas_pbx
    VERITAS Private Branch Exchange
    IANA
  • ashwin
    AshWin CI Tecnologies
    SANS
Port: 1556/UDP
1556/UDP - Known port assignments (2 records found)
  • Service
    Details
    Source
  • veritas_pbx
    VERITAS Private Branch Exchange
    IANA
  • ashwin
    AshWin CI Tecnologies
    SANS
Port: 9000/UDP
9000/UDP - Known port assignments (5 records found)
  • Service
    Details
    Source
  • cslistener
    CSlistener
    IANA
  •  
    EMC2 (Legato) Networker or Sun Solcitice Backup (Official)
    WIKI
  •  
    UDPCast (Official)
    WIKI
  •  
    QuickTime Streaming Server
    Apple
  • threat
    [threat] Asheron's Call This port is used in Microsoft's massively-multiplayer game called "Asheron's Call". The game can continue to contact the player even after the player has logged out.
    Bekkoame
Port: 12345/TCP
12345/TCP - Known port assignments (28 records found)
  • Service
    Details
    Source
  • italk
    Italk Chat System
    IANA
  • threat
    [threat] Amitis
    Bekkoame
  • threat
    [threat] Ashley
    Bekkoame
  • threat
    [threat] cron / crontab
    Bekkoame
  • threat
    [threat] Fat Bitch trojan
    Bekkoame
  • threat
    [threat] GabanBus
    Bekkoame
  • threat
    [threat] icmp_client.c
    Bekkoame
  • threat
    [threat] icmp_pipe.c
    Bekkoame
  • threat
    [threat] Mypic
    Bekkoame
  • threat
    [threat] NetBus
    Bekkoame
  • threat
    [threat] NetBus Toy
    Bekkoame
  • threat
    [threat] NetBus worm
    Bekkoame
  • threat
    [threat] Notice how this port is the sequence of numbers "1 2 3 4 5". This is common chosen whenever somebody is asked to configure a port number. It is likewise chosen by programmers when creating default port numbers for their products. One very famous such uses is with NetBus. Trend Micro's OfficeScan products use this port.
    Bekkoame
  • threat
    [threat] Pie Bill Gates
    Bekkoame
  • threat
    [threat] Whack Job
    Bekkoame
  • threat
    [threat] X-bill
    Bekkoame
  • netbus
    [trojan] NetBus
    SANS
  • trojan
    [trojan] Ashley. Worm / IRC trojan / Mail trojan / Downloading trojan. Works on Windows 95, 98 and ME, together with MS Outlook and mIRC and Ircn.
    Simovits
  • trojan
    [trojan] BlueIce 2000. Works on Windows. Aliases: Backdoor.BlueIce
    Simovits
  • trojan
    [trojan] Mypic. Remote Access / Trojan dropper. Works on Windows 95 and 98.
    Simovits
  • trojan
    [trojan] NetBus. Remote Access / Keylogger / Eavesdropper. Works on Windows 95, 98, NT and 2000. Also with Unix (Linux). There also exists hacked versions of NetBus 2.0 by Atomic Toxic and Azote. ? Source code is available (v 1.53). Aliases: Sysedit, Backdoor.Netbus, W95.NetBus, Michal
    Simovits
  • trojan
    [trojan] Pie Bill Gates. Remote Access / Trojan dropper. Works on Windows 95, 98 and NT. Aliases: Bill.zip
    Simovits
  • trojan
    [trojan] Q-taz. Remote Access / Keylogger. Works on Windows. Aliases: Qtaz, Backdoor.Qtaz
    Simovits
  • trojan
    [trojan] Sensive. Remote Access. Works on Windows 98. Aliases: Backdoor.Sensive
    Simovits
  • trojan
    [trojan] Snape. Works on Windows. Aliases: Backdoor.Snape
    Simovits
  • trojan
    [trojan] Vagr Nocker. Remote Access / Steals passwords. Works on Windows. Aliases: Backdoor.Latinus.14, VAGR
    Simovits
  • trojan
    [trojan] ValvNet. Remote Access. Works on Windows 95, 98, ME and NT. Aliases: Valv - Not Earthy Trojan, Valv-Net
    Simovits
  • trojan
    [trojan] Whack Job. Remote Access / Trojan dropper. Works on Windows 95, 98 and NT.
    Simovits
Port: 12345/UDP
12345/UDP - Known port assignments (17 records found)
  • Service
    Details
    Source
  • italk
    Italk Chat System
    IANA
  • threat
    [threat] Amitis
    Bekkoame
  • threat
    [threat] Ashley
    Bekkoame
  • threat
    [threat] cron / crontab
    Bekkoame
  • threat
    [threat] Fat Bitch trojan
    Bekkoame
  • threat
    [threat] GabanBus
    Bekkoame
  • threat
    [threat] icmp_client.c
    Bekkoame
  • threat
    [threat] Mypic
    Bekkoame
  • threat
    [threat] NetBus
    Bekkoame
  • threat
    [threat] NetBus Toy
    Bekkoame
  • threat
    [threat] NetBus worm
    Bekkoame
  • threat
    [threat] Notice how this port is the sequence of numbers "1 2 3 4 5". This is common chosen whenever somebody is asked to configure a port number. It is likewise chosen by programmers when creating default port numbers for their products. One very famous such uses is with NetBus. Trend Micro's OfficeScan products use this port.
    Bekkoame
  • threat
    [threat] Pie Bill Gates
    Bekkoame
  • threat
    [threat] Whack Job
    Bekkoame
  • threat
    [threat] X-bill
    Bekkoame
  • threat
    [threat] icmp_pipe.c
    Bekkoame
  • trojan
    [trojan] BlueIce 2000. Works on Windows. Aliases: Backdoor.BlueIce
    Simovits

About TCP/UDP ports

TCP port 1556 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 1556 in the same order in which they were sent. Guaranteed communication over TCP port 1556 is the main difference between TCP and UDP. UDP port 1556 would not have guaranteed communication as TCP.
UDP on port 1556 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 1556 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States18.219.98.26