TCP/UDP Port Finder

Enter port number (e.g. 21), service (e.g. ssh, ftp) or threat (e.g. nimda)
Database updated - March 30, 2016

Search results for "transscout"

Port: 1999/TCP
1999/TCP - Known port assignments (11 records found)
  • Service
    Details
    Source
  • tcp-id-port
    cisco identification port
    IANA
  • threat
    [threat] Back Door
    Bekkoame
  • threat
    [threat] Bifrose
    Bekkoame
  • threat
    [threat] SubSeven
    Bekkoame
  • threat
    [threat] TransScout
    Bekkoame
  • backdoor
    [trojan] BackDoor
    SANS
  • subseven
    [trojan] SubSeven
    SANS
  • transscout
    [trojan] TransScout
    SANS
  • trojan
    [trojan] Back Door. Remote Access / ICQ trojan. Works on Windows 95, 98 and NT.
    Simovits
  • trojan
    [trojan] SubSeven. Remote Access / Network trojan / ICQ trojan / IRC trojan. Works on Windows 95, 98 and NT. From version 2.2 beta 2 also on NT, before only on 95 and 98. Version 2.1 can also be controlled via messages over IRC and ICQ. From 2.13 all file names are default names and can be changed. Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG
    Simovits
  • trojan
    [trojan] TransScout. Remote Access / Keylogger / Steals passwords. Works on Windows 95 and 98. Possibly also on NT. Aliases: Transmission Scout, Backdoor.TScout, Tscout
    Simovits
Port: 2003/TCP
2003/TCP - Known port assignments (3 records found)
  • Service
    Details
    Source
  • brutus
    Brutus Server
    IANA
  • cfingerd
    GNU finger
    SANS
  • transscout
    [trojan] TransScout
    SANS
Port: 2004/TCP
2004/TCP - Known port assignments (4 records found)
  • Service
    Details
    Source
  • mailbox
    -
    IANA
  • threat
    [threat] OICQSer
    Bekkoame
  • transscout
    [trojan] TransScout
    SANS
  • trojan
    [trojan] Duddie. Remote Access / Keylogger / Destructive trojan. Works on Windows. Aliases: Backdoor.Duddie
    Simovits
Port: 2005/TCP
2005/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  • berknet
    -
    IANA
  • deslogin
    encrypted symmetric telnet login
    SANS
  • threat
    [threat] W32.Reatle
    Bekkoame
  • threat
    [threat] OICQSer
    Bekkoame
  • transscout
    [trojan] TransScout
    SANS
  • trojan
    [trojan] Duddie. Remote Access / Keylogger / Destructive trojan. Works on Windows. Aliases: Backdoor.Duddie
    Simovits
Port: 9878/TCP
9878/TCP - Known port assignments (6 records found)
  • Service
    Details
    Source
  •  
    EMC2 (Legato) Networker or Sun Solcitice Backup (Official)
    WIKI
  •  
    Unassigned
    IANA
  • threat
    [threat] TransScout
    Bekkoame
  • transscout
    [trojan] TransScout
    SANS
  • trojan
    [trojan] Small Big Brother. Remote Access / Keylogger / Destructive trojan. Works on Windows. Aliases: Backdoor.SmallBigBrother
    Simovits
  • trojan
    [trojan] TransScout. Remote Access / Keylogger / Steals passwords. Works on Windows 95 and 98. Possibly also on NT. Aliases: Transmission Scout, Backdoor.TScout, Tscout
    Simovits

About TCP/UDP ports

TCP port 1999 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. TCP is a connection-oriented protocol, it requires handshaking to set up end-to-end communications. Only when a connection is set up user's data can be sent bi-directionally over the connection.
Attention! TCP guarantees delivery of data packets on port 1999 in the same order in which they were sent. Guaranteed communication over TCP port 1999 is the main difference between TCP and UDP. UDP port 1999 would not have guaranteed communication as TCP.
UDP on port 1999 provides an unreliable service and datagrams may arrive duplicated, out of order, or missing without notice. UDP on port 1999 thinks that error checking and correction is not necessary or performed in the application, avoiding the overhead of such processing at the network interface level.
UDP (User Datagram Protocol) is a minimal message-oriented Transport Layer protocol (protocol is documented in IETF RFC 768).
Application examples that often use UDP: voice over IP (VoIP), streaming media and real-time multiplayer games. Many web applications use UDP, e.g. the Domain Name System (DNS), the Routing Information Protocol (RIP), the Dynamic Host Configuration Protocol (DHCP), the Simple Network Management Protocol (SNMP).
TCP vs UDP - TCP: reliable, ordered, heavyweight, streaming; UDP - unreliable, not ordered, lightweight, datagrams.
Your IP address
Your are from United States35.175.212.5