Please note, the port numbers listed below are not trojans. Information mostly from Symantec Security Response Some of these trojans may also use port 80 (registered HTTP port) and 8080 (common HTTP port). MyDoom.A actually may choose in a range from port 3127 to 3198. TrendMicro OfficeScan antivirus also uses this port. This is the registered port for the Italk Chat System. This is the registered port for the Amanda backup software. Within a range 8800-8900 used by Ultima Online Messenger. This port is commonly used by SGI ESP HTTP. This port is registered for NetworkLens SSL Event. This port is commonly used by the squid proxy. Registered port for Lotus Notes LNVSTATUSīeagle.W, Beagle.X, other Beagle/Bagle variants Port search resources from my TCP/IP Ports page to be useful.Īs of, based on news reports and probes I see on my network. PestPatrol - About Ports and Trojans - A Port List Additional ResourcesĪlthough not specific to trojan ports, you may find the Provides an excellent description of various trojan programs Threats to your Security on the Internet.ONCTek List of possible Trojan/Backdoor port activity Denial of Service Help: Trojan Ports to Block.Is an excellent must-read FAQ on what kind of probes you may be seeing on different ports.ĭatabase with many different sorting options Please contact me with any suggestions, corrections, or comments. I have placed a particular emphasis on home broadband network security. Some sites with good lists, as well as a variety of other security resources. So instead of trying to list every port here, I am just going to provide links to I have found many much better resources for trojan and insecure ports, Therefore, just because a port shows up, it doesn't necessarily mean that it has been Please note that unfortunately, trojans can use the same port number as legitimate services These are ports that you definitely want closed, possibly withįirewall alarms set on them to detect any external probes or internal compromise. That hackers use to break into your network. This page documents DANGEROUS TCP/IP ports, that are usedīy trojan horse and backdoor programs or that expose system vulnerabilities, That page lists ports that you might want to open or be aware of in order to Internet Service Providers - Free Software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |