udp常用端口号(TCP/UDP端口号的用处)

      最后更新:2024-04-19 08:15:52 手机定位技术交流文章

      UDP端口都有哪些,除了138,137

      端口:137、138、139 服务:NETBIOS Name Service说明:其中137、138是UDP端口,当通过网上邻居传输文件时用这个端口。而139端口:通过这个端口进入的连接试图获得NetBIOS/SMB服务 。这个协议被用于windows文件和打印机共享和SAMBA。还有WINS Regisrtation也用它。
      UDP端口号是可以随意指定的,在1-65535都可以。
      UDP端口都有哪些,除了138,137

      网络中常用的端口号有哪些?

      坦白是粘贴的文字但是我觉得全面 好不好您说! 21/tcp FTP 文件传输协议22/tcp SSH 安全登录、文件传送(SCP)和端口重定向23/tcp Telnet 不安全的文本传送25/tcp SMTP Simple Mail Transfer Protocol (E-mail)69/udp TFTP Trivial File Transfer Protocol79/tcp finger Finger80/tcp HTTP 超文本传送协议 (WWW)88/tcp Kerberos Authenticating agent110/tcp POP3 Post Office Protocol (E-mail)113/tcp ident old identification server system119/tcp NNTP used for usenet newsgroups220/tcp IMAP3443/tcp HTTPS used for securely transferring web pages端口:0服务:Reserved说明:通常用于分析操作系统。这一方法能够工作是因为在一些系统中“0”是无效端口,当你试图使用通常的闭合端口连接它时将产生不同的结果。一种典型的扫描,使用IP地址为0.0.0.0,设置ACK位并在以太网层广播。端口:1服务:tcpmux说明:这显示有人在寻找SGI Irix机器。Irix是实现tcpmux的主要提供者,默认情况下tcpmux在这种系统中被打开。Irix机器在发布是含有几个默认的无密码的帐户,如:IP、GUEST UUCP、NUUCP、DEMOS 、TUTOR、DIAG、OUTOFBOX等。许多管理员在安装后忘记删除这些帐户。因此HACKER在INTERNET上搜索tcpmux并利用这些帐户。端口:7服务:Echo说明:能看到许多人搜索Fraggle放大器时,发送到X.X.X.0和X.X.X.255的信息。端口:19服务:Character Generator说明:这是一种仅仅发送字符的服务。UDP版本将会在收到UDP包后回应含有垃圾字符的包。TCP连接时会发送含有垃圾字符的数据流直到连接关闭。HACKER利用IP欺骗可以发动DoS攻击。伪造两个chargen服务器之间的UDP包。同样Fraggle DoS攻击向目标地址的这个端口广播一个带有伪造受害者IP的数据包,受害者为了回应这些数据而过载。端口:21服务:FTP说明:FTP服务器所开放的端口,用于上传、下载。最常见的攻击者用于寻找打开anonymous的FTP服务器的方法。这些服务器带有可读写的目录。木马Doly Trojan、Fore、Invisible FTP、WebEx、WinCrash和Blade Runner所开放的端口。端口:22服务:Ssh说明:PcAnywhere建立的TCP和这一端口的连接可能是为了寻找ssh。这一服务有许多弱点,如果配置成特定的模式,许多使用RSAREF库的版本就会有不少的漏洞存在。端口:23服务:Telnet说明:远程登录,入侵者在搜索远程登录UNIX的服务。大多数情况下扫描这一端口是为了找到机器运行的操作系统。还有使用其他技术,入侵者也会找到密码。木马Tiny Telnet Server就开放这个端口。端口:25服务:SMTP说明:SMTP服务器所开放的端口,用于发送邮件。入侵者寻找SMTP服务器是为了传递他们的SPAM。入侵者的帐户被关闭,他们需要连接到高带宽的E-MAIL服务器上,将简单的信息传递到不同的地址。木马Antigen、Email Password Sender、Haebu Coceda、Shtrilitz Stealth、WinPC、WinSpy都开放这个端口。端口:31服务:MSG Authentication说明:木马Master Paradise、Hackers Paradise开放此端口。端口:42服务:WINS Replication说明:WINS复制端口:53服务:Domain Name Server(DNS)说明:DNS服务器所开放的端口,入侵者可能是试图进行区域传递(TCP),欺骗DNS(UDP)或隐藏其他的通信。因此防火墙常常过滤或记录此端口。端口:67服务:Bootstrap Protocol Server说明:通过DSL和Cable modem的防火墙常会看见大量发送到广播地址255.255.255.255的数据。这些机器在向DHCP服务器请求一个地址。HACKER常进入它们,分配一个地址把自己作为局部路由器而发起大量中间人(man-in-middle)攻击。客户端向68端口广播请求配置,服务器向67端口广播回应请求。这种回应使用广播是因为客户端还不知道可以发送的IP地址。端口:69服务:Trival File Transfer说明:许多服务器与bootp一起提供这项服务,便于从系统下载启动代码。但是它们常常由于错误配置而使入侵者能从系统中窃取任何 文件。它们也可用于系统写入文件。端口:79服务:Finger Server说明:入侵者用于获得用户信息,查询操作系统,探测已知的缓冲区溢出错误,回应从自己机器到其他机器Finger扫描。端口:80服务:HTTP说明:用于网页浏览。木马Executor开放此端口。端口:99服务:gram Relay说明:后门程序ncx99开放此端口。端口:102服务:Message transfer agent(MTA)-X.400 over TCP/IP说明:消息传输代理。端口:109服务:Post Office Protocol -Version3说明:POP3服务器开放此端口,用于接收邮件,客户端访问服务器端的邮件服务。POP3服务有许多公认的弱点。关于用户名和密码交 换缓冲区溢出的弱点至少有20个,这意味着入侵者可以在真正登陆前进入系统。成功登陆后还有其他缓冲区溢出错误。端口:110服务:SUN公司的RPC服务所有端口说明:常见RPC服务有rpc.mountd、NFS、rpc.statd、rpc.csmd、rpc.ttybd、amd等端口:113服务:Authentication Service说明:这是一个许多计算机上运行的协议,用于鉴别TCP连接的用户。使用标准的这种服务可以获得许多计算机的信息。但是它可作为许多服务的记录器,尤其是FTP、POP、IMAP、SMTP和IRC等服务。通常如果有许多客户通过防火墙访问这些服务,将会看到许多这个端口的连接请求。记住,如果阻断这个端口客户端会感觉到在防火墙另一边与E-MAIL服务器的缓慢连接。许多防火墙支持TCP连接的阻断过程中发回RST。这将会停止缓慢的连接。端口:119服务:Network News Transfer Protocol说明:NEWS新闻组传输协议,承载USENET通信。这个端口的连接通常是人们在寻找USENET服务器。多数ISP限制,只有他们的客户才能访问他们的新闻组服务器。打开新闻组服务器将允许发/读任何人的帖子,访问被限制的新闻组服务器,匿名发帖或发送SPAM。端口:135服务:Location Service说明:Microsoft在这个端口运行DCE RPC end-point mapper为它的DCOM服务。这与UNIX 111端口的功能很相似。使用DCOM和RPC的服务利用计算机上的end-point mapper注册它们的位置。远端客户连接到计算机时,它们查找end-point mapper找到服务的位置。HACKER扫描计算机的这个端口是为了找到这个计算机上运行Exchange Server吗?什么版本?还有些DOS攻击直接针对这个端口。端口:137、138、139服务:NETBIOS Name Service说明:其中137、138是UDP端口,当通过网上邻居传输文件时用这个端口。而139端口:通过这个端口进入的连接试图获得NetBIOS/SMB服务。这个协议被用于windows文件和打印机共享和SAMBA。还有WINS Regisrtation也用它。端口:143服务:Interim Mail Access Protocol v2说明:和POP3的安全问题一样,许多IMAP服务器存在有缓冲区溢出漏洞。记住:一种LINUX蠕虫(admv0rm)会通过这个端口繁殖,因此许多这个端口的扫描来自不知情的已经被感染的用户。当REDHAT在他们的LINUX发布版本中默认允许IMAP后,这些漏洞变的很流行。这一端口还被用于IMAP2,但并不流行。端口:161服务:SNMP说明:SNMP允许远程管理设备。所有配置和运行信息的储存在数据库中,通过SNMP可获得这些信息。许多管理员的错误配置将被暴露在Internet。Cackers将试图使用默认的密码public、private访问系统。他们可能会试验所有可能的组合。SNMP包可能会被错误的指向用户的网络。端口:177服务:X Display Manager Control Protocol说明:许多入侵者通过它访问X-windows操作台,它同时需要打开6000端口。端口:389服务:LDAP、ILS说明:轻型目录访问协议和NetMeeting Internet Locator Server共用这一端口。端口:443服务:Https说明:网页浏览端口,能提供加密和通过安全端口传输的另一种HTTP。端口:456服务:[NULL]说明:木马HACKERS PARADISE开放此端口。端口:513服务:Login,remote login说明:是从使用cable modem或DSL登陆到子网中的UNIX计算机发出的广播。这些人为入侵者进入他们的系统提供了信息。端口:544服务:[NULL]说明:kerberos kshell端口:548服务:Macintosh,File Services(AFP/IP)说明:Macintosh,文件服务。端口:553服务:CORBA IIOP (UDP)说明:使用cable modem、DSL或VLAN将会看到这个端口的广播。CORBA是一种面向对象的RPC系统。入侵者可以利用这些信息进入系统。端口:555服务:DSF说明:木马PhAse1.0、Stealth Spy、IniKiller开放此端口。端口:568服务:Membership DPA说明:成员资格 DPA。端口:569服务:Membership MSN说明:成员资格 MSN。端口:635服务:mountd说明:Linux的mountd Bug。这是扫描的一个流行BUG。大多数对这个端口的扫描是基于UDP的,但是基于TCP的mountd有所增加(mountd同时运行于两个端口)。记住mountd可运行于任何端口(到底是哪个端口,需要在端口111做portmap查询),只是Linux默认端口是635,就像NFS通常运行于2049端口。端口:636服务:LDAP说明:SSL(Secure Sockets layer)端口:666服务:Doom Id Software说明:木马Attack FTP、Satanz Backdoor开放此端口端口:993服务:IMAP说明:SSL(Secure Sockets layer)端口:1001、1011服务:[NULL]说明:木马Silencer、WebEx开放1001端口。木马Doly Trojan开放1011端口。端口:1024服务:Reserved说明:它是动态端口的开始,许多程序并不在乎用哪个端口连接网络,它们请求系统为它们分配下一个闲置端口。基于这一点分配从端口1024开始。这就是说第一个向系统发出请求的会分配到1024端口。你可以重启机器,打开Telnet,再打开一个窗口运行natstat -a 将会看到Telnet被分配1024端口。还有SQL session也用此端口和5000端口。端口:1025、1033服务:1025:network blackjack 1033:[NULL]说明:木马netspy开放这2个端口。端口:1080服务:SOCKS说明:这一协议以通道方式穿过防火墙,允许防火墙后面的人通过一个IP地址访问INTERNET。理论上它应该只允许内部的通信向外到达INTERNET。但是由于错误的配置,它会允许位于防火墙外部的攻击穿过防火墙。WinGate常会发生这种错误,在加入IRC聊天室时常会看到这种情况。端口:1170服务:[NULL]说明:木马Streaming Audio Trojan、Psyber Stream Server、Voice开放此端口。端口:1234、1243、6711、6776服务:[NULL]说明:木马SubSeven2.0、Ultors Trojan开放1234、6776端口。木马SubSeven1.0/1.9开放1243、6711、6776端口。端口:1245服务:[NULL]说明:木马Vodoo开放此端口。端口:1433服务:SQL说明:Microsoft的SQL服务开放的端口。端口:1492服务:stone-design-1说明:木马FTP99CMP开放此端口。端口:1500服务:RPC client fixed port session queries说明:RPC客户固定端口会话查询端口:1503服务:NetMeeting T.120说明:NetMeeting T.120端口:1524服务:ingress说明:许多攻击脚本将安装一个后门SHELL于这个端口,尤其是针对SUN系统中Sendmail和RPC服务漏洞的脚本。如果刚安装了防火墙就看到在这个端口上的连接企图,很可能是上述原因。可以试试Telnet到用户的计算机上的这个端口,看看它是否会给你一个SHELL。连接到600/pcserver也存在这个问题。端口:1600服务:issd说明:木马Shivka-Burka开放此端口。端口:1720服务:NetMeeting说明:NetMeeting H.233 call Setup。端口:1731服务:NetMeeting Audio Call Control说明:NetMeeting音频调用控制。端口:1807服务:[NULL]说明:木马SpySender开放此端口。端口:1981服务:[NULL]说明:木马ShockRave开放此端口。端口:1999服务:cisco identification port说明:木马BackDoor开放此端口。端口:2000服务:[NULL]说明:木马GirlFriend 1.3、Millenium 1.0开放此端口。端口:2001服务:[NULL]说明:木马Millenium 1.0、Trojan Cow开放此端口。端口:2023服务:xinuexpansion 4说明:木马Pass Ripper开放此端口。端口:2049服务:NFS说明:NFS程序常运行于这个端口。通常需要访问Portmapper查询这个服务运行于哪个端口。端口:2115服务:[NULL]说明:木马Bugs开放此端口。端口:2140、3150服务:[NULL]说明:木马Deep Throat 1.0/3.0开放此端口。端口:2500服务:RPC client using a fixed port session replication 说明:应用固定端口会话复制的RPC客户
      在网络中传输数据就是靠这些端口号相对应的协议来完成。当我们运行不同服务,它就会开启相应服务协议的端口号。。例如:我们浏览网页时,当我们打开浏览器输入网址后,转到相应的页面,这时就靠http协议的80端口。。。网页安全是打开https的443端口。。
      21/tcp FTP文件传输协议22/tcpSSH安全登录、文件传送(SCP)和端口重定向23/tcpTelnet不安全的文本传送25/tcpSMTPSimpleMailTransferProtocol(E-mail)69/udpTFTPTrivialFileTransferProtocol79/tcpfingerFinger80/tcpHTTP超文本传送协议(WWW)88/tcpKerberosAuthenticatingagent110/tcpPOP3PostOfficeProtocol(E-mail)113/tcpidentoldidentificationserversystem119/tcpNNTPusedforusenetnewsgroups220/tcpIMAP3443/tcpHTTPSusedforsecurelytransferringweb pages
      我再补充几个: 20FTP的数据传输端口53DNS67DHCP111RPC123NTP143IMAP389LDAP445VNC636LDAPS3389 远程桌面
      网络中常用的端口号有哪些?

      udp是什么意思啊?

      udp是用户数据包协议。Internet协议集支持一个无连接的传输协议,该协议称为用户数据包协议(UDP,User Datagram Protocol)。UDP 为应用程序提供了一种无需建立连接就可以发送封装的 IP 数据包的方法。RFC 768描述了 UDP。Internet 的传输层有两个主要协议,互为补充。无连接的是 UDP,它除了给应用程序发送数据包功能并允许它们在所需的层次上架构自己的协议之外,几乎没有做什么特别的事情。面向连接的是 TCP,该协议几乎做了所有的事情。特点:UDP提供了无连接通信,且不对传送数据包进行可靠性保证,适合于一次传输少量数据,UDP传输的可靠性由应用层负责。常用的UDP端口号有:53(DNS)、69(TFTP)、161(SNMP),使用UDP协议包括:TFTP、SNMP、NFS、DNS、BOOTP。UDP报文没有可靠性保证、顺序保证和流量控制字段等,可靠性较差。但是正因为UDP协议的控制选项较少,在数据传输过程中延迟小、数据传输效率高,适合对可靠性要求不高的应用程序,或者可以保障可靠性的应用程序,如DNS、TFTP、SNMP等。
      udp是什么意思啊?

      各个端口都代表什么意思?

      按照端口号的大小分类,可分为如下几类 :(1)公认端口(WellKnownPorts):从0到1023,它们紧密绑定(binding)于一些服务。通常这些端口的通讯明确表明了某种服务的协议。例如:80端口实际上总是HTTP通讯。(2)注册端口(RegisteredPorts):从1024到49151。它们松散地绑定于一些服务。也就是说有许多服务绑定于这些端口,这些端口同样用于许多其它目的。例如:许多系统处理动态端口从1024左右开始。(3)动态和/或私有端口(Dynamicand/orPrivatePorts):从49152到65535。理论上,不应为服务分配这些端口。实际上,机器通常从1024起分配动态端口。但也有例外:SUN的RPC端口从32768开始。扩展资料各种服务常用端口号:1,HTTP协议代理服务器常用端口号:80/8080/3128/8081/90982,SOCKS代理协议服务器常用端口号:10803,FTP(文件传输)协议代理服务器常用端口号:214,Telnet(远程登录)协议代理服务器常用端口号:235,HTTP服务器,默认端口号为80/tcp(木马Executor开放此端口)6,HTTPS(securely transferring web pages)服务器,默认端口号为443/tcp 443/udp7,Telnet(不安全的文本传送),默认端口号为23/tcp(木马Tiny Telnet Server所开放的端口)8,FTP,默认的端口号为21/tcp(木马Doly Trojan、Fore、Invisible FTP、WebEx、WinCrash和Blade Runner所开放的端口)9,TFTP(Trivial File Transfer Protocol),默认端口号为69/udp10,SSH(安全登录)、SCP(文件传输)、端口号重定向,默认的端口号为22/tcp11,SMTP Simple Mail Transfer Protocol(E-mail),默认端口号为25/tcp(木马Antigen、Email Password Sender、Haebu Coceda、Shtrilitz Stealth、WinPC、WinSpy都开放这个端口)12,POP3 Post Office Protocol(E-mail),默认端口号为110/tcp13,Webshpere应用程序,默认端口号为908014,webshpere管理工具,默认端口号909015,JBOSS,默认端口号为808016,TOMCAT,默认端口号为808017,WIN2003远程登录,默认端口号为338918,Symantec AV/Filter for MSE,默认端口号为 808119,Oracle 数据库,默认的端口号为152120,ORACLE EMCTL,默认的端口号为115821,Oracle XDB(XML 数据库),默认的端口号为808022,Oracle XDB FTP服务,默认的端口号为210023,MS SQL*SERVER数据库server,默认的端口号为1433/tcp 1433/udp24,MS SQL*SERVER数据库monitor,默认的端口号为1434/tcp 1434/udp
      按照端口号的大小分类,可分为如下几类 :(1)公认端口(WellKnownPorts):从0到1023,它们紧密绑定(binding)于一些服务。通常这些端口的通讯明确表明了某种服务的协议。例如:80端口实际上总是HTTP通讯。(2)注册端口(RegisteredPorts):从1024到49151。它们松散地绑定于一些服务。也就是说有许多服务绑定于这些端口,这些端口同样用于许多其它目的。例如:许多系统处理动态端口从1024左右开始。(3)动态和/或私有端口(Dynamicand/orPrivatePorts):从49152到65535。理论上,不应为服务分配这些端口。实际上,机器通常从1024起分配动态端口。但也有例外:SUN的RPC端口从32768开始。各种服务常用端口号:1,HTTP协议代理服务器常用端口号:80/8080/3128/8081/90982,SOCKS代理协议服务器常用端口号:10803,FTP(文件传输)协议代理服务器常用端口号:214,Telnet(远程登录)协议代理服务器常用端口号:235,HTTP服务器,默认端口号为80/tcp(木马Executor开放此端口)6,HTTPS(securely transferring web pages)服务器,默认端口号为443/tcp 443/udp7,Telnet(不安全的文本传送),默认端口号为23/tcp(木马Tiny Telnet Server所开放的端口)8,FTP,默认的端口号为21/tcp(木马Doly Trojan、Fore、Invisible FTP、WebEx、WinCrash和Blade Runner所开放的端口)9,TFTP(Trivial File Transfer Protocol),默认端口号为69/udp10,SSH(安全登录)、SCP(文件传输)、端口号重定向,默认的端口号为22/tcp11,SMTP Simple Mail Transfer Protocol(E-mail),默认端口号为25/tcp(木马Antigen、Email Password Sender、Haebu Coceda、Shtrilitz Stealth、WinPC、WinSpy都开放这个端口)12,POP3 Post Office Protocol(E-mail),默认端口号为110/tcp13,Webshpere应用程序,默认端口号为908014,webshpere管理工具,默认端口号909015,JBOSS,默认端口号为808016,TOMCAT,默认端口号为808017,WIN2003远程登录,默认端口号为338918,Symantec AV/Filter for MSE,默认端口号为 808119,Oracle 数据库,默认的端口号为152120,ORACLE EMCTL,默认的端口号为115821,Oracle XDB(XML 数据库),默认的端口号为808022,Oracle XDB FTP服务,默认的端口号为210023,MS SQL*SERVER数据库server,默认的端口号为1433/tcp 1433/udp24,MS SQL*SERVER数据库monitor,默认的端口号为1434/tcp 1434/udp
      1 tcpmux TCP Port Service Multiplexer 传输控制协议端口服务多路开关选择器 2 compressnet Management Utility compressnet 管理实用程序3 compressnet Compression Process 压缩进程5 rje Remote Job Entry 远程作业登录7 echo Echo 回显9 discard Discard 丢弃11 systat Active Users 在线用户13 daytime Daytime时间17 qotd Quote of the Day每日引用18 msp Message Send Protocol消息发送协议19 chargen Character Generator 字符发生器20 ftp-data File Transfer[Default Data]文件传输协议(默认数据口)21 ftp File Transfer[Control]文件传输协议(控制)22 ssh SSH Remote Login Protocol SSH远程登录协议23 telnet Telnet 终端仿真协议24 any private mail system预留给个人用邮件系统25 smtp Simple Mail Transfer简单邮件发送协议27 nsw-fe NSW User System FENSW 用户系统现场工程师29 msg-icp MSG ICPMSG ICP31 msg-auth MSG Authentication MSG验证33 dsp Display Support Protocol 显示支持协议35 any private printer server 预留给个人打印机服务37 time Time 时间38 rap Route Access Protocol路由访问协议39 rlp Resource Location Protocol 资源定位协议41 graphics Graphics 图形42 nameserver WINS Host Name Server WINS 主机名服务43 nicname Who Is "绰号" who is服务44 mpm-flags MPM FLAGS Protocol MPM(消息处理模块)标志协议45 mpm Message Processing Module [recv]消息处理模块46 mpm-snd MPM [default send]消息处理模块(默认发送口)47 ni-ftp NI FTP NI FTP48 auditd Digital Audit Daemon 数码音频后台服务49 tacacs Login Host Protocol (TACACS)TACACS登录主机协议50 re-mail-ck Remote Mail Checking Protocol远程邮件检查协议[未结束]51 la-maint IMP Logical Address MaintenanceIMP(接口信息处理机)逻辑地址维护52 xns-time XNS Time Protocol施乐网络服务系统时间协议53 domain Domain Name Server域名服务器54 xns-ch XNS Clearinghouse 施乐网络服务系统票据交换 55 isi-gl ISI Graphics Language ISI图形语言56 xns-auth XNS Authentication 施乐网络服务系统验证57 ? any private terminal access 预留个人用终端访问58 xns-mail XNS Mail 施乐网络服务系统邮件59 any private file service预留个人文件服务60 Unassigned未定义61 ni-mail NI MAILNI邮件?62 acas ACA Services 异步通讯适配器服务63 whois+ whois+WHOIS+64 covia Communications Integrator (CI)通讯接口65 tacacs-ds TACACS-Database Service TACACS数据库服务66 sql*net Oracle SQL*NETOracle SQL*NET67 bootps Bootstrap Protocol Server 引导程序协议服务端68 bootpc Bootstrap Protocol Client 引导程序协议客户端69 tftp Trivial File Transfer小型文件传输协议70 gopher Gopher 信息检索协议71 netrjs-1 Remote Job Service 远程作业服务72 netrjs-2 Remote Job Service 远程作业服务73 netrjs-3 Remote Job Service 远程作业服务74 netrjs-4 Remote Job Service 远程作业服务75 any private dial out service 预留给个人拨出服务76 deos Distributed External Object Store 分布式外部对象存储77 any private RJE service 预留给个人远程作业输入服务78 vettcp vettcp 修正TCP?79 finger Finger 查询远程主机在线用户等信息80 http World Wide Web HTTP 全球信息网超文本传输协议 81 hosts2-ns HOSTS2 Name Server HOST2名称服务82 xfer XFER Utility 传输实用程序83 mit-ml-dev MIT ML Device 模块化智能终端ML设备84 ctf Common Trace Facility公用追踪设备85 mit-ml-dev MIT ML Device 模块化智能终端ML设备86 mfcobol Micro Focus CobolMicro Focus Cobol编程语言87 any private terminal link 预留给个人终端连接88 kerberos Kerberos Kerberros安全认证系统89 su-mit-tg SU/MIT Telnet Gateway SU/MIT终端仿真网关90 dnsix DNSIX Securit Attribute Token MapDNSIX 安全属性标记图91 mit-dov MIT Dover SpoolerMIT Dover假脱机92 npp Network Printing Protocol 网络打印协议93 dcp Device Control Protocol 设备控制协议94 objcall Tivoli Object Dispatcher Tivoli对象调度95 supdupSUPDUP96 dixie DIXIE Protocol Specification DIXIE协议规范97 swift-rvf(Swift Remote Virtural File Protocol)快速远程虚拟文件协议98 tacnews TAC NewsTAC新闻协议99 metagram metagram Relay100 newacct [unauthorized use]101=NIC Host Name Server102=ISO-TSAP103=Genesis Point-to-Point Trans Net104=ACR-NEMA Digital Imag. & Comm. 300105=Mailbox Name Nameserver106=3COM-TSMUX3com-tsmux107=Remote Telnet Service108=SNA Gateway Access Server109=Post Office Protocol - Version 2110=Post Office Protocol - Version 3111=SUN RPC112=McIDAS Data Transmission Protocol113=Authentication Service114=Audio News Multicast115=Simple File Transfer Protocol116=ANSA REX Notify117=UUCP Path Service118=SQL Servicessqlserv119=Network News Transfer Protocol120=CFDPTKTcfdptkt121=Encore Expedited Remote Pro.Call122=SMAKYNETsmakynet123=Network Time Protocol124=ANSA REX Trader125=Locus PC-Interface Net Map Ser126=Unisys Unitary Login127=Locus PC-Interface Conn Server128=GSS X License Verification129=Password Generator Protocol130=cisco FNATIVE131=cisco TNATIVE132=cisco SYSMAINT133=Statistics Service134=INGRES-NET Service135=Location Service136=PROFILE Naming System137=NETBIOS Name Service138=NETBIOS Datagram Service139=NETBIOS Session Service140=EMFIS Data Service141=EMFIS Control Service142=Britton-Lee IDM143=Interim Mail Access Protocol v2144=NewSnews145=UAAC Protocoluaac146=ISO-IP0iso-tp0147=ISO-IPiso-ip148=CRONUS-SUPPORT149=AED 512 Emulation Service150=SQL-NETsql-net151=HEMShems152=Background File Transfer Program153=SGMPsgmp154=NETSCnetsc-prod155=NETSCnetsc-dev156=SQL Service157=KNET/VM Command/Message Protocol158=PCMail Serverpcmail-srv159=NSS-Routingnss-routing160=SGMP-TRAPSsgmp-traps161=SNMP162=SNMP TRAP163=CMIP/TCP Manager164=CMIP/TCP Agent165=Xeroxxns-courier166=Sirius Systems167=NAMPnamp168=RSVDrsvd169=Send170=Network Postscript170=Network Postscript171=Network Innovations Multiplex172=Network Innovations CL/1173=Xyplexxyplex-mux174=MAILQ175=VMNET176=GENRAD-MUXgenrad-mux177=X Display Manager Control Protocol178=NextStep Window Server179=Border Gateway Protocol180=Intergraphris181=Unifyunify182=Unisys Audit SITP183=OCBinderocbinder184=OCServerocserver185=Remote-KIS186=KIS Protocolkis187=Application Communication Interface188=Plus Five401=Uninterruptible Power Supply402=Genie Protocol403=decapdecap404=ncednced405=ncldncld406=Interactive Mail Support Protocol407=Timbuktutimbuktu408=Prospero Resource Manager Sys. Man.409=Prospero Resource Manager Node Man.410=DECLadebug Remote Debug Protocol411=Remote MT Protocol412=Trap Convention Port413=SMSPsmsp414=InfoSeekinfoseek415=BNetbnet416=Silverplattersilverplatter417=Onmuxonmux418=Hyper-Ghyper-g419=Arielariel1420=SMPTEsmpte421=Arielariel2422=Arielariel3423=IBM Operations Planning and Control Start424=IBM Operations Planning and Control Track425=ICADicad-el426=smartsdpsmartsdp427=Server Location429=OCS_AMU430=UTMPSDutmpsd431=UTMPCDutmpcd432=IASDiasd433=NNSPnnsp434=MobileIP-Agent435=MobilIP-MN436=DNA-CMLdna-cml437=comscmcomscm439=dasp, Thomas Obermair440=sgcpsgcp441=decvms-sysmgtdecvms-sysmgt442=cvc_hostdcvc_hostd443=https444=Simple Network Paging Protocol445=Microsoft-DS446=DDM-RDBddm-rdb447=DDM-RFMddm-dfm448=DDM-BYTEddm-byte449=AS Server Mapper450=TServertserver512=exec, Remote process execution513=login, remote login514=cmd, exec with auto auth.514=syslog515=Printer spooler516=Unassigned517=talk519=unixtime520=extended file name server521=Unassigned522=Unassigned523=Unassigned524=Unassigned526=newdate530=rpc courier531=chatconference532=readnewsnetnews533=for emergency broadcasts539=Apertus Technologies Load Determination540=uucp541=uucp-rlogin542=Unassigned543=klogin544=kshell545=Unassigned546=Unassigned547=Unassigned548=Unassigned549=Unassigned550=new-who551=Unassigned552=Unassigned553=Unassigned554=Unassigned555=dsf556=remotefs557-559=rmonitor560=rmonitord561=dmonitor562=chcmd563=Unassigned564=plan 9 file service565=whoami566-569 Unassigned570=demonmeter571=udemonmeter572-599 Unassigned ipc server600=Sun IPC server607=nqs606=Cray Unified Resource Manager608=Sender-Initiated/Unsolicited File Transfer609=npmp-trapnpmp-trap610=npmp-localnpmp-local611=npmp-guinpmp-gui634=ginadginad666=Doom Id Software704=errlog copy/server daemon709=EntrustManager729=IBM NetView DM/6000 Server/Client730=IBM NetView DM/6000 send/tcp731=IBM NetView DM/6000 receive/tcp741=netGWnetgw742=Network based Rev. Cont. Sys.744=Flexible License Manager747=Fujitsu Device Control748=Russell Info Sci Calendar Manager749=kerberos administration751=pump752=qrh754=send758=nlogin759=con760=ns762=quotad763=cycleserv765=webster767=phonephonebook769=vid771=rtip772=cycleserv2774=acmaint_dbd775=acmaint_transd780=wpgs786=Concertconcert800=mdbs_daemon996=Central Point Software997=maitrd999=puprouter1023=Reserved 注册端口(Registered Ports):从1024到49151。它们松散地绑定于一些服务。也就是说有许多服务绑定于这些端口,这些端口同样用于许多其它目的。例如:许多系统处理动态端口从1024左右开始。1025=network blackjack1030=BBN IAD1031=BBN IAD1032=BBN IAD1067=Installation Bootstrap Proto. Serv.1068=Installation Bootstrap Proto. Cli.1080=SOCKS1083=Anasoft License Manager1084=Anasoft License Manager1155=Network File Access1222=SNI R&D network1248=hermes1346=Alta Analytics License Manager1347=multi media conferencing1347=multi media conferencing1348=multi media conferencing1349=Registration Network Protocol1350=Registration Network Protocol1351=Digital Tool Works (MIT)1352=/Lotus Notelotusnote1353=Relief Consulting1354=RightBrain Software1355=Intuitive Edge1356=CuillaMartin Company1357=Electronic PegBoard1358=CONNLCLIconnlcli1359=FTSRVftsrv1360=MIMERmimer1361=LinX1362=TimeFliestimeflies1363=Network DataMover Requester1364=Network DataMover Server1365=Network Software Associates1366=Novell NetWare Comm Service Platform1367=DCSdcs1368=ScreenCastscreencast1369=GlobalView to Unix Shell1370=Unix Shell to GlobalView1371=Fujitsu Config Protocol1372=Fujitsu Config Protocol1373=Chromagrafxchromagrafx1374=EPI Software Systems1375=Bytexbytex1376=IBM Person to Person Software1377=Cichlid License Manager1378=Elan License Manager1379=Integrity Solutions1380=Telesis Network License Manager1381=Apple Network License Manager1382=udt_os1383=GW Hannaway Network License Manager1384=Objective Solutions License Manager1385=Atex Publishing License Manager1386=CheckSum License Manager1387=Computer Aided Design Software Inc LM1388=Objective Solutions DataBase Cache1389=Document Manager1390=Storage Controller1391=Storage Access Server1392=Print Managericlpv-pm1393=Network Log Server1394=Network Log Client1395=PC Workstation Manager software1396=DVL Active Mail1397=Audio Active Mail1398=Video Active Mail1399=Cadkey License Manager1400=Cadkey Tablet Daemon1401=Goldleaf License Manager1402=Prospero Resource Manager1403=Prospero Resource Manager1404=Infinite Graphics License Manager1405=IBM Remote Execution Starter1406=NetLabs License Manager1407=DBSA License Manager1408=Sophia License Manager1409=Here License Manager1410=HiQ License Manager1411=AudioFileaf1412=InnoSysinnosys1413=Innosys-ACLinnosys-acl1414=IBM MQSeriesibm-mqseries1415=DBStardbstar1416=Novell LU6.2novell-lu6.21417=Timbuktu Service 1 Port1417=Timbuktu Service 1 Port1418=Timbuktu Service 2 Port1419=Timbuktu Service 3 Port1420=Timbuktu Service 4 Port1421=Gandalf License Manager1422=Autodesk License Manager1423=Essbase Arbor Software1424=Hybrid Encryption Protocol1425=Zion Software License Manager1426=Satellite-data Acquisition System 11427=mloadd monitoring tool1428=Informatik License Manager1429=Hypercom NMSnms1430=Hypercom TPDUtpdu1431=Reverse Gosip Transport1432=Blueberry Software License Manager1433=Microsoft-SQL-Server1434=Microsoft-SQL-Monitor1435=IBM CISCibm-cics1436=Satellite-data Acquisition System 21437=Tabulatabula1438=Eicon Security Agent/Server1439=Eicon X25/SNA Gateway1440=Eicon Service Location Protocol1441=Cadis License Management1442=Cadis License Management1443=Integrated Engineering Software1444=Marcam License Management1445=Proxima License Manager1446=Optical Research Associates License Manager1447=Applied Parallel Research LM1448=OpenConnect License Manager1449=PEportpeport1450=Tandem Distributed Workbench Facility1451=IBM Information Management1452=GTE Government Systems License Man1453=Genie License Manager1454=interHDL License Manager1454=interHDL License Manager1455=ESL License Manager1456=DCAdca1457=Valisys License Manager1458=Nichols Research Corp.1459=Proshare Notebook Application1460=Proshare Notebook Application1461=IBM Wireless LAN1462=World License Manager1463=Nucleusnucleus1464=MSL License Manager1465=Pipes Platform1466=Ocean Software License Manager1467=CSDMBASEcsdmbase1468=CSDMcsdm1469=Active Analysis Limited License Manager1470=Universal Analytics1471=csdmbasecsdmbase1472=csdmcsdm1473=OpenMathopenmath1474=Telefindertelefinder1475=Taligent License Manager1476=clvm-cfgclvm-cfg1477=ms-sna-server1478=ms-sna-base1479=dberegisterdberegister1480=PacerForumpacerforum1481=AIRSairs1482=Miteksys License Manager1483=AFS License Manager1484=Confluent License Manager1485=LANSourcelansource1486=nms_topo_serv1487=LocalInfoSrvr1488=DocStordocstor1489=dmdocbrokerdmdocbroker1490=insitu-confinsitu-conf1491=anynetgateway1492=stone-design-11493=netmap_lmnetmap_lm1494=icaica1495=cvccvc1496=liberty-lmliberty-lm1497=rfx-lmrfx-lm1498=Watcom-SQLwatcom-sql1499=Federico Heinz Consultora1500=VLSI License Manager1501=Satellite-data Acquisition System 31502=Shivashivadiscovery1503=Databeamimtc-mcs1504=EVB Software Engineering License Manager1505=Funk Software, Inc.1524=ingres1525=oracle1525=Prospero Directory Service non-priv1526=Prospero Data Access Prot non-priv1527=oracletlisrv1529=oraclecoauthor1600=issd1651=proshare conf audio1652=proshare conf video1653=proshare conf data1654=proshare conf request1655=proshare conf notify1661=netview-aix-1netview-aix-11662=netview-aix-2netview-aix-21663=netview-aix-3netview-aix-31664=netview-aix-4netview-aix-41665=netview-aix-5netview-aix-51666=netview-aix-6netview-aix-61986=cisco license management1987=cisco RSRB Priority 1 port1988=cisco RSRB Priority 2 port1989=cisco RSRB Priority 3 port1989=MHSnet systemmshnet1990=cisco STUN Priority 1 port1991=cisco STUN Priority 2 port1992=cisco STUN Priority 3 port1992=IPsendmsgipsendmsg1993=cisco SNMP TCP port1994=cisco serial tunnel port1995=cisco perf port1996=cisco Remote SRB port1997=cisco Gateway Discovery Protocol1998=cisco X.25 service (XOT)1999=cisco identification port2009=whosockami2010=pipe_server2011=raid2012=raid-ac2013=rad-am2015=raid-cs2016=bootserver2017=terminaldb2018=rellpack2019=about2019=xinupageserver2020=xinupageserver2021=xinuexpansion12021=down2022=xinuexpansion22023=xinuexpansion32023=xinuexpansion42024=xinuexpansion42025=xribs2026=scrabble2027=shadowserver2028=submitserver2039=device22032=blackboard2033=glogger2034=scoremgr2035=imsldoc2038=objectmanager2040=lam2041=interbase2042=isis2043=isis-bcast2044=primsl2045=cdfunc2047=dls2048=dls-monitor2065=Data Link Switch Read Port Number2067=Data Link Switch Write Port Number2201=Advanced Training System Program2500=Resource Tracking system server2501=Resource Tracking system client2564=HP 3000 NS/VT block mode telnet2784=world wide web - development3049=ccmail3264=ccmail, cc:mail/lotus3333=dec-notes3984=MAPPER network node manager3985=MAPPER TCP/IP server3986=MAPPER workstation server3421=Bull Apprise portmapper3900=Unidata UDT OS4132=NUTS Daemonnuts_dem4133=NUTS Bootp Server4343=UNICALL4444=KRB5244672=remote file access server5002=radio free ethernet5010=TelepathStarttelelpathstart5011=TelepathAttack5050=multimedia conference control tool5145=rmonitor_secure5190=aol, America-Online5300=HA cluster heartbeat5301=hacl-gs # HA cluster general services5302=HA cluster configuration5303=hacl-probe HA cluster probing5305=hacl-test6000-6063=x11 X Window System6111=sub-process HP SoftBench Sub-Process Control6141/=meta-corp meta Corporation License Manager6142=aspentec-lm Aspen Technology License Manager6143=watershed-lm Watershed License Manager6144=statsci1-lm StatSci License Manager - 16145=statsci2-lm StatSci License Manager - 26146=lonewolf-lm Lone Wolf Systems License Manager6147=montage-lm Montage License Manager7000=afs3-fileserver file server itself7001=afs3-callback callbacks to cache managers7002=afs3-prserver users & groups database7003=afs3-vlserver volume location database7004=afs3-kaserver AFS/Kerberos authentication service7005=afs3-volser volume managment server7006=afs3-errors error interpretation service7007=afs3-bos basic overseer process7008=afs3-update server-to-server updater7009=afs3-rmtsys remote cache manager service7010=ups-online onlinet uninterruptable power supplies7100=X Font Service7200=FODMS FLIP7626=冰河8010=Wingate8181=IMail9535=man(3)动态和/或私有端口(Dynamic and/or Private Ports):从49152到65535。理论上,不应为服务分配这些端口。实际上,机器通常从1024起分配动态端口。但也有例外:SUN的RPC端口从32768开始。 0 通常用于分析操作系统。这一方法能够工作是因为在一些系统中“0”是无效端口,当你试图使用一种通常的闭合端口连接它时将产生不同的结果。一种典型的扫描:使用IP地址为0.0.0.0,设置ACK位并在以太网层广播。
      //注意:由于一些应用软件占用了部分端口,因此此文件中的部分端口被注释掉了(注释的字符为://)。 TCP1=TCP Port Service MultiplexerTCP2=DeathTCP5=Remote Job Entry,yoyoTCP7=EchoTCP11=SkunTCP12=BomberTCP16=SkunTCP17=SkunTCP18=消息传输协议,skunTCP19=SkunTCP20=FTP Data,AmandaTCP21=文件传输,Back Construction,Blade Runner,Doly Trojan,Fore,FTP trojan,Invisible FTP,Larva, WebEx,WinCrashTCP22=远程登录协议TCP23=远程登录(Telnet),Tiny Telnet Server (= TTS)TCP25=电子邮件(SMTP),Ajan,Antigen,Email Password Sender,Happy 99,Kuang2,ProMail trojan,Shtrilitz,Stealth,Tapiras,Terminator,WinPC,WinSpy,Haebu CocedaTCP27=AssasinTCP28=AmandaTCP29=MSG ICPTCP30=Agent 40421TCP31=Agent 31,Hackers Paradise,Masters Paradise,Agent 40421TCP37=Time,ADM wormTCP39=SubSARITCP41=DeepThroat,ForeplayTCP42=Host Name ServerTCP43=WHOISTCP44=ArcticTCP48=DRATTCP49=主机登录协议TCP50=DRATTCP51=IMP Logical Address Maintenance,Fuck Lamers BackdoorTCP52=MuSka52,SkunTCP53=DNS,Bonk (DOS Exploit)TCP54=MuSka52TCP58=DMSetupTCP59=DMSetupTCP63=whois++TCP64=Communications IntegratorTCP65=TACACS-Database ServiceTCP66=Oracle SQL*NET,AL-BarekiTCP67=Bootstrap Protocol ServerTCP68=Bootstrap Protocol ClientTCP69=W32.Evala.Worm,BackGate Kit,Nimda,Pasana,Storm,Storm worm,Theef,Worm.Cycle.aTCP70=Gopher服务,ADM wormTCP79=用户查询(Finger),Firehotcker,ADM wormTCP80=超文本服务器(Http),Executor,RingZeroTCP81=Chubo,Worm.Bbeagle.qTCP88=Kerberos krb5服务TCP99=Hidden PortTCP 102=消息传输代理TCP 108=SNA网关访问服务器TCP 109=Pop2TCP 110=电子邮件(Pop3),ProMailTCP 113=Kazimas, Auther IdnetTCP 115=简单文件传输协议TCP 118=SQL Services, Infector 1.4.2TCP 119=新闻组传输协议(Newsgroup(Nntp)), Happy 99TCP 121=JammerKiller, Bo jammerkillahTCP 123=网络时间协议(NTP),Net ControllerTCP 129=Password Generator ProtocolTCP 133=Infector 1.xTCP 135=微软DCE RPC end-point mapper服务TCP 137=微软Netbios Name服务(网上邻居传输文件使用)TCP 138=微软Netbios Name服务(网上邻居传输文件使用)TCP 139=微软Netbios Name服务(用于文件及打印机共享)TCP 142=NetTaxiTCP 143=IMAPTCP 146=FC Infector,InfectorTCP 150=NetBIOS Session ServiceTCP 156=SQL服务器TCP 161=SnmpTCP 162=Snmp-TrapTCP 170=A-TrojanTCP 177=X Display管理控制协议TCP 179=Border网关协议(BGP)TCP 190=网关访问控制协议(GACP)TCP 194=IrcTCP 197=目录定位服务(DLS)TCP 256=NirvanaTCP 315=The InvasorTCP 371=ClearCase版本管理软件TCP 389=Lightweight Directory Access Protocol (LDAP)TCP 396=Novell Netware over IPTCP 420=BreachTCP 421=TCP WrappersTCP 443=安全服务TCP 444=Simple Network Paging Protocol(SNPP)TCP 445=Microsoft-DSTCP 455=Fatal ConnectionsTCP 456=Hackers paradise,FuseSparkTCP 458=苹果公司QuickTimeTCP 513=GrloginTCP 514=RPC BackdoorTCP 531=Rasmin,Net666TCP 544=kerberos kshellTCP 546=DHCP ClientTCP 547=DHCP ServerTCP 548=Macintosh文件服务TCP 555=Ini-Killer,Phase Zero,Stealth SpyTCP 569=MSNTCP 605=SecretServiceTCP 606=Noknok8TCP 661=Noknok8TCP 666=Attack FTP,Satanz Backdoor,Back Construction,Dark Connection Inside 1.2TCP 667=Noknok7.2TCP 668=Noknok6TCP 669=DP trojanTCP 692=GayOLTCP 707=WelchiaTCP 777=AIM SpyTCP 808=RemoteControl,WinHoleTCP 815=Everyone DarlingTCP 901=Backdoor.DevilTCP 911=Dark ShadowTCP 993=IMAPTCP 999=DeepThroatTCP1000=Der SpaeherTCP1001=Silencer,WebEx,Der SpaeherTCP1003=BackDoorTCP1010=DolyTCP1011=DolyTCP1012=DolyTCP1015=DolyTCP1016=DolyTCP1020=VampireTCP1023=Worm.Sasser.eTCP1024=NetSpy.698(YAI)TCP1059=nimreg//TCP1025=NetSpy.698,Unused Windows Services Block//TCP1026=Unused Windows Services Block//TCP1027=Unused Windows Services Block//TCP1028=Unused Windows Services Block//TCP1029=Unused Windows Services Block//TCP1030=Unused Windows Services Block//TCP1033=Netspy//TCP1035=Multidropper//TCP1042=Bla//TCP1045=Rasmin//TCP1047=GateCrasher//TCP1050=MiniCommandTCP1069=Backdoor.TheefServer.202TCP1070=Voice,Psyber Stream Server,Streaming Audio TrojanTCP1080=Wingate,Worm.BugBear.B,Worm.Novarg.B//TCP1090=Xtreme, VDOLive//TCP1095=Rat//TCP1097=Rat//TCP1098=Rat//TCP1099=RatTCP1110=nfsd-keepaliveTCP1111=Backdoor.AIMVisionTCP1155=Network File Access//TCP1170=Psyber Stream Server,Streaming Audio trojan,Voice//TCP1200=NoBackO//TCP1201=NoBackO//TCP1207=Softwar//TCP1212=Nirvana,Visul Killer//TCP1234=Ultors//TCP1243=BackDoor-G, SubSeven, SubSeven Apocalypse//TCP1245=VooDoo Doll//TCP1269=Mavericks Matrix//TCP1313=Nirvana//TCP1349=BioNetTCP1433=Microsoft SQL服务//TCP1441=Remote Storm//TCP1492=FTP99CMP(BackOriffice.FTP)TCP1503=NetMeeting T.120//TCP1509=Psyber Streaming Server//TCP1600=Shivka-Burka//TCP1703=Exloiter 1.1TCP1720=NetMeeting H.233 call SetupTCP1731=NetMeeting音频调用控制//TCP1807=SpySender//TCP1966=Fake FTP 2000//TCP1976=Custom port//TCP1981=ShockraveTCP1990=stun-p1 cisco STUN Priority 1 portTCP1990=stun-p1 cisco STUN Priority 1 portTCP1991=stun-p2 cisco STUN Priority 2 portTCP1992=stun-p3 cisco STUN Priority 3 port,ipsendmsg IPsendmsgTCP1993=snmp-tcp-port cisco SNMP TCP portTCP1994=stun-port cisco serial tunnel portTCP1995=perf-port cisco perf portTCP1996=tr-rsrb-port cisco Remote SRB portTCP1997=gdp-port cisco Gateway Discovery ProtocolTCP1998=x25-svc-port cisco X.25 service (XOT)//TCP1999=BackDoor, TransScout//TCP2000=Der Spaeher,INsane Network//TCP2001=Transmisson scout//TCP2002=Transmisson scout//TCP2003=Transmisson scout//TCP2004=Transmisson scout//TCP2005=TTransmisson scoutTCP2011=cypressTCP2015=raid-cs//TCP2023=Ripper,Pass Ripper,Hack City Ripper ProTCP2049=NFS//TCP2115=Bugs//TCP2121=Nirvana//TCP2140=Deep Throat, The Invasor//TCP2155=Nirvana//TCP2208=RuX//TCP2255=Illusion Mailer//TCP2283=HVL Rat5//TCP2300=PC Explorer//TCP2311=Studio54TCP2556=Worm.Bbeagle.q//TCP2565=Striker//TCP2583=WinCrash//TCP2600=Digital RootBeer//TCP2716=Prayer TrojanTCP2745=Worm.BBeagle.k//TCP2773=Backdoor,SubSeven//TCP2774=SubSeven2.1&2.2//TCP2801=Phineas Phucker//TCP2989=Rat//TCP3024=WinCrash trojanTCP3127=Worm.NovargTCP3128=RingZero,Worm.Novarg.B//TCP3129=Masters Paradise//TCP3150=Deep Throat, The InvasorTCP3198=Worm.Novarg//TCP3210=SchoolBusTCP3332=Worm.Cycle.aTCP3333=ProsiakTCP3389=超级终端//TCP3456=Terror//TCP3459=Eclipse 2000//TCP3700=Portal of Doom//TCP3791=Eclypse//TCP3801=EclypseTCP3996=Portal of DoomTCP4000=腾讯QQ客户端TCP4060=Portal of DoomTCP4092=WinCrashTCP4242=VHMTCP4267=SubSeven2.1&2.2TCP4321=BoBoTCP4444=Prosiak,Swift remoteTCP4500=W32.HLLW.TufasTCP4567=File NailTCP4590=ICQTrojanTCP4899=Remote Administrator服务器TCP4950=ICQTrojanTCP5000=WindowsXP服务器,Blazer 5,Bubbel,Back Door Setup,Sockets de TroieTCP5001=Back Door Setup, Sockets de TroieTCP5002=cd00r,ShaftTCP5011=One of the Last Trojans (OOTLT)TCP5025=WM Remote KeyLoggerTCP5031=Firehotcker,Metropolitan,NetMetroTCP5032=MetropolitanTCP5190=ICQ QueryTCP5321=FirehotckerTCP5333=Backage Trojan Box 3TCP5343=WCratTCP5400=Blade Runner, BackConstruction1.2TCP5401=Blade Runner,Back ConstructionTCP5402=Blade Runner,Back ConstructionTCP5471=WinCrashTCP5512=Illusion MailerTCP5521=Illusion MailerTCP5550=Xtcp,INsane NetworkTCP5554=Worm.SasserTCP5555=ServeMeTCP5556=BO FacilTCP5557=BO FacilTCP5569=Robo-HackTCP5598=BackDoor 2.03TCP5631=PCAnyWhere dataTCP5632=PCAnyWhereTCP5637=PC CrasherTCP5638=PC CrasherTCP5698=BackDoorTCP5714=Wincrash3TCP5741=WinCrash3TCP5742=WinCrashTCP5760=Portmap Remote Root Linux ExploitTCP5880=Y3K RATTCP5881=Y3K RATTCP5882=Y3K RATTCP5888=Y3K RATTCP5889=Y3K RATTCP5900=WinVnc,Wise VGA广播端口TCP6000=Backdoor.ABTCP6006=Noknok8TCP6129=Dameware Nt Utilities服务器TCP6272=SecretServiceTCP6267=广外女生TCP6400=Backdoor.AB,The ThingTCP6500=Devil 1.03TCP6661=TemanTCP6666=TCPshell.cTCP6667=NT Remote Control,Wise 播放器接收端口TCP6668=Wise Video广播端口TCP6669=VampyreTCP6670=DeepThroatTCP6671=Deep Throat 3.0TCP6711=SubSevenTCP6712=SubSeven1.xTCP6713=SubSevenTCP6723=MstreamTCP6767=NT Remote ControlTCP6771=DeepThroatTCP6776=BackDoor-G,SubSeven,2000 CracksTCP6777=Worm.BBeagleTCP6789=Doly TrojanTCP6838=MstreamTCP6883=DeltaSourceTCP6912=Shit HeepTCP6939=IndoctrinationTCP6969=GateCrasher, Priority, IRC 3TCP6970=RealAudio,GateCrasherTCP7000=Remote Grab,NetMonitor,SubSeven1.xTCP7001=Freak88TCP7201=NetMonitorTCP7215=BackDoor-G, SubSevenTCP7001=Freak88,Freak2kTCP7300=NetMonitorTCP7301=NetMonitorTCP7306=NetMonitor,NetSpy 1.0TCP7307=NetMonitor, ProcSpyTCP7308=NetMonitor, X SpyTCP7323=Sygate服务器端TCP7424=Host ControlTCP7597=QazTCP7609=Snid X2TCP7626=冰河TCP7777=The ThingTCP7789=Back Door Setup, ICQKillerTCP7983=MstreamTCP8000=腾讯OICQ服务器端,XDMATCP8010=Wingate,LogfileTCP8080=WWW 代理,Ring Zero,Chubo,Worm.Novarg.BTCP8520=W32.Socay.WormTCP8787=BackOfrice 2000TCP8897=Hack Office,ArmageddonTCP8989=ReconTCP9000=NetministratorTCP9325=MstreamTCP9400=InCommand 1.0TCP9401=InCommand 1.0TCP9402=InCommand 1.0TCP9872=Portal of DoomTCP9873=Portal of DoomTCP9874=Portal of DoomTCP9875=Portal of DoomTCP9876=Cyber AttackerTCP9878=TransScoutTCP9989=Ini-KillerTCP9898=Worm.Win32.Dabber.aTCP9999=Prayer TrojanTCP 10067=Portal of DoomTCP 10080=Worm.Novarg.BTCP 10084=SyphillisTCP 10085=SyphillisTCP 10086=SyphillisTCP 10101=BrainSpyTCP 10167=Portal Of DoomTCP 10168=Worm.Supnot.78858.c,Worm.LovGate.TTCP 10520=Acid ShiversTCP 10607=Coma trojanTCP 10666=AmbushTCP 11000=Senna SpyTCP 11050=Host ControlTCP 11051=Host ControlTCP 11223=Progenic,Hack '99KeyLoggerTCP 11831=TROJ_LATINUS.SVRTCP 12076=Gjamer, MSH.104bTCP 12223=Hack'99 KeyLoggerTCP 12345=GabanBus, NetBus 1.6/1.7, Pie Bill Gates, X-billTCP 12346=GabanBus, NetBus 1.6/1.7, X-billTCP 12349=BioNetTCP 12361=Whack-a-moleTCP 12362=Whack-a-moleTCP 12363=Whack-a-moleTCP 12378=W32/Gibe@MMTCP 12456=NetBusTCP 12623=DUN ControlTCP 12624=ButtmanTCP 12631=WhackJob, WhackJob.NB1.7TCP 12701=Eclipse2000TCP 12754=MstreamTCP 13000=Senna SpyTCP 13010=Hacker BrazilTCP 13013=PsychwardTCP 13223=Tribal Voice的聊天程序PowWowTCP 13700=Kuang2 The VirusTCP 14456=SoleroTCP 14500=PC InvaderTCP 14501=PC InvaderTCP 14502=PC InvaderTCP 14503=PC InvaderTCP 15000=NetDaemon 1.0TCP 15092=Host ControlTCP 15104=MstreamTCP 16484=MosuckerTCP 16660=Stacheldraht (DDoS)TCP 16772=ICQ RevengeTCP 16959=PriorityTCP 16969=PriorityTCP 17027=提供广告服务的Conducent"adbot"共享软件TCP 17166=MosaicTCP 17300=Kuang2 The VirusTCP 17490=CrazyNetTCP 17500=CrazyNetTCP 17569=Infector 1.4.x + 1.6.xTCP 17777=NephronTCP 18753=Shaft (DDoS)TCP 19191=蓝色火焰TCP 19864=ICQ RevengeTCP 20000=Millennium II (GrilFriend)TCP 20001=Millennium II (GrilFriend)TCP 20002=AcidkoRTCP 20034=NetBus 2 ProTCP 20168=LovgateTCP 20203=Logged,ChupacabraTCP 20331=BlaTCP 20432=Shaft (DDoS)TCP 20808=Worm.LovGate.v.QQTCP 21544=Schwindler 1.82,GirlFriendTCP 21554=Schwindler 1.82,GirlFriend,Exloiter 1.0.1.2TCP 22222=Prosiak,RuX Uploader 2.0TCP 22784=Backdoor.IntruzzoTCP 23432=Asylum 0.1.3TCP 23456=Evil FTP, Ugly FTP, WhackJobTCP 23476=Donald DickTCP 23477=Donald DickTCP 23777=INet SpyTCP 26274=DeltaTCP 26681=Spy VoiceTCP 27374=Sub Seven 2.0+, Backdoor.BasteTCP 27444=Tribal Flood Network,TrinooTCP 27665=Tribal Flood Network,TrinooTCP 29431=Hack AttackTCP 29432=Hack AttackTCP 29104=Host ControlTCP 29559=TROJ_LATINUS.SVRTCP 29891=The UnexplainedTCP 30001=Terr0r32TCP 30003=Death,Lamers DeathTCP 30029=AOL trojanTCP 30100=NetSphere 1.27a,NetSphere 1.31TCP 30101=NetSphere 1.31,NetSphere 1.27aTCP 30102=NetSphere 1.27a,NetSphere 1.31TCP 30103=NetSphere 1.31TCP 30303=Sockets de TroieTCP 30947=IntruseTCP 30999=Kuang2TCP 21335=Tribal Flood Network,TrinooTCP 31336=Bo WhackTCP 31337=Baron Night,BO client,BO2,Bo Facil,BackFire,Back Orifice,DeepBO,Freak2k,NetSpyTCP 31338=NetSpy,Back Orifice,DeepBOTCP 31339=NetSpy DKTCP 31554=SchwindlerTCP 31666=BOWhackTCP 31778=Hack AttackTCP 31785=Hack AttackTCP 31787=Hack AttackTCP 31789=Hack AttackTCP 31791=Hack AttackTCP 31792=Hack AttackTCP 32100=PeanutBrittleTCP 32418=Acid BatteryTCP 33333=Prosiak,Blakharaz 1.0TCP 33577=Son Of PsychwardTCP 33777=Son Of PsychwardTCP 33911=Spirit 2001aTCP 34324=BigGluck,TN,Tiny Telnet ServerTCP 34555=Trin00 (Windows) (DDoS)TCP 35555=Trin00 (Windows) (DDoS)TCP 36794=Worm.Bugbear-ATCP 37651=YATTCP 40412=The SpyTCP 40421=Agent 40421,Masters Paradise.96TCP 40422=Masters ParadiseTCP 40423=Masters Paradise.97TCP 40425=Masters ParadiseTCP 40426=Masters Paradise 3.xTCP 41666=Remote BootTCP 43210=Schoolbus 1.6/2.0TCP 44444=Delta SourceTCP 44445=HappypigTCP 47252=ProsiakTCP 47262=DeltaTCP 47878=BirdSpy2TCP 49301=Online KeyloggerTCP 50505=Sockets de TroieTCP 50766=Fore, SchwindlerTCP 51966=CafeIniTCP 53001=Remote Windows ShutdownTCP 53217=Acid Battery 2000TCP 54283=Back Door-G, Sub7TCP 54320=Back Orifice 2000,SheepTCP 54321=School Bus .69-1.11,Sheep, BO2KTCP 57341=NetRaiderTCP 58008=BackDoor.TronTCP 58009=BackDoor.TronTCP 58339=ButtFunnelTCP 59211=BackDoor.DuckToyTCP 60000=Deep ThroatTCP 60068=Xzip 6000068TCP 60411=ConnectionTCP 60606=TROJ_BCKDOR.G2.ATCP 61466=TelecommandoTCP 61603=Bunker-killTCP 63485=Bunker-killTCP 65000=Devil, DDoSTCP 65432=Th3tr41t0r, The TraitorTCP 65530=TROJ_WINMITE.10TCP 65535=RC,Adore Worm/LinuxTCP 69123=ShitHeepTCP 88798=Armageddon,Hack OfficeUDP 1=Sockets des TroieUDP 9=ChargenUDP19=ChargenUDP69=PasanaUDP80=PenroxUDP 371=ClearCase版本管理软件UDP 445=公共Internet文件系统(CIFS)UDP 500=Internet密钥交换UDP1025=Maverick's Matrix 1.2 - 2.0UDP1026=Remote Explorer 2000UDP1027=UC聊天软件,Trojan.Huigezi.eUDP1028=KiLo,SubSARIUDP1029=SubSARIUDP1031=XotUDP1032=Akosch4UDP1104=RexxRaveUDP1111=DaodanUDP1116=LurkerUDP1122=Last 2000,SingularityUDP1183=Cyn,SweetHeartUDP1200=NoBackOUDP1201=NoBackOUDP1342=BLA trojanUDP1344=PtakksUDP1349=BO dllUDP1561=MuSka52UDP1772=NetControleUDP1978=SlapperUDP1985=Black DiverUDP2000=A-trojan,Fear,Force,GOTHIC Intruder,Last 2000,Real 2000UDP2001=ScalperUDP2002=SlapperUDP2015=raid-csUDP2018=rellpackUDP2130=Mini BackLashUDP2140=Deep Throat,Foreplay,The InvasorUDP2222=SweetHeart, WayUDP2339=Voice SpyUDP2702=Black DiverUDP2989=RATUDP3150=Deep ThroatUDP3215=XHXUDP3333=DaodanUDP3801=EclypseUDP3996=Remote AnythingUDP4128=RedShadUDP4156=SlapperUDP4500=sae-urnUDP5419=DarkSkyUDP5503=Remote Shell TrojanUDP5555=DaodanUDP5882=Y3K RATUDP5888=Y3K RATUDP6112=Battle.net GameUDP6666=KiLoUDP6667=KiLoUDP6766=KiLoUDP6767=KiLo,UandMeUDP6838=Mstream Agent-handlerUDP7028=未知木马UDP7424=Host ControlUDP7788=SingularityUDP7983=MStream handler-agentUDP8012=PtakksUDP8090=Aphex's Remote Packet SnifferUDP8127=9_119,ChonkerUDP8488=KiLoUDP8489=KiLoUDP8787=BackOrifice 2000UDP8879=BackOrifice 2000UDP9325=MStream Agent-handlerUDP 10000=XHXUDP 10067=Portal of DoomUDP 10084=SyphillisUDP 10100=SlapperUDP 10167=Portal of DoomUDP 10498=MstreamUDP 10666=AmbushUDP 11225=CynUDP 12321=ProtossUDP 12345=BlueIce 2000UDP 12378=W32/Gibe@MMUDP 12623=ButtMan,DUN ControlUDP 15210=UDP remote shell backdoor serverUDP 15486=KiLoUDP 16514=KiLoUDP 16515=KiLoUDP 18753=Shaft handler to AgentUDP 20433=ShaftUDP 21554=GirlFriendUDP 22784=Backdoor.IntruzzoUDP 23476=Donald DickUDP 25123=MOTDUDP 26274=Delta SourceUDP 26374=Sub-7 2.1UDP 26444=Trin00/TFN2KUDP 26573=Sub-7 2.1UDP 27184=Alvgus trojan 2000UDP 27444=TrinooUDP 29589=KiLoUDP 29891=The UnexplainedUDP 30103=NetSphereUDP 31320=Little WitchUDP 31335=Trin00 DoS AttackUDP 31337=Baron Night, BO client, BO2, Bo Facil, BackFire, Back Orifice, DeepBOUDP 31338=Back Orifice, NetSpy DK, DeepBOUDP 31339=Little WitchUDP 31340=Little WitchUDP 31416=LithiumUDP 31787=Hack aTackUDP 31789=Hack aTackUDP 31790=Hack aTackUDP 31791=Hack aTackUDP 33390=未知木马UDP 34555=TrinooUDP 35555=TrinooUDP 43720=KiLoUDP 44014=IaniUDP 44767=School BusUDP 46666=TaskmanUDP 47262=Delta SourceUDP 47785=KiLoUDP 49301=OnLine keyLoggerUDP 49683=FensterUDP 49698=KiLoUDP 52901=OmegaUDP 54320=Back OrificeUDP 54321=Back Orifice 2000UDP 54341=NetRaider TrojanUDP 61746=KiLOUDP 61747=KiLOUDP 61748=KiLO UDP 65432=The Traitor

      各个端口都代表什么意思?

      什么是UDP端口?

      UDP端口 是指传输层UDP协议使用的端口,端口号0-65535,一些使用UDP传输数据的特殊应用层进程有定义好的端口号,即通过熟知的端口号可以知道传送的是哪种应用层服务,如TFTP(简单文件传输协议)对应UDP端口号是69
      UDP协议端口是0-65535 有TCP协议端口也是0-65535 比较常用就这两种
      什么是UDP端口?

      本文由 在线网速测试 整理编辑,转载请注明出处,原文链接:https://www.wangsu123.cn/news/319248.html

          热门文章

          文章分类