In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/03 Report--
When you are learning about computers, you must have a deep impression on the most commonly used ports, such as port 80, but you may not know so much about other ports that are not so commonly used. Therefore, on some ports with relatively high frequency of use, it is easy to cause some errors due to strangeness, or to be * to make use of some ports. For this matter, most people have a headache-up to 65535 ports, how can people remember?
Don't be afraid, this time specially sorted out some common port information for you, if you encounter problems, just check it out!
Note: a computer has a maximum of 65535 ports, which cannot be duplicated.
Common port number:
IIS (HTTP): 80
SQLServer:1433
Oracle:1521
MySQL:3306
FTP:21
SSH:22
Tomcat:8080
List of commonly used and uncommonly used ports
Port: 0
Service: Reserved
Description: commonly used to analyze the operating system. This method works because "0" is an invalid port in some systems, which will produce different results when you try to connect it using the usual closed port. A typical scan that uses an IP address of 0.0.0.0, sets the ACK bit and broadcasts at the Ethernet layer.
Port: 1
Service: tcpmux
Explanation: this shows that someone is looking for SGI
Irix machine. Irix is the primary provider for implementing tcpmux, and tcpmux is turned on by default in such a system. When publishing Irix machines, there are several default accounts without passwords, such as IP, GUEST
UUCP 、 NUUCP 、 DEMOS
, TUTOR, DIAG, OUTOFBOX, etc. Many administrators forget to delete these accounts after installation. So HACKER searches for tcpmux on INTERNET and leverages these accounts.
Port: 7
Service: Echo
Description: you can see the messages sent to X.X.X.0 and X.X.X.255 when many people search for Fraggle amplifiers.
Port: 19
Service: Character
Generator
Description: this is a service that only sends characters. The UDP version will respond to packets containing junk characters when they receive UDP packets. When TCP connects, it sends a data stream with junk characters until the connection is closed. HACKER uses IP spoofing to launch DoS***. Forge UDP packets between two chargen servers. Same Fraggle
DoS*** broadcasts a packet with a fake victim IP to this port of the destination address, and the victim overloads in response to the data.
Port: 21
Service: FTP
Description: the port opened by FTP server for uploading and downloading. The most common method used by people to open anonymous's FTP server. These servers have directories that can be read and written. * Doly
Trojan, Fore, Invisible FTP, WebEx, WinCrash and Blade
The port opened by the Runner.
Port: 22
Service: Ssh
Note: the connection between the TCP established by PcAnywhere and this port may be to find ssh. This service has many weaknesses, and if configured in a specific mode, many versions that use the RSAREF library will have a number of vulnerabilities.
Port: 23
Service: Telnet
Description: remote login, * users are searching for services that remotely log in to UNIX. In most cases, this port is scanned to find the operating system on which the machine is running. There are other technologies, and those who use it will find the password. * Tiny
Telnet
Server opens this port.
Port: 25
Service: SMTP
Description: the port opened by the SMTP server for sending mail. * users look for SMTP servers to pass their SPAM. The accounts of * users are closed and they need to connect to a high-bandwidth E-MAIL server and pass simple messages to different addresses. * Antigen, Email
Password Sender 、 Haebu Coceda 、 Shtrilitz
Stealth, WinPC, and WinSpy all open this port.
Port: 31
Service: MSG
Authentication
Description: * Master Paradise, Hackers
Paradise opens this port.
Port: 42
Service: WINS
Replication
Description: WINS replication
Port: 53
Service: Domain Name
Server (DNS)
Note: the port opened by the DNS server may be an attempt to TCP, deceive DNS (UDP) or hide other communications. Therefore, firewalls often filter or record this port.
Port: 67
Service: Bootstrap
Protocol Server
Description: through DSL and Cable
Modem firewalls often see large amounts of data sent to the broadcast address 255.255.255.255. These machines are requesting an address from the DHCP server. HACKER often enters them, assigns an address to use itself as a local router and initiates a large number of man-in-middle. The client broadcasts the configuration to port 68, and the server broadcasts the echo request to port 67. This response uses a broadcast because the client does not yet know the IP address that can be sent.
DHCP (UDP ports 67 and 68)
Port: 69
Service: Trival
File
Transfer
Description: many servers provide this service along with bootp to make it easy to download startup code from the system. But they are often misconfigured to enable people to steal any file from the system. They can also be used by the system to write files.
Port: 79
Service: Finger
Server
Description: * * users are used to obtain user information, query the operating system, detect known buffer overflow errors, and respond to Finger scans from their own machines to other machines.
Port: 80
Service: HTTP
Description: for web browsing. * * Executor opens this port.
Port: 99
Service: Metagram
Relay
Description: the backdoor program ncx99 opens this port.
Port: 102
Service: Message transfer
Agent (MTA)-X.400 over TCP/IP
Description: message transfer agent.
Port: 109
Service: Post Office
Protocol
-Version3
Description: the POP3 server opens this port for receiving mail, and the client accesses the server-side mail service. POP3 services have many recognized weaknesses. There are at least 20 weaknesses in the username and password exchange buffer overflow, which means that the user can enter the system before actually logging in. There are other buffer overflow errors after a successful login.
Port: 110
Services: all ports of SUN's RPC service
Description: common RPC services include rpc.mountd, NFS, rpc.statd, rpc.csmd, rpc.ttybd, amd, etc.
Port: 113
Service: Authentication
Service
Description: this is a protocol that runs on many computers and is used to authenticate users with TCP connections. Using the standard service, you can get a lot of information about computers. But it can be used as a logger for many services, especially FTP, POP, IMAP, SMTP, and IRC. Usually if many customers access these services through firewalls, they will see many connection requests for this port. Remember, if you block this port, the client will feel a slow connection to the E-MAIL server on the other side of the firewall. Many firewalls support sending back RST during the blocking of TCP connections. This will stop the slow connection.
Port: 119
Service: Network
News Transfer
Protocol
Description: NEWS newsgroup transport protocol, carrying USENET communications. The connection to this port is usually people looking for a USENET server. Most ISP restricts access to their newsgroup servers only to their customers. Turning on the newsgroup server will allow anyone to post / read posts, access to restricted newsgroup servers, post anonymously or send SPAM.
Port: 135
Service: Location
Service
Description: Microsoft runs DCE RPC end-point mapper on this port for its DCOM service. This is similar to UNIX.
The functions of port 111 are similar. Services that use DCOM and RPC take advantage of end-point on computers
Mapper registers their location. When remote customers connect to the computer, they look for end-point
Mapper finds the location of the service. HACKER scans this port of the computer to find the Exchange running on this computer
Server? What version? There are also some DOS*** that target this port directly.
Ports: 137, 138, 139
Service: NETBIOS Name
Service
Description: 137,138 are UDP ports, which are used when transferring files through network neighbors. The connection of port 139 through this port attempts to get the NetBIOS/SMB service. This protocol is used for windows file and printer sharing and SAMBA. And WINS.
Regisrtation also uses it.
Port: 143
Service: Interim Mail Access Protocol
V2
Note: like the security issues of POP3, many IMAP servers have buffer overflow vulnerabilities. Remember: a Linux worm (admv0rm) propagates through this port, so many of the scans on this port come from unwitting infected users. These vulnerabilities became popular when REDHAT allowed IMAP by default in their LINUX release. This port is also used for IMAP2, but it is not popular.
Port: 161
Service: SNMP
Description: SNMP allows remote management of devices. All configuration and operation information is stored in the database and can be obtained through SNMP. Many administrators' misconfigurations will be exposed to Internet. Cackers will attempt to access the system using the default passwords public, private. They may experiment with all possible combinations. The SNMP packet may be incorrectly directed to the user's network.
Port: 177
Service: X
Display Manager Control
Protocol
Description: many people access the X-windows console through it, and it needs to open port 6000 at the same time.
Port: 389
Services: LDAP, ILS
Description: lightweight Directory access Protocol and NetMeeting
Internet Locator
Server shares this port.
Port: 443
Service: Https
Description: Web browsing port, can provide encryption and transmission through a secure port of another kind of HTTP.
Port: 456
Service: [NULL]
Description: * HACKERS
PARADISE opens this port.
Port: 513
Service: Login,remote login
Description: from using cable
A broadcast from a UNIX computer that logs in to a modem or DSL. These people provide information for people who have access to their systems.
Port: 544
Service: [NULL]
Description: kerberos kshell
Port: 548
Service: Macintosh,File
Services (AFP/IP)
Description: Macintosh, file service.
Port: 553
Service: CORBA IIOP
(UDP)
Description: use cable
Modem, DSL, or VLAN will see the broadcast on this port. CORBA is an object-oriented RPC system. * users can use this information to enter the system.
Port: 555
Service: DSF
Description: * PhAse1.0, Stealth
Spy and IniKiller open this port.
Port: 568
Service: Membership DPA
Description: membership
DPA .
Port: 569
Service: Membership MSN
Description: membership
MSN .
Port: 635
Service: mountd
Description: mountd of Linux
Bug . This is a popular BUG scanned. Most scans for this port are based on UDP, but TCP-based mountd has increased (mountd runs on both ports). Remember that mountd can run on any port (which port needs to be queried by portmap), except that the default port for Linux is 635, just as NFS usually runs on port 2049.
Port: 636
Service: LDAP
Description: SSL (Secure
Sockets layer)
Port: 666
Service: Doom Id Software
Description: * Attack FTP, Satanz
Backdoor opens this port
Port: 993
Service: IMAP
Description: SSL (Secure Sockets
Layer)
Port: 1001, 1011
Service: [NULL]
Description: * * Silencer and WebEx open port 1001. * Doly
Trojan opens port 1011.
Port: 1024
Service: Reserved
Description: it is the beginning of a dynamic port, and many programs do not care which port to use to connect to the network. They ask the system to assign them the next idle port. Based on this, the assignment starts at port 1024. This means that the first one to make a request to the system will be assigned to port 1024. You can restart the machine, open Telnet, and then open a window to run natstat
-a you will see that Telnet is assigned port 1024. And SQL.
Session also uses this port and port 5000.
Port: 1025, 1033
Service: 1025:network blackjack
1033: [NULL]
Description: * * netspy opens these 2 ports.
Port: 1080
Service: SOCKS
Description: this protocol passes through the firewall in a tunnel manner, allowing people behind the firewall to access the INTERNET through an IP address. In theory, it should only allow internal traffic to reach the INTERNET. However, due to misconfiguration, it will allow those located outside the firewall to pass through the firewall. This error often occurs in WinGate, and is often seen when joining IRC chat rooms.
Port: 1170
Service: [NULL]
Description: * Streaming
Audio Trojan 、 Psyber Stream
Server and Voice open this port.
Ports: 1234, 1243, 6711, 6776
Service: [NULL]
Description: * SubSeven2.0, Ultors
Trojan opens ports 1234 and 6776. * * SubSeven1.0/1.9 opens ports 1243, 6711 and 6776.
Port: 1245
Service: [NULL]
Description: * * Vodoo opens this port.
Port: 1433
Service: SQL
Description: the open port of Microsoft's SQL service.
Port: 1492
Service: stone-design-1
Description: * * FTP99CMP opens this port.
Port: 1500
Service: RPC
Client fixed port session
Queries
Description: RPC customer fixed port session query
Port: 1503
Service: NetMeeting
T.120
Description: NetMeeting
T.120
Port: 1524
Service: ingress
Note: many * * scripts will install a backdoor SHELL on this port, especially those aimed at Sendmail and RPC service vulnerabilities in SUN systems. If you see a connection attempt on this port as soon as you install the firewall, it is likely to be the above reason. Try Telnet to this port on the user's computer and see if it gives you a SHELL. There is also a problem with connecting to the 600/pcserver.
Port: 1600
Service: issd
Description: * * Shivka-Burka opens this port.
Port: 1720
Service: NetMeeting
Description: NetMeeting
H.233 call Setup .
Port: 1731
Service: NetMeeting Audio Call
Control
Description: NetMeeting audio call control.
Port: 1807
Service: [NULL]
Description: * * SpySender opens this port.
Port: 1981
Service: [NULL]
Description: * * ShockRave opens this port.
Port: 1999
Service: cisco
Identification
Port
Description: * * BackDoor opens this port.
Port: 2000
Service: [NULL]
Description: * GirlFriend
1.3.The Millenium 1.0 opens this port.
Port: 2001
Service: [NULL]
Description: * Millenium 1.0, Trojan
Cow opens this port.
Port: 2023
Service: xinuexpansion 4
Description: * Pass
Ripper opens this port.
Port: 2049
Service: NFS
Description: NFS programs often run on this port. You usually need to access Portmapper to find out which port the service is running on.
Port: 2115
Service: [NULL]
Description: * * Bugs opens this port.
Port: 2140, 3150
Service: [NULL]
Description: * Deep
Throat 1.0 hip 3.0 opens this port.
Port: 2500
Service: RPC client using a fixed port session
Replication
Description: RPC customers applying fixed port session replication
Port: 2583
Service: [NULL]
Description: * Wincrash
2.0 Open this port.
Port: 2801
Service: [NULL]
Description: * Phineas
Phucker opens this port.
Port: 3024, 4092
Service: [NULL]
Description: * * WinCrash opens this port.
Port: 3128
Service: squid
Description: this is squid
The default port for the HTTP proxy server. * users scan this port to search for a proxy server and access Internet anonymously. You will also see ports 8000, 8001, 8080, 8888 searching for other proxy servers. Another reason to scan this port is that the user is entering a chat room. Other users will also verify this port to determine if the user's machine supports proxies.
Port: 3129
Service: [NULL]
Description: * Master
Paradise opens this port.
Port: 3150
Service: [NULL]
Description: * The
Invasor opens this port.
Port: 3210, 4321
Service: [NULL]
Description: * SchoolBus opens this port
Port: 3333
Service: dec-notes
Description: * Prosiak opens this port
Port: 3389
Services: hyperterminal
Description: WINDOWS
The 2000 terminal opens this port.
Port: 3700
Service: [NULL]
Description: * Portal of
Doom opens this port
Port: 3996, 4060
Service: [NULL]
Description: * RemoteAnything opens this port
Port: 4000
Services: QQ client
Description: Tencent QQ client opens this port.
Port: 4092
Service: [NULL]
Description: * * WinCrash opens this port.
Port: 4590
Service: [NULL]
Description: * * ICQTrojan opens this port.
Ports: 5000, 5001, 5321, 50505
Service: [NULL]
Description: * * blazer5 opens port 5000. * Sockets
De
Troie opens ports 5000, 5001, 5321, and 50505.
Ports: 5400, 5401, 5402
Service: [NULL]
Description: * Blade
Runner opens this port.
Port: 5550
Service: [NULL]
Description: * * xtcp opens this port.
Port: 5569
Service: [NULL]
Description: * * Robo-Hack opens this port.
Port: 5632
Service: pcAnywere
Description: sometimes you will see a lot of scans of this port, depending on the location of the user. When a user opens pcAnywere, it automatically scans the LAN Class C network for possible proxies (the proxy here refers to agent rather than proxy). * people will also look for computers that open the service. So you should check the source address of this scan Some scan packets searching for pcAnywere often contain UDP packets on port 22.
Port: 5742
Service: [NULL]
Description: * * WinCrash2.03 opens this port.
Port: 6267
Service: [NULL]
Description: * girls from Guangzhou open this port.
Port: 6400
Service: [NULL]
Description: * The
THing opens this port.
Port: 6670, 6671
Service: [NULL]
Description: * * Deep Throat opens port 6670. And Deep
Throat
3.0Open port 6671.
Port: 6883
Service: [NULL]
Description: * * DeltaSource opens this port.
Port: 6969
Service: [NULL]
Description: * * Gatecrasher and Priority open this port.
Port: 6970
Service: RealAudio
Description: RealAudio customers will receive audio data streams from the server's 6970-7170 UDP port. This is set by the TCP-7070 port outbound control connection.
Port: 7000
Service: [NULL]
Description: * Remote
Grab opens this port.
Ports: 7300, 7301, 7306, 7307, 7308
Service: [NULL]
Description: * * NetMonitor opens this port. In addition, NetSpy1.0 also opens port 7306.
Port: 7323
Service: [NULL]
Description: Sygate server side.
Port: 7626
Service: [NULL]
Description: * * Giscier opens this port.
Port: 7789
Service: [NULL]
Description: * * ICKiller opens this port.
Port: 8000
Service: OICQ
Description: this port is open on Tencent QQ server.
Port: 8010
Service: Wingate
Description: the Wingate agent opens this port.
Port: 8080
Services: proxy port
Description: the WWW agent opens this port.
Ports: 9400, 9401, 9402
Service: [NULL]
Description: * Incommand
1.0 Open this port.
Ports: 9872, 9873, 9874, 9875, 10067, 10167
Service: [NULL]
Description: * Portal
Of
Doom opens this port.
Port: 9989
Service: [NULL]
Description: * * iNi-Killer opens this port.
Port: 11000
Service: [NULL]
Description: * * SennaSpy opens this port.
Port: 11223
Service: [NULL]
Description: * Progenic
Trojan opens this port.
Port: 12076, 61466
Service: [NULL]
Description: * * Telecommando opens this port.
Port: 12223
Service: [NULL]
Description: * Hack'99
KeyLogger opens this port.
Port: 12345, 12346
Service: [NULL]
Description: * * NetBus1.60/1.70 and GabanBus open this port.
Port: 12361
Service: [NULL]
Description: * * Whack-a-mole opens this port.
Port: 13223
Service: PowWow
Description: PowWow is Tribal
Voice chat program. It allows users to open a private chat connection on this port. This program is very useful for establishing connections. It will be stationed on this TCP port to wait for a response. A connection request that causes a similar heartbeat interval. If a dial-up user inherits the IP address from another chatter, it seems that there are a lot of different people testing the port. This protocol uses OPNG as the first four bytes of its connection request.
Port: 16969
Service: [NULL]
Description: * * Priority opens this port.
Port: 17027
Service: Conducent
Description: this is an extroverted connection. This is because someone inside the company has installed shareware with Conducent "adbot". Conducent "adbot" is used to display ads for shareware. A popular software that uses this service is Pkware.
Port: 19191
Service: [NULL]
Description: * Blue Flame opens this port.
Port: 20000, 20001
Service: [NULL]
Description: * * Millennium opens this port.
Port: 20034
Service: [NULL]
Description: * NetBus
Pro opens this port.
Port: 21554
Service: [NULL]
Description: * * GirlFriend opens this port.
Port: 22222
Service: [NULL]
Description: * * Prosiak opens this port.
Port: 23456
Service: [NULL]
Description: * Evil
FTP 、 Ugly
FTP opens this port.
Port: 26274, 47262
Service: [NULL]
Description: * * Delta opens this port.
Port: 27374
Service: [NULL]
Description: * Subseven
2.1 Open this port.
Port: 30100
Service: [NULL]
Description: * * NetSphere opens this port.
Port: 30303
Service: [NULL]
Description: * * Socket23 opens this port.
Port: 30999
Service: [NULL]
Description: * * Kuang opens this port.
Port: 31337, 31338
Service: [NULL]
Description: * BO (Back
Orifice) open this port. In addition, * * DeepBO also opens port 31338.
Port: 31339
Service: [NULL]
Description: * NetSpy
DK opens this port.
Port: 31666
Service: [NULL]
Description: * * BOWhack opens this port.
Port: 33333
Service: [NULL]
Description: * * Prosiak opens this port.
Port: 34324
Service: [NULL]
Description: * Tiny
Telnet Server, BigGluck, TN open this port.
Port: 40412
Service: [NULL]
Description: * The
Spy opens this port.
Ports: 40421, 40422, 40423, 40426,
Service: [NULL]
Description: * Masters
Paradise opens this port.
Port: 43210, 54321
Service: [NULL]
Description: * SchoolBus
1.0 + 2.0 opens this port.
Port: 44445
Service: [NULL]
Description: * * Happypig opens this port.
Port: 50766
Service: [NULL]
Description: * * Fore opens this port.
Port: 53001
Service: [NULL]
Description: * Remote
Windows Shutdown opens this port.
Port: 65000
Service: [NULL]
Description: * Devil
1.03 Open this port.
Port: 88
Description: Kerberos
Krb5 . In addition, port 88 of TCP is also used for this purpose.
Port: 137
Description: SQL Named Pipes encryption over other
Protocols name lookup (SQL named pipe encryption technology on other protocol name lookups) and SQL RPC encryption over other
Protocols name lookup (SQL RPC encryption technology on other protocol name lookups) and Wins NetBT name service (WINS
This port is used by both NetBT name service) and Wins Proxy.
Port: 161
Description: Simple Network Management
Protocol (SMTP) (simple Network Management Protocol).
Port: 162
Description: SNMP
Trap (SNMP trap)
Port: 445
Description: Common Internet File
System (CIFS) (public Internet file system)
Port: 464
Description: Kerberos
Kpasswd (v5) In addition, port 464 of TCP is also used for this purpose.
Port: 500
Description: Internet Key
Exchange (IKE) (Internet key Exchange)
Port: 1645, 1812
Description: Remot Authentication
Dial-In User Service (RADIUS) authentication (Routing and Remote
Access) (remote Authentication Dial-up user Service)
Port: 1646, 1813
Description: RADIUS accounting (Routing and
Remote Access) (RADIUS Accounting (routing and remote access))
Port: 1701
Description: Layer Two Tunneling
Protocol (L2TP) (layer 2 tunneling Protocol)
Port: 1801, 3527
Description: Microsoft Message Queue
Server (Microsoft message queuing server). And TCP 135,1801, 2101, 2103, 2105 are also used for the same purpose.
Port: 2504
Description: Network
Load Balancing (Network load balancing)
Network layer-there is an important field called the protocol number in the packet format of the packet. For example, if it is a TCP connection at the transport layer, then the protocol number in the network layer IP packet will have a value of 6, and if it is UDP, that value will be 17-transport layer.
The transport layer-associated through the interface (the field of the port is called the port)-the application layer.
With netstat-an, you can see the port number that is open on this machine.
Common port of proxy server
(1)。 HTTP protocol proxy server commonly used port number: 808080Universe 3128According to 8081Universe 9080
(2)。 Common port number of SOCKS proxy protocol server: 1080
(3)。 FTP (File transfer) Protocol proxy server commonly used port number: 21
(4)。 Telnet (remote login) protocol proxy server common port: 23
HTTP server, default port number is 80/tcp (* Executor opens this port)
HTTPS (securely transferring web pages) server, default port number is 443/tcp 443/udp
Telnet (unsecured text transfer). The default port number is 23/tcp (the port opened by * Tiny Telnet Server).
FTP, the default port number is 21/tcp (ports opened by * * Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash and Blade Runner)
TFTP (Trivial File Transfer Protocol), the default port number is 69/udp
SSH (secure login), SCP (file transfer), port redirection. The default port number is 22/tcp.
SMTP Simple Mail Transfer Protocol (E-mail), the default port number is 25/tcp (* * Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, WinPC, WinSpy all open this port)
POP3 Post Office Protocol (E-mail), the default port number is 110/tcp
WebLogic, the default port number is 7001
Webshpere application, the default port number is 9080
Webshpere management tool, the default port number is 9090
JBOSS, the default port number is 8080
TOMCAT, the default port number is 8080
WIN2003 remote login. The default port number is 3389.
Symantec AV/Filter for MSE, default port number is 8081
Oracle database, default port number is 1521
ORACLE EMCTL, the default port number is 1158
Oracle XDB (XML database), the default port number is 8080
Oracle XDB FTP service, default port number is 2100
MS SQL*SERVER database server, default port number is 1433/tcp 1433/udp
MS SQL*SERVER database monitor, default port number is 1434/tcp 1434/udp
QQ, the default port number is 1080/udp
TcpMux0 1 Tcp Port Service Multiplexer
Echo 1 7 echo (echo sends back all received data)
Discard2 9 Delete (statically delete all accepted data)
Systat3 11 current user
Daytime 13 during the day
Daily references to Quotd 17
Chargen 19 generates characters
Ftp-data 20
File transfer (default data)
Ftp 21 file transfer (control port)
Telnet 23 remote communication network
Smtp 25 simple Mail transfer Protocol
Time 37 time
Nicname 43 who?
Domain 53 Domain name Server
Bootps 67 Bootstrapper Protocol Server
Bootpc 68
Bootstrap protocol client
Tftp 69 Common File transfer Protocol
Gopher 70 Gopher
Finger 79 dialing
WWW-http 80 WWW-Http
Kerberos 88
Kerberos
Pop2 109Postal Protocol version 2
Pop3 110Postal Protocol version 3
Sunrpc 111Sun running program call
Nntp 119Network News transfer Protocol
Ntp 123Network time Protocol
Netbios-ns 137Network basic input and output system naming Service
Netbios-ns 138
Datagram service of network basic input and output system
Netbios-ssn 139network basic input and output system period service
Imap2 143
Intermediate Mail access Protocol V2
Snmp 161simple Network Management Protocol
Bgp 179 Border Gateway Protocol
Syslog 514 system lander
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.