Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Hematemesis collation of all commonly used ports, port problems will be easy to understand!

2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/03 Report--

When you are learning about computers, you must have a deep impression on the most commonly used ports, such as port 80, but you may not know so much about other ports that are not so commonly used. Therefore, on some ports with relatively high frequency of use, it is easy to cause some errors due to strangeness, or to be * to make use of some ports. For this matter, most people have a headache-up to 65535 ports, how can people remember?

Don't be afraid, this time specially sorted out some common port information for you, if you encounter problems, just check it out!

Note: a computer has a maximum of 65535 ports, which cannot be duplicated.

Common port number:

IIS (HTTP): 80

SQLServer:1433

Oracle:1521

MySQL:3306

FTP:21

SSH:22

Tomcat:8080

List of commonly used and uncommonly used ports

Port: 0

Service: Reserved

Description: commonly used to analyze the operating system. This method works because "0" is an invalid port in some systems, which will produce different results when you try to connect it using the usual closed port. A typical scan that uses an IP address of 0.0.0.0, sets the ACK bit and broadcasts at the Ethernet layer.

Port: 1

Service: tcpmux

Explanation: this shows that someone is looking for SGI

Irix machine. Irix is the primary provider for implementing tcpmux, and tcpmux is turned on by default in such a system. When publishing Irix machines, there are several default accounts without passwords, such as IP, GUEST

UUCP 、 NUUCP 、 DEMOS

, TUTOR, DIAG, OUTOFBOX, etc. Many administrators forget to delete these accounts after installation. So HACKER searches for tcpmux on INTERNET and leverages these accounts.

Port: 7

Service: Echo

Description: you can see the messages sent to X.X.X.0 and X.X.X.255 when many people search for Fraggle amplifiers.

Port: 19

Service: Character

Generator

Description: this is a service that only sends characters. The UDP version will respond to packets containing junk characters when they receive UDP packets. When TCP connects, it sends a data stream with junk characters until the connection is closed. HACKER uses IP spoofing to launch DoS***. Forge UDP packets between two chargen servers. Same Fraggle

DoS*** broadcasts a packet with a fake victim IP to this port of the destination address, and the victim overloads in response to the data.

Port: 21

Service: FTP

Description: the port opened by FTP server for uploading and downloading. The most common method used by people to open anonymous's FTP server. These servers have directories that can be read and written. * Doly

Trojan, Fore, Invisible FTP, WebEx, WinCrash and Blade

The port opened by the Runner.

Port: 22

Service: Ssh

Note: the connection between the TCP established by PcAnywhere and this port may be to find ssh. This service has many weaknesses, and if configured in a specific mode, many versions that use the RSAREF library will have a number of vulnerabilities.

Port: 23

Service: Telnet

Description: remote login, * users are searching for services that remotely log in to UNIX. In most cases, this port is scanned to find the operating system on which the machine is running. There are other technologies, and those who use it will find the password. * Tiny

Telnet

Server opens this port.

Port: 25

Service: SMTP

Description: the port opened by the SMTP server for sending mail. * users look for SMTP servers to pass their SPAM. The accounts of * users are closed and they need to connect to a high-bandwidth E-MAIL server and pass simple messages to different addresses. * Antigen, Email

Password Sender 、 Haebu Coceda 、 Shtrilitz

Stealth, WinPC, and WinSpy all open this port.

Port: 31

Service: MSG

Authentication

Description: * Master Paradise, Hackers

Paradise opens this port.

Port: 42

Service: WINS

Replication

Description: WINS replication

Port: 53

Service: Domain Name

Server (DNS)

Note: the port opened by the DNS server may be an attempt to TCP, deceive DNS (UDP) or hide other communications. Therefore, firewalls often filter or record this port.

Port: 67

Service: Bootstrap

Protocol Server

Description: through DSL and Cable

Modem firewalls often see large amounts of data sent to the broadcast address 255.255.255.255. These machines are requesting an address from the DHCP server. HACKER often enters them, assigns an address to use itself as a local router and initiates a large number of man-in-middle. The client broadcasts the configuration to port 68, and the server broadcasts the echo request to port 67. This response uses a broadcast because the client does not yet know the IP address that can be sent.

DHCP (UDP ports 67 and 68)

Port: 69

Service: Trival

File

Transfer

Description: many servers provide this service along with bootp to make it easy to download startup code from the system. But they are often misconfigured to enable people to steal any file from the system. They can also be used by the system to write files.

Port: 79

Service: Finger

Server

Description: * * users are used to obtain user information, query the operating system, detect known buffer overflow errors, and respond to Finger scans from their own machines to other machines.

Port: 80

Service: HTTP

Description: for web browsing. * * Executor opens this port.

Port: 99

Service: Metagram

Relay

Description: the backdoor program ncx99 opens this port.

Port: 102

Service: Message transfer

Agent (MTA)-X.400 over TCP/IP

Description: message transfer agent.

Port: 109

Service: Post Office

Protocol

-Version3

Description: the POP3 server opens this port for receiving mail, and the client accesses the server-side mail service. POP3 services have many recognized weaknesses. There are at least 20 weaknesses in the username and password exchange buffer overflow, which means that the user can enter the system before actually logging in. There are other buffer overflow errors after a successful login.

Port: 110

Services: all ports of SUN's RPC service

Description: common RPC services include rpc.mountd, NFS, rpc.statd, rpc.csmd, rpc.ttybd, amd, etc.

Port: 113

Service: Authentication

Service

Description: this is a protocol that runs on many computers and is used to authenticate users with TCP connections. Using the standard service, you can get a lot of information about computers. But it can be used as a logger for many services, especially FTP, POP, IMAP, SMTP, and IRC. Usually if many customers access these services through firewalls, they will see many connection requests for this port. Remember, if you block this port, the client will feel a slow connection to the E-MAIL server on the other side of the firewall. Many firewalls support sending back RST during the blocking of TCP connections. This will stop the slow connection.

Port: 119

Service: Network

News Transfer

Protocol

Description: NEWS newsgroup transport protocol, carrying USENET communications. The connection to this port is usually people looking for a USENET server. Most ISP restricts access to their newsgroup servers only to their customers. Turning on the newsgroup server will allow anyone to post / read posts, access to restricted newsgroup servers, post anonymously or send SPAM.

Port: 135

Service: Location

Service

Description: Microsoft runs DCE RPC end-point mapper on this port for its DCOM service. This is similar to UNIX.

The functions of port 111 are similar. Services that use DCOM and RPC take advantage of end-point on computers

Mapper registers their location. When remote customers connect to the computer, they look for end-point

Mapper finds the location of the service. HACKER scans this port of the computer to find the Exchange running on this computer

Server? What version? There are also some DOS*** that target this port directly.

Ports: 137, 138, 139

Service: NETBIOS Name

Service

Description: 137,138 are UDP ports, which are used when transferring files through network neighbors. The connection of port 139 through this port attempts to get the NetBIOS/SMB service. This protocol is used for windows file and printer sharing and SAMBA. And WINS.

Regisrtation also uses it.

Port: 143

Service: Interim Mail Access Protocol

V2

Note: like the security issues of POP3, many IMAP servers have buffer overflow vulnerabilities. Remember: a Linux worm (admv0rm) propagates through this port, so many of the scans on this port come from unwitting infected users. These vulnerabilities became popular when REDHAT allowed IMAP by default in their LINUX release. This port is also used for IMAP2, but it is not popular.

Port: 161

Service: SNMP

Description: SNMP allows remote management of devices. All configuration and operation information is stored in the database and can be obtained through SNMP. Many administrators' misconfigurations will be exposed to Internet. Cackers will attempt to access the system using the default passwords public, private. They may experiment with all possible combinations. The SNMP packet may be incorrectly directed to the user's network.

Port: 177

Service: X

Display Manager Control

Protocol

Description: many people access the X-windows console through it, and it needs to open port 6000 at the same time.

Port: 389

Services: LDAP, ILS

Description: lightweight Directory access Protocol and NetMeeting

Internet Locator

Server shares this port.

Port: 443

Service: Https

Description: Web browsing port, can provide encryption and transmission through a secure port of another kind of HTTP.

Port: 456

Service: [NULL]

Description: * HACKERS

PARADISE opens this port.

Port: 513

Service: Login,remote login

Description: from using cable

A broadcast from a UNIX computer that logs in to a modem or DSL. These people provide information for people who have access to their systems.

Port: 544

Service: [NULL]

Description: kerberos kshell

Port: 548

Service: Macintosh,File

Services (AFP/IP)

Description: Macintosh, file service.

Port: 553

Service: CORBA IIOP

(UDP)

Description: use cable

Modem, DSL, or VLAN will see the broadcast on this port. CORBA is an object-oriented RPC system. * users can use this information to enter the system.

Port: 555

Service: DSF

Description: * PhAse1.0, Stealth

Spy and IniKiller open this port.

Port: 568

Service: Membership DPA

Description: membership

DPA .

Port: 569

Service: Membership MSN

Description: membership

MSN .

Port: 635

Service: mountd

Description: mountd of Linux

Bug . This is a popular BUG scanned. Most scans for this port are based on UDP, but TCP-based mountd has increased (mountd runs on both ports). Remember that mountd can run on any port (which port needs to be queried by portmap), except that the default port for Linux is 635, just as NFS usually runs on port 2049.

Port: 636

Service: LDAP

Description: SSL (Secure

Sockets layer)

Port: 666

Service: Doom Id Software

Description: * Attack FTP, Satanz

Backdoor opens this port

Port: 993

Service: IMAP

Description: SSL (Secure Sockets

Layer)

Port: 1001, 1011

Service: [NULL]

Description: * * Silencer and WebEx open port 1001. * Doly

Trojan opens port 1011.

Port: 1024

Service: Reserved

Description: it is the beginning of a dynamic port, and many programs do not care which port to use to connect to the network. They ask the system to assign them the next idle port. Based on this, the assignment starts at port 1024. This means that the first one to make a request to the system will be assigned to port 1024. You can restart the machine, open Telnet, and then open a window to run natstat

-a you will see that Telnet is assigned port 1024. And SQL.

Session also uses this port and port 5000.

Port: 1025, 1033

Service: 1025:network blackjack

1033: [NULL]

Description: * * netspy opens these 2 ports.

Port: 1080

Service: SOCKS

Description: this protocol passes through the firewall in a tunnel manner, allowing people behind the firewall to access the INTERNET through an IP address. In theory, it should only allow internal traffic to reach the INTERNET. However, due to misconfiguration, it will allow those located outside the firewall to pass through the firewall. This error often occurs in WinGate, and is often seen when joining IRC chat rooms.

Port: 1170

Service: [NULL]

Description: * Streaming

Audio Trojan 、 Psyber Stream

Server and Voice open this port.

Ports: 1234, 1243, 6711, 6776

Service: [NULL]

Description: * SubSeven2.0, Ultors

Trojan opens ports 1234 and 6776. * * SubSeven1.0/1.9 opens ports 1243, 6711 and 6776.

Port: 1245

Service: [NULL]

Description: * * Vodoo opens this port.

Port: 1433

Service: SQL

Description: the open port of Microsoft's SQL service.

Port: 1492

Service: stone-design-1

Description: * * FTP99CMP opens this port.

Port: 1500

Service: RPC

Client fixed port session

Queries

Description: RPC customer fixed port session query

Port: 1503

Service: NetMeeting

T.120

Description: NetMeeting

T.120

Port: 1524

Service: ingress

Note: many * * scripts will install a backdoor SHELL on this port, especially those aimed at Sendmail and RPC service vulnerabilities in SUN systems. If you see a connection attempt on this port as soon as you install the firewall, it is likely to be the above reason. Try Telnet to this port on the user's computer and see if it gives you a SHELL. There is also a problem with connecting to the 600/pcserver.

Port: 1600

Service: issd

Description: * * Shivka-Burka opens this port.

Port: 1720

Service: NetMeeting

Description: NetMeeting

H.233 call Setup .

Port: 1731

Service: NetMeeting Audio Call

Control

Description: NetMeeting audio call control.

Port: 1807

Service: [NULL]

Description: * * SpySender opens this port.

Port: 1981

Service: [NULL]

Description: * * ShockRave opens this port.

Port: 1999

Service: cisco

Identification

Port

Description: * * BackDoor opens this port.

Port: 2000

Service: [NULL]

Description: * GirlFriend

1.3.The Millenium 1.0 opens this port.

Port: 2001

Service: [NULL]

Description: * Millenium 1.0, Trojan

Cow opens this port.

Port: 2023

Service: xinuexpansion 4

Description: * Pass

Ripper opens this port.

Port: 2049

Service: NFS

Description: NFS programs often run on this port. You usually need to access Portmapper to find out which port the service is running on.

Port: 2115

Service: [NULL]

Description: * * Bugs opens this port.

Port: 2140, 3150

Service: [NULL]

Description: * Deep

Throat 1.0 hip 3.0 opens this port.

Port: 2500

Service: RPC client using a fixed port session

Replication

Description: RPC customers applying fixed port session replication

Port: 2583

Service: [NULL]

Description: * Wincrash

2.0 Open this port.

Port: 2801

Service: [NULL]

Description: * Phineas

Phucker opens this port.

Port: 3024, 4092

Service: [NULL]

Description: * * WinCrash opens this port.

Port: 3128

Service: squid

Description: this is squid

The default port for the HTTP proxy server. * users scan this port to search for a proxy server and access Internet anonymously. You will also see ports 8000, 8001, 8080, 8888 searching for other proxy servers. Another reason to scan this port is that the user is entering a chat room. Other users will also verify this port to determine if the user's machine supports proxies.

Port: 3129

Service: [NULL]

Description: * Master

Paradise opens this port.

Port: 3150

Service: [NULL]

Description: * The

Invasor opens this port.

Port: 3210, 4321

Service: [NULL]

Description: * SchoolBus opens this port

Port: 3333

Service: dec-notes

Description: * Prosiak opens this port

Port: 3389

Services: hyperterminal

Description: WINDOWS

The 2000 terminal opens this port.

Port: 3700

Service: [NULL]

Description: * Portal of

Doom opens this port

Port: 3996, 4060

Service: [NULL]

Description: * RemoteAnything opens this port

Port: 4000

Services: QQ client

Description: Tencent QQ client opens this port.

Port: 4092

Service: [NULL]

Description: * * WinCrash opens this port.

Port: 4590

Service: [NULL]

Description: * * ICQTrojan opens this port.

Ports: 5000, 5001, 5321, 50505

Service: [NULL]

Description: * * blazer5 opens port 5000. * Sockets

De

Troie opens ports 5000, 5001, 5321, and 50505.

Ports: 5400, 5401, 5402

Service: [NULL]

Description: * Blade

Runner opens this port.

Port: 5550

Service: [NULL]

Description: * * xtcp opens this port.

Port: 5569

Service: [NULL]

Description: * * Robo-Hack opens this port.

Port: 5632

Service: pcAnywere

Description: sometimes you will see a lot of scans of this port, depending on the location of the user. When a user opens pcAnywere, it automatically scans the LAN Class C network for possible proxies (the proxy here refers to agent rather than proxy). * people will also look for computers that open the service. So you should check the source address of this scan Some scan packets searching for pcAnywere often contain UDP packets on port 22.

Port: 5742

Service: [NULL]

Description: * * WinCrash2.03 opens this port.

Port: 6267

Service: [NULL]

Description: * girls from Guangzhou open this port.

Port: 6400

Service: [NULL]

Description: * The

THing opens this port.

Port: 6670, 6671

Service: [NULL]

Description: * * Deep Throat opens port 6670. And Deep

Throat

3.0Open port 6671.

Port: 6883

Service: [NULL]

Description: * * DeltaSource opens this port.

Port: 6969

Service: [NULL]

Description: * * Gatecrasher and Priority open this port.

Port: 6970

Service: RealAudio

Description: RealAudio customers will receive audio data streams from the server's 6970-7170 UDP port. This is set by the TCP-7070 port outbound control connection.

Port: 7000

Service: [NULL]

Description: * Remote

Grab opens this port.

Ports: 7300, 7301, 7306, 7307, 7308

Service: [NULL]

Description: * * NetMonitor opens this port. In addition, NetSpy1.0 also opens port 7306.

Port: 7323

Service: [NULL]

Description: Sygate server side.

Port: 7626

Service: [NULL]

Description: * * Giscier opens this port.

Port: 7789

Service: [NULL]

Description: * * ICKiller opens this port.

Port: 8000

Service: OICQ

Description: this port is open on Tencent QQ server.

Port: 8010

Service: Wingate

Description: the Wingate agent opens this port.

Port: 8080

Services: proxy port

Description: the WWW agent opens this port.

Ports: 9400, 9401, 9402

Service: [NULL]

Description: * Incommand

1.0 Open this port.

Ports: 9872, 9873, 9874, 9875, 10067, 10167

Service: [NULL]

Description: * Portal

Of

Doom opens this port.

Port: 9989

Service: [NULL]

Description: * * iNi-Killer opens this port.

Port: 11000

Service: [NULL]

Description: * * SennaSpy opens this port.

Port: 11223

Service: [NULL]

Description: * Progenic

Trojan opens this port.

Port: 12076, 61466

Service: [NULL]

Description: * * Telecommando opens this port.

Port: 12223

Service: [NULL]

Description: * Hack'99

KeyLogger opens this port.

Port: 12345, 12346

Service: [NULL]

Description: * * NetBus1.60/1.70 and GabanBus open this port.

Port: 12361

Service: [NULL]

Description: * * Whack-a-mole opens this port.

Port: 13223

Service: PowWow

Description: PowWow is Tribal

Voice chat program. It allows users to open a private chat connection on this port. This program is very useful for establishing connections. It will be stationed on this TCP port to wait for a response. A connection request that causes a similar heartbeat interval. If a dial-up user inherits the IP address from another chatter, it seems that there are a lot of different people testing the port. This protocol uses OPNG as the first four bytes of its connection request.

Port: 16969

Service: [NULL]

Description: * * Priority opens this port.

Port: 17027

Service: Conducent

Description: this is an extroverted connection. This is because someone inside the company has installed shareware with Conducent "adbot". Conducent "adbot" is used to display ads for shareware. A popular software that uses this service is Pkware.

Port: 19191

Service: [NULL]

Description: * Blue Flame opens this port.

Port: 20000, 20001

Service: [NULL]

Description: * * Millennium opens this port.

Port: 20034

Service: [NULL]

Description: * NetBus

Pro opens this port.

Port: 21554

Service: [NULL]

Description: * * GirlFriend opens this port.

Port: 22222

Service: [NULL]

Description: * * Prosiak opens this port.

Port: 23456

Service: [NULL]

Description: * Evil

FTP 、 Ugly

FTP opens this port.

Port: 26274, 47262

Service: [NULL]

Description: * * Delta opens this port.

Port: 27374

Service: [NULL]

Description: * Subseven

2.1 Open this port.

Port: 30100

Service: [NULL]

Description: * * NetSphere opens this port.

Port: 30303

Service: [NULL]

Description: * * Socket23 opens this port.

Port: 30999

Service: [NULL]

Description: * * Kuang opens this port.

Port: 31337, 31338

Service: [NULL]

Description: * BO (Back

Orifice) open this port. In addition, * * DeepBO also opens port 31338.

Port: 31339

Service: [NULL]

Description: * NetSpy

DK opens this port.

Port: 31666

Service: [NULL]

Description: * * BOWhack opens this port.

Port: 33333

Service: [NULL]

Description: * * Prosiak opens this port.

Port: 34324

Service: [NULL]

Description: * Tiny

Telnet Server, BigGluck, TN open this port.

Port: 40412

Service: [NULL]

Description: * The

Spy opens this port.

Ports: 40421, 40422, 40423, 40426,

Service: [NULL]

Description: * Masters

Paradise opens this port.

Port: 43210, 54321

Service: [NULL]

Description: * SchoolBus

1.0 + 2.0 opens this port.

Port: 44445

Service: [NULL]

Description: * * Happypig opens this port.

Port: 50766

Service: [NULL]

Description: * * Fore opens this port.

Port: 53001

Service: [NULL]

Description: * Remote

Windows Shutdown opens this port.

Port: 65000

Service: [NULL]

Description: * Devil

1.03 Open this port.

Port: 88

Description: Kerberos

Krb5 . In addition, port 88 of TCP is also used for this purpose.

Port: 137

Description: SQL Named Pipes encryption over other

Protocols name lookup (SQL named pipe encryption technology on other protocol name lookups) and SQL RPC encryption over other

Protocols name lookup (SQL RPC encryption technology on other protocol name lookups) and Wins NetBT name service (WINS

This port is used by both NetBT name service) and Wins Proxy.

Port: 161

Description: Simple Network Management

Protocol (SMTP) (simple Network Management Protocol).

Port: 162

Description: SNMP

Trap (SNMP trap)

Port: 445

Description: Common Internet File

System (CIFS) (public Internet file system)

Port: 464

Description: Kerberos

Kpasswd (v5) In addition, port 464 of TCP is also used for this purpose.

Port: 500

Description: Internet Key

Exchange (IKE) (Internet key Exchange)

Port: 1645, 1812

Description: Remot Authentication

Dial-In User Service (RADIUS) authentication (Routing and Remote

Access) (remote Authentication Dial-up user Service)

Port: 1646, 1813

Description: RADIUS accounting (Routing and

Remote Access) (RADIUS Accounting (routing and remote access))

Port: 1701

Description: Layer Two Tunneling

Protocol (L2TP) (layer 2 tunneling Protocol)

Port: 1801, 3527

Description: Microsoft Message Queue

Server (Microsoft message queuing server). And TCP 135,1801, 2101, 2103, 2105 are also used for the same purpose.

Port: 2504

Description: Network

Load Balancing (Network load balancing)

Network layer-there is an important field called the protocol number in the packet format of the packet. For example, if it is a TCP connection at the transport layer, then the protocol number in the network layer IP packet will have a value of 6, and if it is UDP, that value will be 17-transport layer.

The transport layer-associated through the interface (the field of the port is called the port)-the application layer.

With netstat-an, you can see the port number that is open on this machine.

Common port of proxy server

(1)。 HTTP protocol proxy server commonly used port number: 808080Universe 3128According to 8081Universe 9080

(2)。 Common port number of SOCKS proxy protocol server: 1080

(3)。 FTP (File transfer) Protocol proxy server commonly used port number: 21

(4)。 Telnet (remote login) protocol proxy server common port: 23

HTTP server, default port number is 80/tcp (* Executor opens this port)

HTTPS (securely transferring web pages) server, default port number is 443/tcp 443/udp

Telnet (unsecured text transfer). The default port number is 23/tcp (the port opened by * Tiny Telnet Server).

FTP, the default port number is 21/tcp (ports opened by * * Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash and Blade Runner)

TFTP (Trivial File Transfer Protocol), the default port number is 69/udp

SSH (secure login), SCP (file transfer), port redirection. The default port number is 22/tcp.

SMTP Simple Mail Transfer Protocol (E-mail), the default port number is 25/tcp (* * Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, WinPC, WinSpy all open this port)

POP3 Post Office Protocol (E-mail), the default port number is 110/tcp

WebLogic, the default port number is 7001

Webshpere application, the default port number is 9080

Webshpere management tool, the default port number is 9090

JBOSS, the default port number is 8080

TOMCAT, the default port number is 8080

WIN2003 remote login. The default port number is 3389.

Symantec AV/Filter for MSE, default port number is 8081

Oracle database, default port number is 1521

ORACLE EMCTL, the default port number is 1158

Oracle XDB (XML database), the default port number is 8080

Oracle XDB FTP service, default port number is 2100

MS SQL*SERVER database server, default port number is 1433/tcp 1433/udp

MS SQL*SERVER database monitor, default port number is 1434/tcp 1434/udp

QQ, the default port number is 1080/udp

TcpMux0 1 Tcp Port Service Multiplexer

Echo 1 7 echo (echo sends back all received data)

Discard2 9 Delete (statically delete all accepted data)

Systat3 11 current user

Daytime 13 during the day

Daily references to Quotd 17

Chargen 19 generates characters

Ftp-data 20

File transfer (default data)

Ftp 21 file transfer (control port)

Telnet 23 remote communication network

Smtp 25 simple Mail transfer Protocol

Time 37 time

Nicname 43 who?

Domain 53 Domain name Server

Bootps 67 Bootstrapper Protocol Server

Bootpc 68

Bootstrap protocol client

Tftp 69 Common File transfer Protocol

Gopher 70 Gopher

Finger 79 dialing

WWW-http 80 WWW-Http

Kerberos 88

Kerberos

Pop2 109Postal Protocol version 2

Pop3 110Postal Protocol version 3

Sunrpc 111Sun running program call

Nntp 119Network News transfer Protocol

Ntp 123Network time Protocol

Netbios-ns 137Network basic input and output system naming Service

Netbios-ns 138

Datagram service of network basic input and output system

Netbios-ssn 139network basic input and output system period service

Imap2 143

Intermediate Mail access Protocol V2

Snmp 161simple Network Management Protocol

Bgp 179 Border Gateway Protocol

Syslog 514 system lander

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report