Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What are the common service port numbers of Linux

2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >

Share

Shulou(Shulou.com)06/01 Report--

What are the common Linux service port numbers, many novices are not very clear about this, in order to help you solve this problem, the following editor will explain for you in detail, people with this need can come to learn, I hope you can gain something.

The port in the software field generally refers to the communication protocol port for connected service and connectionless service in the network. it is a kind of abstract software structure, including some data structures and Igamo (basic input and output) buffer.

Linux common service port number

A computer has a maximum of 65535 ports, which cannot be duplicated.

Common port number:

IIS (HTTP): 80

SQLServer:1433

Oracle:1521

MySQL:3306

FTP:21

SSH:22

Tomcat:8080

Telnet: 23

List of commonly used and uncommonly used ports

Port: 0

Service: Reserved

Description: commonly used to analyze the operating system. This method works because "0" is an invalid port in some systems, which will produce different results when you try to connect it using the usual closed port. A typical scan that uses an IP address of 0.0.0.0, sets the ACK bit and broadcasts at the Ethernet layer.

Port: 1

Service: tcpmux

Explanation: this shows that someone is looking for SGI

Irix machine. Irix is the primary provider for implementing tcpmux, and tcpmux is turned on by default in such a system. When publishing Irix machines, there are several default accounts without passwords, such as IP, GUEST

UUCP 、 NUUCP 、 DEMOS

, TUTOR, DIAG, OUTOFBOX, etc. Many administrators forget to delete these accounts after installation. So HACKER searches for tcpmux on INTERNET and leverages these accounts.

Port: 7

Service: Echo

Description: you can see the messages sent to X.X.X.0 and X.X.X.255 when many people search for Fraggle amplifiers.

Port: 19

Service: Character

Generator

Description: this is a service that only sends characters. The UDP version will respond to packets containing junk characters when they receive UDP packets. When TCP connects, it sends a data stream with junk characters until the connection is closed. HACKER uses IP spoofing to launch DoS attacks. Forge UDP packets between two chargen servers. Same Fraggle

The DoS attack broadcasts a packet with a bogus victim IP to this port of the target address, and the victim overloads in response to the data.

Port: 21

Service: FTP

Description: the port opened by FTP server for uploading and downloading. The most common method used by attackers to find the FTP server that opens anonymous. These servers have directories that can be read and written. Trojan Doly

Trojan, Fore, Invisible FTP, WebEx, WinCrash and Blade

The port opened by the Runner.

Port: 22

Service: Ssh

Note: the connection between the TCP established by PcAnywhere and this port may be to find ssh. This service has many weaknesses, and if configured in a specific mode, many versions that use the RSAREF library will have a number of vulnerabilities.

Port: 23

Service: Telnet

Description: remote login, intruders in the search for remote login UNIX services. In most cases, this port is scanned to find the operating system on which the machine is running. Using other techniques, the intruder will also find the password. Trojan Tiny

Telnet

Server opens this port.

Port: 25

Service: SMTP

Description: the port opened by the SMTP server for sending mail. Intruders look for SMTP servers to pass their SPAM. The intruder's account is closed and they need to connect to a high-bandwidth E-MAIL server and pass simple messages to different addresses. Trojans Antigen, Email

Password Sender 、 Haebu Coceda 、 Shtrilitz

Stealth, WinPC, and WinSpy all open this port.

Port: 31

Service: MSG

Authentication

Description: Trojan Master Paradise, Hackers

Paradise opens this port.

Port: 42

Service: WINS

Replication

Description: WINS replication

Port: 53

Service: Domain Name

Server (DNS)

Description: the port opened by the DNS server, the intruder may be trying to TCP, deceive DNS (UDP) or hide other communications. Therefore, firewalls often filter or record this port.

Port: 67

Service: Bootstrap

Protocol Server

Description: through DSL and Cable

Modem firewalls often see large amounts of data sent to the broadcast address 255.255.255.255. These machines are requesting an address from the DHCP server. HACKER often enters them, assigns an address to use itself as a local router and launches a large number of man-in-the-middle (man-in-middle) attacks. The client broadcasts the configuration to port 68, and the server broadcasts the echo request to port 67. This response uses a broadcast because the client does not yet know the IP address that can be sent.

DHCP (UDP ports 67 and 68)

Port: 69

Service: Trival

File

Transfer

Description: many servers provide this service along with bootp to make it easy to download startup code from the system. But they are often misconfigured to enable intruders to steal any file from the system. They can also be used by the system to write files.

Port: 79

Service: Finger

Server

Description: intruders are used to obtain user information, query the operating system, detect known buffer overflow errors, and respond to Finger scans from their machines to other machines.

Port: 80

Service: HTTP

Description: for web browsing. Trojan Executor opens this port.

Port: 99

Service: Metagram

Relay

Description: the backdoor program ncx99 opens this port.

Port: 102

Service: Message transfer

Agent (MTA)-X.400 over TCP/IP

Description: message transfer agent.

Port: 109

Service: Post Office

Protocol

-Version3

Description: the POP3 server opens this port for receiving mail, and the client accesses the server-side mail service. POP3 services have many recognized weaknesses. There are at least 20 weaknesses in the username and password exchange buffer overflow, which means that intruders can enter the system before actually logging in. There are other buffer overflow errors after a successful login.

Port: 110

Services: all ports of SUN's RPC service

Description: common RPC services include rpc.mountd, NFS, rpc.statd, rpc.csmd, rpc.ttybd, amd, etc.

Port: 113

Service: Authentication

Service

Description: this is a protocol that runs on many computers and is used to authenticate users with TCP connections. Using the standard service, you can get a lot of information about computers. But it can be used as a logger for many services, especially FTP, POP, IMAP, SMTP, and IRC. Usually if many customers access these services through firewalls, they will see many connection requests for this port. Remember, if you block this port, the client will feel a slow connection to the E-MAIL server on the other side of the firewall. Many firewalls support sending back RST during the blocking of TCP connections. This will stop the slow connection.

Port: 119

Service: Network

News Transfer

Protocol

Description: NEWS newsgroup transport protocol, carrying USENET communications. The connection to this port is usually people looking for a USENET server. Most ISP restricts access to their newsgroup servers only to their customers. Turning on the newsgroup server will allow anyone to post / read posts, access to restricted newsgroup servers, post anonymously or send SPAM.

Port: 135

Service: Location

Service

Description: Microsoft runs DCE RPC end-point mapper on this port for its DCOM service. This is similar to UNIX.

The functions of port 111 are similar. Services that use DCOM and RPC take advantage of end-point on computers

Mapper registers their location. When remote customers connect to the computer, they look for end-point

Mapper finds the location of the service. HACKER scans this port of the computer to find the Exchange running on this computer

Server? What version? There are also some DOS attacks that target this port directly.

Ports: 137, 138, 139

Service: NETBIOS Name

Service

Description: 137,138 are UDP ports, which are used when transferring files through network neighbors. The connection of port 139 through this port attempts to get the NetBIOS/SMB service. This protocol is used for windows file and printer sharing and SAMBA. And WINS.

Regisrtation also uses it.

Port: 143

Service: Interim Mail Access Protocol

V2

Note: like the security issues of POP3, many IMAP servers have buffer overflow vulnerabilities. Remember: a Linux worm (admv0rm) propagates through this port, so many of the scans on this port come from unwitting infected users. These vulnerabilities became popular when REDHAT allowed IMAP by default in their LINUX release. This port is also used for IMAP2, but it is not popular.

Port: 161

Service: SNMP

Description: SNMP allows remote management of devices. All configuration and operation information is stored in the database and can be obtained through SNMP. Many administrators' misconfigurations will be exposed to Internet. Cackers will attempt to access the system using the default passwords public, private. They may experiment with all possible combinations. The SNMP packet may be incorrectly directed to the user's network.

Port: 177

Service: X

Display Manager Control

Protocol

Description: many intruders access the X-windows console through it, and it needs to open port 6000 at the same time.

Port: 389

Services: LDAP, ILS

Description: lightweight Directory access Protocol and NetMeeting

Internet Locator

Server shares this port.

Port: 443

Service: Https

Description: Web browsing port, can provide encryption and transmission through a secure port of another kind of HTTP.

Port: 456

Service: [NULL]

Description: Trojan HACKERS

PARADISE opens this port.

Port: 513

Service: Login,remote login

Description: from using cable

A broadcast from a UNIX computer that logs in to a modem or DSL. These people provide information for intruders to access their systems.

Port: 544

Service: [NULL]

Description: kerberos kshell

Port: 548

Service: Macintosh,File

Services (AFP/IP)

Description: Macintosh, file service.

Port: 553

Service: CORBA IIOP

(UDP)

Description: use cable

Modem, DSL, or VLAN will see the broadcast on this port. CORBA is an object-oriented RPC system. Intruders can use this information to enter the system.

Port: 555

Service: DSF

Description: Trojan PhAse1.0, Stealth

Spy and IniKiller open this port.

Port: 568

Service: Membership DPA

Description: membership

DPA .

Port: 569

Service: Membership MSN

Description: membership

MSN .

Port: 635

Service: mountd

Description: mountd of Linux

Bug . This is a popular BUG scanned. Most scans for this port are based on UDP, but TCP-based mountd has increased (mountd runs on both ports). Remember that mountd can run on any port (which port needs to be queried by portmap), except that the default port for Linux is 635, just as NFS usually runs on port 2049.

Port: 636

Service: LDAP

Description: SSL (Secure

Sockets layer)

Port: 666

Service: Doom Id Software

Description: Trojan Attack FTP, Satanz

Backdoor opens this port

Port: 993

Service: IMAP

Description: SSL (Secure Sockets

Layer)

Port: 1001, 1011

Service: [NULL]

Description: Trojan Silencer, WebEx open port 1001. Trojan Doly

Trojan opens port 1011.

Port: 1024

Service: Reserved

Description: it is the beginning of a dynamic port, and many programs do not care which port to use to connect to the network. They ask the system to assign them the next idle port. Based on this, the assignment starts at port 1024. This means that the first one to make a request to the system will be assigned to port 1024. You can restart the machine, open Telnet, and then open a window to run natstat

-a you will see that Telnet is assigned port 1024. And SQL.

Session also uses this port and port 5000.

Port: 1025, 1033

Service: 1025:network blackjack

1033: [NULL]

Description: Trojan netspy opens these 2 ports.

Port: 1080

Service: SOCKS

Description: this protocol passes through the firewall in a tunnel manner, allowing people behind the firewall to access the INTERNET through an IP address. In theory, it should only allow internal traffic to reach the INTERNET. However, due to misconfiguration, it allows attacks outside the firewall to pass through the firewall. This error often occurs in WinGate, and is often seen when joining IRC chat rooms.

Port: 1170

Service: [NULL]

Description: Trojan Streaming

Audio Trojan 、 Psyber Stream

Server and Voice open this port.

Ports: 1234, 1243, 6711, 6776

Service: [NULL]

Description: Trojan SubSeven2.0, Ultors

Trojan opens ports 1234 and 6776. Trojan SubSeven1.0/1.9 opens ports 1243, 6711 and 6776.

Port: 1245

Service: [NULL]

Description: Trojan Vodoo opens this port.

Port: 1433

Service: SQL

Description: the open port of Microsoft's SQL service.

Port: 1492

Service: stone-design-1

Description: Trojan FTP99CMP opens this port.

Port: 1500

Service: RPC

Client fixed port session

Queries

Description: RPC customer fixed port session query

Port: 1503

Service: NetMeeting

T.120

Description: NetMeeting

T.120

Port: 1524

Service: ingress

Note: many attack scripts will install a backdoor SHELL on this port, especially scripts aimed at Sendmail and RPC service vulnerabilities in SUN systems. If you see a connection attempt on this port as soon as you install the firewall, it is likely to be the above reason. Try Telnet to this port on the user's computer and see if it gives you a SHELL. There is also a problem with connecting to the 600/pcserver.

Port: 1600

Service: issd

Description: Trojan Shivka-Burka opens this port.

Port: 1720

Service: NetMeeting

Description: NetMeeting

H.233 call Setup .

Port: 1731

Service: NetMeeting Audio Call

Control

Description: NetMeeting audio call control.

Port: 1807

Service: [NULL]

Description: Trojan SpySender opens this port.

Port: 1981

Service: [NULL]

Description: Trojan ShockRave opens this port.

Port: 1999

Service: cisco

Identification

Port

Description: Trojan BackDoor opens this port.

Port: 2000

Service: [NULL]

Description: Trojan GirlFriend

1.3.The Millenium 1.0 opens this port.

Port: 2001

Service: [NULL]

Description: Trojan Millenium 1.0, Trojan

Cow opens this port.

Port: 2023

Service: xinuexpansion 4

Description: Trojan Pass

Ripper opens this port.

Port: 2049

Service: NFS

Description: NFS programs often run on this port. You usually need to access Portmapper to find out which port the service is running on.

Port: 2115

Service: [NULL]

Description: Trojan Bugs opens this port.

Port: 2140, 3150

Service: [NULL]

Description: Trojan Deep

Throat 1.0 hip 3.0 opens this port.

Port: 2500

Service: RPC client using a fixed port session

Replication

Description: RPC customers applying fixed port session replication

Port: 2583

Service: [NULL]

Description: Trojan Wincrash

2.0 Open this port.

Port: 2801

Service: [NULL]

Description: Trojan Phineas

Phucker opens this port.

Port: 3024, 4092

Service: [NULL]

Description: Trojan WinCrash opens this port.

Port: 3128

Service: squid

Description: this is squid

The default port for the HTTP proxy server. The attacker scanned this port to search for a proxy server and access Internet anonymously. You will also see ports 8000, 8001, 8080, 8888 searching for other proxy servers. Another reason to scan this port is that the user is entering a chat room. Other users will also verify this port to determine if the user's machine supports proxies.

Port: 3129

Service: [NULL]

Description: Trojan Master

Paradise opens this port.

Port: 3150

Service: [NULL]

Description: Trojan The

Invasor opens this port.

Port: 3210, 4321

Service: [NULL]

Description: Trojan SchoolBus opens this port

Port: 3333

Service: dec-notes

Description: Trojan Prosiak opens this port

Port: 3389

Services: hyperterminal

Description: WINDOWS

The 2000 terminal opens this port.

Port: 3700

Service: [NULL]

Description: Trojan Portal of

Doom opens this port

Port: 3996, 4060

Service: [NULL]

Description: Trojan RemoteAnything opens this port

Port: 4000

Services: QQ client

Description: Tencent QQ client opens this port.

Port: 4092

Service: [NULL]

Description: Trojan WinCrash opens this port.

Port: 4590

Service: [NULL]

Description: Trojan ICQTrojan opens this port.

Ports: 5000, 5001, 5321, 50505

Service: [NULL]

Description: Trojan blazer5 opens port 5000. Trojan Sockets

De

Troie opens ports 5000, 5001, 5321, and 50505.

Ports: 5400, 5401, 5402

Service: [NULL]

Description: Trojan Blade

Runner opens this port.

Port: 5550

Service: [NULL]

Description: Trojan xtcp opens this port.

Port: 5569

Service: [NULL]

Description: Trojan Robo-Hack opens this port.

Port: 5632

Service: pcAnywere

Description: sometimes you will see a lot of scans of this port, depending on the location of the user. When a user opens pcAnywere, it automatically scans the LAN Class C network for possible proxies (the proxy here refers to agent rather than proxy). Intruders will also look for computers that open the service. So you should check the source address of this scan Some scan packets searching for pcAnywere often contain UDP packets on port 22.

Port: 5742

Service: [NULL]

Description: Trojan WinCrash2.03 opens this port.

Port: 6267

Service: [NULL]

Description: Trojan horse Guangwai girls open this port.

Port: 6400

Service: [NULL]

Description: Trojan The

THing opens this port.

Port: 6670, 6671

Service: [NULL]

Description: Trojan Deep Throat opens port 6670. And Deep

Throat

3.0Open port 6671.

Port: 6883

Service: [NULL]

Description: Trojan DeltaSource opens this port.

Port: 6969

Service: [NULL]

Description: Trojan Gatecrasher, Priority open this port.

Port: 6970

Service: RealAudio

Description: RealAudio customers will receive audio data streams from the server's 6970-7170 UDP port. This is set by the TCP-7070 port outbound control connection.

Port: 7000

Service: [NULL]

Description: Trojan Remote

Grab opens this port.

Ports: 7300, 7301, 7306, 7307, 7308

Service: [NULL]

Description: Trojan NetMonitor opens this port. In addition, NetSpy1.0 also opens port 7306.

Port: 7323

Service: [NULL]

Description: Sygate server side.

Port: 7626

Service: [NULL]

Description: Trojan Giscier opens this port.

Port: 7789

Service: [NULL]

Description: Trojan ICKiller opens this port.

Port: 8000

Service: OICQ

Description: this port is open on Tencent QQ server.

Port: 8010

Service: Wingate

Description: the Wingate agent opens this port.

Port: 8080

Services: proxy port

Description: the WWW agent opens this port.

Ports: 9400, 9401, 9402

Service: [NULL]

Description: Trojan Incommand

1.0 Open this port.

Ports: 9872, 9873, 9874, 9875, 10067, 10167

Service: [NULL]

Description: Trojan Portal

Of

Doom opens this port.

Port: 9989

Service: [NULL]

Description: Trojan iNi-Killer opens this port.

Port: 11000

Service: [NULL]

Description: Trojan SennaSpy opens this port.

Port: 11223

Service: [NULL]

Description: Trojan Progenic

Trojan opens this port.

Port: 12076, 61466

Service: [NULL]

Description: Trojan Telecommando opens this port.

Port: 12223

Service: [NULL]

Description: Trojan Hack'99

KeyLogger opens this port.

Port: 12345, 12346

Service: [NULL]

Description: Trojan NetBus1.60/1.70, GabanBus open this port.

Port: 12361

Service: [NULL]

Description: Trojan Whack-a-mole opens this port.

Port: 13223

Service: PowWow

Description: PowWow is Tribal

Voice chat program. It allows users to open a private chat connection on this port. This program is very aggressive for establishing connections. It will be stationed on this TCP port to wait for a response. A connection request that causes a similar heartbeat interval. If a dial-up user inherits the IP address from another chatter, it seems that there are a lot of different people testing the port. This protocol uses OPNG as the first four bytes of its connection request.

Port: 16969

Service: [NULL]

Description: Trojan Priority opens this port.

Port: 17027

Service: Conducent

Description: this is an extroverted connection. This is because someone inside the company has installed shareware with Conducent "adbot". Conducent "adbot" is used to display ads for shareware. A popular software that uses this service is Pkware.

Port: 19191

Service: [NULL]

Description: Trojan Blue Flame opens this port.

Port: 20000, 20001

Service: [NULL]

Description: Trojan Millennium opens this port.

Port: 20034

Service: [NULL]

Description: Trojan NetBus

Pro opens this port.

Port: 21554

Service: [NULL]

Description: Trojan GirlFriend opens this port.

Port: 22222

Service: [NULL]

Description: Trojan Prosiak opens this port.

Port: 23456

Service: [NULL]

Description: Trojan Evil

FTP 、 Ugly

FTP opens this port.

Port: 26274, 47262

Service: [NULL]

Description: Trojan Delta opens this port.

Port: 27374

Service: [NULL]

Description: Trojan Subseven

2.1 Open this port.

Port: 30100

Service: [NULL]

Description: Trojan NetSphere opens this port.

Port: 30303

Service: [NULL]

Description: Trojan Socket23 opens this port.

Port: 30999

Service: [NULL]

Description: Trojan Kuang opens this port.

Port: 31337, 31338

Service: [NULL]

Description: Trojan BO (Back

Orifice) open this port. In addition, Trojan DeepBO also opens port 31338.

Port: 31339

Service: [NULL]

Description: Trojan NetSpy

DK opens this port.

Port: 31666

Service: [NULL]

Description: Trojan BOWhack opens this port.

Port: 33333

Service: [NULL]

Description: Trojan Prosiak opens this port.

Port: 34324

Service: [NULL]

Description: Trojan Tiny

Telnet Server, BigGluck, TN open this port.

Port: 40412

Service: [NULL]

Description: Trojan The

Spy opens this port.

Ports: 40421, 40422, 40423, 40426,

Service: [NULL]

Description: Trojan Masters

Paradise opens this port.

Port: 43210, 54321

Service: [NULL]

Description: Trojan SchoolBus

1.0 + 2.0 opens this port.

Port: 44445

Service: [NULL]

Description: Trojan Happypig opens this port.

Port: 50766

Service: [NULL]

Description: Trojan Fore opens this port.

Port: 53001

Service: [NULL]

Description: Trojan Remote

Windows Shutdown opens this port.

Port: 65000

Service: [NULL]

Description: Trojan Devil

1.03 Open this port.

Port: 88

Description: Kerberos

Krb5 . In addition, port 88 of TCP is also used for this purpose.

Port: 137

Description: SQL Named Pipes encryption over other

Protocols name lookup (SQL named pipe encryption technology on other protocol name lookups) and SQL RPC encryption over other

Protocols name lookup (SQL RPC encryption technology on other protocol name lookups) and Wins NetBT name service (WINS

This port is used by both NetBT name service) and Wins Proxy.

Port: 161

Description: Simple Network Management

Protocol (SMTP) (simple Network Management Protocol).

Port: 162

Description: SNMP

Trap (SNMP trap)

Port: 445

Description: Common Internet File

System (CIFS) (public Internet file system)

Port: 464

Description: Kerberos

Kpasswd (v5) In addition, port 464 of TCP is also used for this purpose.

Port: 500

Description: Internet Key

Exchange (IKE) (Internet key Exchange)

Port: 1645, 1812

Description: Remot Authentication

Dial-In User Service (RADIUS) authentication (Routing and Remote

Access) (remote Authentication Dial-up user Service)

Port: 1646, 1813

Description: RADIUS accounting (Routing and

Remote Access) (RADIUS Accounting (routing and remote access))

Port: 1701

Description: Layer Two Tunneling

Protocol (L2TP) (layer 2 tunneling Protocol)

Port: 1801, 3527

Description: Microsoft Message Queue

Server (Microsoft message queuing server). And TCP 135,1801, 2101, 2103, 2105 are also used for the same purpose.

Port: 2504

Description: Network

Load Balancing (Network load balancing)

Network layer-there is an important field called the protocol number in the packet format of the packet. For example, if it is a TCP connection at the transport layer, then the protocol number in the network layer IP packet will have a value of 6, and if it is UDP, that value will be 17-transport layer.

The transport layer-associated through the interface (the field of the port is called the port)-the application layer.

With netstat-an, you can see the port number that is open on this machine.

Common port of proxy server

(1)。 HTTP protocol proxy server commonly used port number: 808080Universe 3128According to 8081Universe 9080

(2)。 Common port number of SOCKS proxy protocol server: 1080

(3)。 FTP (File transfer) Protocol proxy server commonly used port number: 21

(4)。 Telnet (remote login) protocol proxy server common port: 23

HTTP server, default port number is 80/tcp (Trojan Executor opens this port)

HTTPS (securely transferring web pages) server, default port number is 443/tcp 443/udp

Telnet (unsecured text transfer). The default port number is 23/tcp (the port opened by Trojan Tiny Telnet Server).

FTP, the default port number is 21/tcp (ports opened by Trojans Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash and Blade Runner)

TFTP (Trivial File Transfer Protocol), the default port number is 69/udp

SSH (secure login), SCP (file transfer), port redirection. The default port number is 22/tcp.

SMTP Simple Mail Transfer Protocol (E-mail), the default port number is 25/tcp (Trojans Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, WinPC, WinSpy all open this port)

POP3 Post Office Protocol (E-mail), the default port number is 110/tcp

WebLogic, the default port number is 7001

Webshpere application, the default port number is 9080

Webshpere management tool, the default port number is 9090

JBOSS, the default port number is 8080

TOMCAT, the default port number is 8080

WIN2003 remote login. The default port number is 3389.

Symantec AV/Filter for MSE, default port number is 8081

Oracle database, default port number is 1521

ORACLE EMCTL, the default port number is 1158

Oracle XDB (XML database), the default port number is 8080

Oracle XDB FTP service, default port number is 2100

MS SQL*SERVER database server, default port number is 1433/tcp 1433/udp

MS SQL*SERVER database monitor, default port number is 1434/tcp 1434/udp

QQ, the default port number is 1080/udp

TcpMux0 1 Tcp Port Service Multiplexer

Echo 1 7 echo (echo sends back all received data)

Discard2 9 Delete (statically delete all accepted data)

Systat3 11 current user

Daytime 13 during the day

Daily references to Quotd 17

Chargen 19 generates characters

Ftp-data 20

File transfer (default data)

Ftp 21 file transfer (control port)

Telnet 23 remote communication network

Smtp 25 simple Mail transfer Protocol

Time 37 time

Nicname 43 who?

Domain 53 Domain name Server

Bootps 67 Bootstrapper Protocol Server

Bootpc 68

Bootstrap protocol client

Tftp 69 Common File transfer Protocol

Gopher 70 Gopher

Finger 79 dialing

WWW-http 80 WWW-Http

Kerberos 88

Kerberos

Pop2 109Postal Protocol version 2

Pop3 110Postal Protocol version 3

Sunrpc 111Sun running program call

Nntp 119Network News transfer Protocol

Ntp 123Network time Protocol

Netbios-ns 137Network basic input and output system naming Service

Netbios-ns 138

Datagram service of network basic input and output system

Netbios-ssn 139network basic input and output system period service

Imap2 143

Intermediate Mail access Protocol V2

Snmp 161simple Network Management Protocol

Bgp 179 Border Gateway Protocol

Syslog 514 system lander

Is it helpful for you to read the above content? If you want to know more about the relevant knowledge or read more related articles, please follow the industry information channel, thank you for your support.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Development

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report