In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/01 Report--
What are the common Linux service port numbers, many novices are not very clear about this, in order to help you solve this problem, the following editor will explain for you in detail, people with this need can come to learn, I hope you can gain something.
The port in the software field generally refers to the communication protocol port for connected service and connectionless service in the network. it is a kind of abstract software structure, including some data structures and Igamo (basic input and output) buffer.
Linux common service port number
A computer has a maximum of 65535 ports, which cannot be duplicated.
Common port number:
IIS (HTTP): 80
SQLServer:1433
Oracle:1521
MySQL:3306
FTP:21
SSH:22
Tomcat:8080
Telnet: 23
List of commonly used and uncommonly used ports
Port: 0
Service: Reserved
Description: commonly used to analyze the operating system. This method works because "0" is an invalid port in some systems, which will produce different results when you try to connect it using the usual closed port. A typical scan that uses an IP address of 0.0.0.0, sets the ACK bit and broadcasts at the Ethernet layer.
Port: 1
Service: tcpmux
Explanation: this shows that someone is looking for SGI
Irix machine. Irix is the primary provider for implementing tcpmux, and tcpmux is turned on by default in such a system. When publishing Irix machines, there are several default accounts without passwords, such as IP, GUEST
UUCP 、 NUUCP 、 DEMOS
, TUTOR, DIAG, OUTOFBOX, etc. Many administrators forget to delete these accounts after installation. So HACKER searches for tcpmux on INTERNET and leverages these accounts.
Port: 7
Service: Echo
Description: you can see the messages sent to X.X.X.0 and X.X.X.255 when many people search for Fraggle amplifiers.
Port: 19
Service: Character
Generator
Description: this is a service that only sends characters. The UDP version will respond to packets containing junk characters when they receive UDP packets. When TCP connects, it sends a data stream with junk characters until the connection is closed. HACKER uses IP spoofing to launch DoS attacks. Forge UDP packets between two chargen servers. Same Fraggle
The DoS attack broadcasts a packet with a bogus victim IP to this port of the target address, and the victim overloads in response to the data.
Port: 21
Service: FTP
Description: the port opened by FTP server for uploading and downloading. The most common method used by attackers to find the FTP server that opens anonymous. These servers have directories that can be read and written. Trojan Doly
Trojan, Fore, Invisible FTP, WebEx, WinCrash and Blade
The port opened by the Runner.
Port: 22
Service: Ssh
Note: the connection between the TCP established by PcAnywhere and this port may be to find ssh. This service has many weaknesses, and if configured in a specific mode, many versions that use the RSAREF library will have a number of vulnerabilities.
Port: 23
Service: Telnet
Description: remote login, intruders in the search for remote login UNIX services. In most cases, this port is scanned to find the operating system on which the machine is running. Using other techniques, the intruder will also find the password. Trojan Tiny
Telnet
Server opens this port.
Port: 25
Service: SMTP
Description: the port opened by the SMTP server for sending mail. Intruders look for SMTP servers to pass their SPAM. The intruder's account is closed and they need to connect to a high-bandwidth E-MAIL server and pass simple messages to different addresses. Trojans Antigen, Email
Password Sender 、 Haebu Coceda 、 Shtrilitz
Stealth, WinPC, and WinSpy all open this port.
Port: 31
Service: MSG
Authentication
Description: Trojan Master Paradise, Hackers
Paradise opens this port.
Port: 42
Service: WINS
Replication
Description: WINS replication
Port: 53
Service: Domain Name
Server (DNS)
Description: the port opened by the DNS server, the intruder may be trying to TCP, deceive DNS (UDP) or hide other communications. Therefore, firewalls often filter or record this port.
Port: 67
Service: Bootstrap
Protocol Server
Description: through DSL and Cable
Modem firewalls often see large amounts of data sent to the broadcast address 255.255.255.255. These machines are requesting an address from the DHCP server. HACKER often enters them, assigns an address to use itself as a local router and launches a large number of man-in-the-middle (man-in-middle) attacks. The client broadcasts the configuration to port 68, and the server broadcasts the echo request to port 67. This response uses a broadcast because the client does not yet know the IP address that can be sent.
DHCP (UDP ports 67 and 68)
Port: 69
Service: Trival
File
Transfer
Description: many servers provide this service along with bootp to make it easy to download startup code from the system. But they are often misconfigured to enable intruders to steal any file from the system. They can also be used by the system to write files.
Port: 79
Service: Finger
Server
Description: intruders are used to obtain user information, query the operating system, detect known buffer overflow errors, and respond to Finger scans from their machines to other machines.
Port: 80
Service: HTTP
Description: for web browsing. Trojan Executor opens this port.
Port: 99
Service: Metagram
Relay
Description: the backdoor program ncx99 opens this port.
Port: 102
Service: Message transfer
Agent (MTA)-X.400 over TCP/IP
Description: message transfer agent.
Port: 109
Service: Post Office
Protocol
-Version3
Description: the POP3 server opens this port for receiving mail, and the client accesses the server-side mail service. POP3 services have many recognized weaknesses. There are at least 20 weaknesses in the username and password exchange buffer overflow, which means that intruders can enter the system before actually logging in. There are other buffer overflow errors after a successful login.
Port: 110
Services: all ports of SUN's RPC service
Description: common RPC services include rpc.mountd, NFS, rpc.statd, rpc.csmd, rpc.ttybd, amd, etc.
Port: 113
Service: Authentication
Service
Description: this is a protocol that runs on many computers and is used to authenticate users with TCP connections. Using the standard service, you can get a lot of information about computers. But it can be used as a logger for many services, especially FTP, POP, IMAP, SMTP, and IRC. Usually if many customers access these services through firewalls, they will see many connection requests for this port. Remember, if you block this port, the client will feel a slow connection to the E-MAIL server on the other side of the firewall. Many firewalls support sending back RST during the blocking of TCP connections. This will stop the slow connection.
Port: 119
Service: Network
News Transfer
Protocol
Description: NEWS newsgroup transport protocol, carrying USENET communications. The connection to this port is usually people looking for a USENET server. Most ISP restricts access to their newsgroup servers only to their customers. Turning on the newsgroup server will allow anyone to post / read posts, access to restricted newsgroup servers, post anonymously or send SPAM.
Port: 135
Service: Location
Service
Description: Microsoft runs DCE RPC end-point mapper on this port for its DCOM service. This is similar to UNIX.
The functions of port 111 are similar. Services that use DCOM and RPC take advantage of end-point on computers
Mapper registers their location. When remote customers connect to the computer, they look for end-point
Mapper finds the location of the service. HACKER scans this port of the computer to find the Exchange running on this computer
Server? What version? There are also some DOS attacks that target this port directly.
Ports: 137, 138, 139
Service: NETBIOS Name
Service
Description: 137,138 are UDP ports, which are used when transferring files through network neighbors. The connection of port 139 through this port attempts to get the NetBIOS/SMB service. This protocol is used for windows file and printer sharing and SAMBA. And WINS.
Regisrtation also uses it.
Port: 143
Service: Interim Mail Access Protocol
V2
Note: like the security issues of POP3, many IMAP servers have buffer overflow vulnerabilities. Remember: a Linux worm (admv0rm) propagates through this port, so many of the scans on this port come from unwitting infected users. These vulnerabilities became popular when REDHAT allowed IMAP by default in their LINUX release. This port is also used for IMAP2, but it is not popular.
Port: 161
Service: SNMP
Description: SNMP allows remote management of devices. All configuration and operation information is stored in the database and can be obtained through SNMP. Many administrators' misconfigurations will be exposed to Internet. Cackers will attempt to access the system using the default passwords public, private. They may experiment with all possible combinations. The SNMP packet may be incorrectly directed to the user's network.
Port: 177
Service: X
Display Manager Control
Protocol
Description: many intruders access the X-windows console through it, and it needs to open port 6000 at the same time.
Port: 389
Services: LDAP, ILS
Description: lightweight Directory access Protocol and NetMeeting
Internet Locator
Server shares this port.
Port: 443
Service: Https
Description: Web browsing port, can provide encryption and transmission through a secure port of another kind of HTTP.
Port: 456
Service: [NULL]
Description: Trojan HACKERS
PARADISE opens this port.
Port: 513
Service: Login,remote login
Description: from using cable
A broadcast from a UNIX computer that logs in to a modem or DSL. These people provide information for intruders to access their systems.
Port: 544
Service: [NULL]
Description: kerberos kshell
Port: 548
Service: Macintosh,File
Services (AFP/IP)
Description: Macintosh, file service.
Port: 553
Service: CORBA IIOP
(UDP)
Description: use cable
Modem, DSL, or VLAN will see the broadcast on this port. CORBA is an object-oriented RPC system. Intruders can use this information to enter the system.
Port: 555
Service: DSF
Description: Trojan PhAse1.0, Stealth
Spy and IniKiller open this port.
Port: 568
Service: Membership DPA
Description: membership
DPA .
Port: 569
Service: Membership MSN
Description: membership
MSN .
Port: 635
Service: mountd
Description: mountd of Linux
Bug . This is a popular BUG scanned. Most scans for this port are based on UDP, but TCP-based mountd has increased (mountd runs on both ports). Remember that mountd can run on any port (which port needs to be queried by portmap), except that the default port for Linux is 635, just as NFS usually runs on port 2049.
Port: 636
Service: LDAP
Description: SSL (Secure
Sockets layer)
Port: 666
Service: Doom Id Software
Description: Trojan Attack FTP, Satanz
Backdoor opens this port
Port: 993
Service: IMAP
Description: SSL (Secure Sockets
Layer)
Port: 1001, 1011
Service: [NULL]
Description: Trojan Silencer, WebEx open port 1001. Trojan Doly
Trojan opens port 1011.
Port: 1024
Service: Reserved
Description: it is the beginning of a dynamic port, and many programs do not care which port to use to connect to the network. They ask the system to assign them the next idle port. Based on this, the assignment starts at port 1024. This means that the first one to make a request to the system will be assigned to port 1024. You can restart the machine, open Telnet, and then open a window to run natstat
-a you will see that Telnet is assigned port 1024. And SQL.
Session also uses this port and port 5000.
Port: 1025, 1033
Service: 1025:network blackjack
1033: [NULL]
Description: Trojan netspy opens these 2 ports.
Port: 1080
Service: SOCKS
Description: this protocol passes through the firewall in a tunnel manner, allowing people behind the firewall to access the INTERNET through an IP address. In theory, it should only allow internal traffic to reach the INTERNET. However, due to misconfiguration, it allows attacks outside the firewall to pass through the firewall. This error often occurs in WinGate, and is often seen when joining IRC chat rooms.
Port: 1170
Service: [NULL]
Description: Trojan Streaming
Audio Trojan 、 Psyber Stream
Server and Voice open this port.
Ports: 1234, 1243, 6711, 6776
Service: [NULL]
Description: Trojan SubSeven2.0, Ultors
Trojan opens ports 1234 and 6776. Trojan SubSeven1.0/1.9 opens ports 1243, 6711 and 6776.
Port: 1245
Service: [NULL]
Description: Trojan Vodoo opens this port.
Port: 1433
Service: SQL
Description: the open port of Microsoft's SQL service.
Port: 1492
Service: stone-design-1
Description: Trojan FTP99CMP opens this port.
Port: 1500
Service: RPC
Client fixed port session
Queries
Description: RPC customer fixed port session query
Port: 1503
Service: NetMeeting
T.120
Description: NetMeeting
T.120
Port: 1524
Service: ingress
Note: many attack scripts will install a backdoor SHELL on this port, especially scripts aimed at Sendmail and RPC service vulnerabilities in SUN systems. If you see a connection attempt on this port as soon as you install the firewall, it is likely to be the above reason. Try Telnet to this port on the user's computer and see if it gives you a SHELL. There is also a problem with connecting to the 600/pcserver.
Port: 1600
Service: issd
Description: Trojan Shivka-Burka opens this port.
Port: 1720
Service: NetMeeting
Description: NetMeeting
H.233 call Setup .
Port: 1731
Service: NetMeeting Audio Call
Control
Description: NetMeeting audio call control.
Port: 1807
Service: [NULL]
Description: Trojan SpySender opens this port.
Port: 1981
Service: [NULL]
Description: Trojan ShockRave opens this port.
Port: 1999
Service: cisco
Identification
Port
Description: Trojan BackDoor opens this port.
Port: 2000
Service: [NULL]
Description: Trojan GirlFriend
1.3.The Millenium 1.0 opens this port.
Port: 2001
Service: [NULL]
Description: Trojan Millenium 1.0, Trojan
Cow opens this port.
Port: 2023
Service: xinuexpansion 4
Description: Trojan Pass
Ripper opens this port.
Port: 2049
Service: NFS
Description: NFS programs often run on this port. You usually need to access Portmapper to find out which port the service is running on.
Port: 2115
Service: [NULL]
Description: Trojan Bugs opens this port.
Port: 2140, 3150
Service: [NULL]
Description: Trojan Deep
Throat 1.0 hip 3.0 opens this port.
Port: 2500
Service: RPC client using a fixed port session
Replication
Description: RPC customers applying fixed port session replication
Port: 2583
Service: [NULL]
Description: Trojan Wincrash
2.0 Open this port.
Port: 2801
Service: [NULL]
Description: Trojan Phineas
Phucker opens this port.
Port: 3024, 4092
Service: [NULL]
Description: Trojan WinCrash opens this port.
Port: 3128
Service: squid
Description: this is squid
The default port for the HTTP proxy server. The attacker scanned this port to search for a proxy server and access Internet anonymously. You will also see ports 8000, 8001, 8080, 8888 searching for other proxy servers. Another reason to scan this port is that the user is entering a chat room. Other users will also verify this port to determine if the user's machine supports proxies.
Port: 3129
Service: [NULL]
Description: Trojan Master
Paradise opens this port.
Port: 3150
Service: [NULL]
Description: Trojan The
Invasor opens this port.
Port: 3210, 4321
Service: [NULL]
Description: Trojan SchoolBus opens this port
Port: 3333
Service: dec-notes
Description: Trojan Prosiak opens this port
Port: 3389
Services: hyperterminal
Description: WINDOWS
The 2000 terminal opens this port.
Port: 3700
Service: [NULL]
Description: Trojan Portal of
Doom opens this port
Port: 3996, 4060
Service: [NULL]
Description: Trojan RemoteAnything opens this port
Port: 4000
Services: QQ client
Description: Tencent QQ client opens this port.
Port: 4092
Service: [NULL]
Description: Trojan WinCrash opens this port.
Port: 4590
Service: [NULL]
Description: Trojan ICQTrojan opens this port.
Ports: 5000, 5001, 5321, 50505
Service: [NULL]
Description: Trojan blazer5 opens port 5000. Trojan Sockets
De
Troie opens ports 5000, 5001, 5321, and 50505.
Ports: 5400, 5401, 5402
Service: [NULL]
Description: Trojan Blade
Runner opens this port.
Port: 5550
Service: [NULL]
Description: Trojan xtcp opens this port.
Port: 5569
Service: [NULL]
Description: Trojan Robo-Hack opens this port.
Port: 5632
Service: pcAnywere
Description: sometimes you will see a lot of scans of this port, depending on the location of the user. When a user opens pcAnywere, it automatically scans the LAN Class C network for possible proxies (the proxy here refers to agent rather than proxy). Intruders will also look for computers that open the service. So you should check the source address of this scan Some scan packets searching for pcAnywere often contain UDP packets on port 22.
Port: 5742
Service: [NULL]
Description: Trojan WinCrash2.03 opens this port.
Port: 6267
Service: [NULL]
Description: Trojan horse Guangwai girls open this port.
Port: 6400
Service: [NULL]
Description: Trojan The
THing opens this port.
Port: 6670, 6671
Service: [NULL]
Description: Trojan Deep Throat opens port 6670. And Deep
Throat
3.0Open port 6671.
Port: 6883
Service: [NULL]
Description: Trojan DeltaSource opens this port.
Port: 6969
Service: [NULL]
Description: Trojan Gatecrasher, Priority open this port.
Port: 6970
Service: RealAudio
Description: RealAudio customers will receive audio data streams from the server's 6970-7170 UDP port. This is set by the TCP-7070 port outbound control connection.
Port: 7000
Service: [NULL]
Description: Trojan Remote
Grab opens this port.
Ports: 7300, 7301, 7306, 7307, 7308
Service: [NULL]
Description: Trojan NetMonitor opens this port. In addition, NetSpy1.0 also opens port 7306.
Port: 7323
Service: [NULL]
Description: Sygate server side.
Port: 7626
Service: [NULL]
Description: Trojan Giscier opens this port.
Port: 7789
Service: [NULL]
Description: Trojan ICKiller opens this port.
Port: 8000
Service: OICQ
Description: this port is open on Tencent QQ server.
Port: 8010
Service: Wingate
Description: the Wingate agent opens this port.
Port: 8080
Services: proxy port
Description: the WWW agent opens this port.
Ports: 9400, 9401, 9402
Service: [NULL]
Description: Trojan Incommand
1.0 Open this port.
Ports: 9872, 9873, 9874, 9875, 10067, 10167
Service: [NULL]
Description: Trojan Portal
Of
Doom opens this port.
Port: 9989
Service: [NULL]
Description: Trojan iNi-Killer opens this port.
Port: 11000
Service: [NULL]
Description: Trojan SennaSpy opens this port.
Port: 11223
Service: [NULL]
Description: Trojan Progenic
Trojan opens this port.
Port: 12076, 61466
Service: [NULL]
Description: Trojan Telecommando opens this port.
Port: 12223
Service: [NULL]
Description: Trojan Hack'99
KeyLogger opens this port.
Port: 12345, 12346
Service: [NULL]
Description: Trojan NetBus1.60/1.70, GabanBus open this port.
Port: 12361
Service: [NULL]
Description: Trojan Whack-a-mole opens this port.
Port: 13223
Service: PowWow
Description: PowWow is Tribal
Voice chat program. It allows users to open a private chat connection on this port. This program is very aggressive for establishing connections. It will be stationed on this TCP port to wait for a response. A connection request that causes a similar heartbeat interval. If a dial-up user inherits the IP address from another chatter, it seems that there are a lot of different people testing the port. This protocol uses OPNG as the first four bytes of its connection request.
Port: 16969
Service: [NULL]
Description: Trojan Priority opens this port.
Port: 17027
Service: Conducent
Description: this is an extroverted connection. This is because someone inside the company has installed shareware with Conducent "adbot". Conducent "adbot" is used to display ads for shareware. A popular software that uses this service is Pkware.
Port: 19191
Service: [NULL]
Description: Trojan Blue Flame opens this port.
Port: 20000, 20001
Service: [NULL]
Description: Trojan Millennium opens this port.
Port: 20034
Service: [NULL]
Description: Trojan NetBus
Pro opens this port.
Port: 21554
Service: [NULL]
Description: Trojan GirlFriend opens this port.
Port: 22222
Service: [NULL]
Description: Trojan Prosiak opens this port.
Port: 23456
Service: [NULL]
Description: Trojan Evil
FTP 、 Ugly
FTP opens this port.
Port: 26274, 47262
Service: [NULL]
Description: Trojan Delta opens this port.
Port: 27374
Service: [NULL]
Description: Trojan Subseven
2.1 Open this port.
Port: 30100
Service: [NULL]
Description: Trojan NetSphere opens this port.
Port: 30303
Service: [NULL]
Description: Trojan Socket23 opens this port.
Port: 30999
Service: [NULL]
Description: Trojan Kuang opens this port.
Port: 31337, 31338
Service: [NULL]
Description: Trojan BO (Back
Orifice) open this port. In addition, Trojan DeepBO also opens port 31338.
Port: 31339
Service: [NULL]
Description: Trojan NetSpy
DK opens this port.
Port: 31666
Service: [NULL]
Description: Trojan BOWhack opens this port.
Port: 33333
Service: [NULL]
Description: Trojan Prosiak opens this port.
Port: 34324
Service: [NULL]
Description: Trojan Tiny
Telnet Server, BigGluck, TN open this port.
Port: 40412
Service: [NULL]
Description: Trojan The
Spy opens this port.
Ports: 40421, 40422, 40423, 40426,
Service: [NULL]
Description: Trojan Masters
Paradise opens this port.
Port: 43210, 54321
Service: [NULL]
Description: Trojan SchoolBus
1.0 + 2.0 opens this port.
Port: 44445
Service: [NULL]
Description: Trojan Happypig opens this port.
Port: 50766
Service: [NULL]
Description: Trojan Fore opens this port.
Port: 53001
Service: [NULL]
Description: Trojan Remote
Windows Shutdown opens this port.
Port: 65000
Service: [NULL]
Description: Trojan Devil
1.03 Open this port.
Port: 88
Description: Kerberos
Krb5 . In addition, port 88 of TCP is also used for this purpose.
Port: 137
Description: SQL Named Pipes encryption over other
Protocols name lookup (SQL named pipe encryption technology on other protocol name lookups) and SQL RPC encryption over other
Protocols name lookup (SQL RPC encryption technology on other protocol name lookups) and Wins NetBT name service (WINS
This port is used by both NetBT name service) and Wins Proxy.
Port: 161
Description: Simple Network Management
Protocol (SMTP) (simple Network Management Protocol).
Port: 162
Description: SNMP
Trap (SNMP trap)
Port: 445
Description: Common Internet File
System (CIFS) (public Internet file system)
Port: 464
Description: Kerberos
Kpasswd (v5) In addition, port 464 of TCP is also used for this purpose.
Port: 500
Description: Internet Key
Exchange (IKE) (Internet key Exchange)
Port: 1645, 1812
Description: Remot Authentication
Dial-In User Service (RADIUS) authentication (Routing and Remote
Access) (remote Authentication Dial-up user Service)
Port: 1646, 1813
Description: RADIUS accounting (Routing and
Remote Access) (RADIUS Accounting (routing and remote access))
Port: 1701
Description: Layer Two Tunneling
Protocol (L2TP) (layer 2 tunneling Protocol)
Port: 1801, 3527
Description: Microsoft Message Queue
Server (Microsoft message queuing server). And TCP 135,1801, 2101, 2103, 2105 are also used for the same purpose.
Port: 2504
Description: Network
Load Balancing (Network load balancing)
Network layer-there is an important field called the protocol number in the packet format of the packet. For example, if it is a TCP connection at the transport layer, then the protocol number in the network layer IP packet will have a value of 6, and if it is UDP, that value will be 17-transport layer.
The transport layer-associated through the interface (the field of the port is called the port)-the application layer.
With netstat-an, you can see the port number that is open on this machine.
Common port of proxy server
(1)。 HTTP protocol proxy server commonly used port number: 808080Universe 3128According to 8081Universe 9080
(2)。 Common port number of SOCKS proxy protocol server: 1080
(3)。 FTP (File transfer) Protocol proxy server commonly used port number: 21
(4)。 Telnet (remote login) protocol proxy server common port: 23
HTTP server, default port number is 80/tcp (Trojan Executor opens this port)
HTTPS (securely transferring web pages) server, default port number is 443/tcp 443/udp
Telnet (unsecured text transfer). The default port number is 23/tcp (the port opened by Trojan Tiny Telnet Server).
FTP, the default port number is 21/tcp (ports opened by Trojans Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash and Blade Runner)
TFTP (Trivial File Transfer Protocol), the default port number is 69/udp
SSH (secure login), SCP (file transfer), port redirection. The default port number is 22/tcp.
SMTP Simple Mail Transfer Protocol (E-mail), the default port number is 25/tcp (Trojans Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, WinPC, WinSpy all open this port)
POP3 Post Office Protocol (E-mail), the default port number is 110/tcp
WebLogic, the default port number is 7001
Webshpere application, the default port number is 9080
Webshpere management tool, the default port number is 9090
JBOSS, the default port number is 8080
TOMCAT, the default port number is 8080
WIN2003 remote login. The default port number is 3389.
Symantec AV/Filter for MSE, default port number is 8081
Oracle database, default port number is 1521
ORACLE EMCTL, the default port number is 1158
Oracle XDB (XML database), the default port number is 8080
Oracle XDB FTP service, default port number is 2100
MS SQL*SERVER database server, default port number is 1433/tcp 1433/udp
MS SQL*SERVER database monitor, default port number is 1434/tcp 1434/udp
QQ, the default port number is 1080/udp
TcpMux0 1 Tcp Port Service Multiplexer
Echo 1 7 echo (echo sends back all received data)
Discard2 9 Delete (statically delete all accepted data)
Systat3 11 current user
Daytime 13 during the day
Daily references to Quotd 17
Chargen 19 generates characters
Ftp-data 20
File transfer (default data)
Ftp 21 file transfer (control port)
Telnet 23 remote communication network
Smtp 25 simple Mail transfer Protocol
Time 37 time
Nicname 43 who?
Domain 53 Domain name Server
Bootps 67 Bootstrapper Protocol Server
Bootpc 68
Bootstrap protocol client
Tftp 69 Common File transfer Protocol
Gopher 70 Gopher
Finger 79 dialing
WWW-http 80 WWW-Http
Kerberos 88
Kerberos
Pop2 109Postal Protocol version 2
Pop3 110Postal Protocol version 3
Sunrpc 111Sun running program call
Nntp 119Network News transfer Protocol
Ntp 123Network time Protocol
Netbios-ns 137Network basic input and output system naming Service
Netbios-ns 138
Datagram service of network basic input and output system
Netbios-ssn 139network basic input and output system period service
Imap2 143
Intermediate Mail access Protocol V2
Snmp 161simple Network Management Protocol
Bgp 179 Border Gateway Protocol
Syslog 514 system lander
Is it helpful for you to read the above content? If you want to know more about the relevant knowledge or read more related articles, please follow the industry information channel, thank you for your support.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.