Port 1028 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
1028 |
tcp |
trojan |
DataSpy Network X, Dosh, Gibbon, KiLo, KWM, Litmus, Paltalk, SubSARI |
Trojans
|
1028 |
udp |
trojan |
KiLo, SubSARI |
Trojans
|
1028 |
udp |
ms-lsa |
ms-lsa |
Nmap
|
1028 |
tcp,udp |
|
Deprecated, modified: 2004-02 |
IANA
|
1025-1029 |
tcp,udp |
nfc-iis |
Ports > 1024 are designated for dynamic allocation by Windows. When programs ask for the "next available" socket, they usually get sequential ports starting at 1025.
Ports 1026-1027/udp were historically used for Windows Messenger popup spam |
SG
|
|
5 records found
|