| 
   Port 1028 Detailsknown port assignments and vulnerabilities
 
threat/application/port search:
 
5 records found
| 
  
	| Port(s) | Protocol | Service | Details | Source |  
  | 1028 | tcp | trojan | DataSpy Network X, Dosh, Gibbon, KiLo, KWM, Litmus, Paltalk, SubSARI | Trojans |  
  | 1028 | udp | trojan | KiLo, SubSARI | Trojans |  
  | 1028 | udp | ms-lsa | ms-lsa | Nmap |  
  | 1028 | tcp,udp |  | Deprecated, modified: 2004-02 | IANA |  
  | 1025-1029 | tcp,udp | nfc-iis | Ports > 1024 are designated for dynamic allocation by Windows. When programs ask for the "next available" socket, they usually get sequential ports starting at 1025. 
 Ports 1026-1027/udp were historically used for Windows Messenger popup spam
 | SG |  |  |