Port 1973 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
1973 |
tcp |
worm |
W32.Sonic.Worm [Symantec-2000-122113-0301-99] (2000.10.09) - an email worm that appears to have originated in France. The worm emails itself to addresses in the Windows address book. Once executed, the worm attempts to download additional files, including commercial .dll files that provide emailing routines and an updated version of the worm.
Backdoor.Win32.Small.bu (KGB- RAT server v0.1) / Unauthenticated Remote Command Execution - the KGB- RAT malware listens on TCP port 1973. Third-party attackers who can reach infected systems can run commands made available by the backdoor, or run the "view" command to passively read screendump information. The malware writes its screendump info to a file named "log.log".
References: [MVID-2022-0479]
Data Link Switching Remote Access Protocol (IANA official) |
SG
|
1973 |
tcp,udp |
dlsrap |
Data Link Switching Remote Access Protocol |
IANA
|
|
2 records found
|