Port 3030 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
3030 |
tcp |
trojans |
NetPanzer uses port 3030 (TCP/UDP).
W32.Mytob.ET@mm [Symantec-2005-061516-3312-99] (2005.06.15) - mass-mailing worm with backdoor capabilities. Uses its own SMTP engine to spread. Connects to an IRC server and listens for remote commands on port 3030/tcp.
Backdoor.Slao [Symantec-2003-052610-2111-99] (2003.05.26) - a backdoor trojan horse that allows unauthorized access to an infected computer.
Port also used by the W32.Mytob.EQ, W32.Mytob.cz@mm [Symantec-2005-060214-2034-99] variants of the worm.
IANA registered for: Arepa Cas (TCP/UDP) |
SG
|
3030 |
tcp,udp |
|
NetPanzer (unofficial) |
Wikipedia
|
2000-2001, 2038, 2050, 2051, 2069, 2085, 3010, 3030 |
tcp |
applications |
ICUII |
Portforward
|
3030 |
tcp |
threat |
W32.Mytob |
Bekkoame
|
3030 |
tcp,udp |
arepa-cas |
Arepa Cas |
IANA
|
|
5 records found
Related ports: 3131 3232 3333 3434
|