speedguide.net  

Port 33333 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
33333 tcp trojans W32.Zotob.C@mm [Symantec-2005-081516-4417-99] - a mass-mailing worm that opens a backdoor and exploits the MS Plug and Play Buffer Overflow vulnerability (MS Security Bulletin [MS05-039]) on port 445/tcp. It connects to IRC servers and listens for remote commands on port 8080/tcp. It also opens an FTP server on port 33333/tcp. Same ports are used by the W32.Zotob.A and W32.Zotob.B variants of the worm as well.

Backdoor.Selka [Symantec-2004-111222-0435-99] - backdoor program, affects Windows, listens on port 33333.

Other trojans/backdoors that also use this port: Blakharaz, Prosiak

Port is IANA registered for Digital Gaslight Service.
SG
33333 tcp trojan [trojan] Prosiak Trojans
33333 tcp Blakharaz [trojan] Blakharaz SANS
33333 tcp Prosiak [trojan] Prosiak SANS
33333 tcp threat Selka Bekkoame
33333 tcp threat W32.Zotob Bekkoame
33333 tcp dgi-serv Digital Gaslight Service, registered 2010-03-02 IANA
33333 udp Reserved IANA
8 records found

Related ports: 445  8080  

News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About