Port 4661 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
4661 |
tcp |
trojans |
Trojan.Gamqowi [Symantec-2005-102012-4020-99] (2005.10.20) - a backdoor trojan that lowers security settings on the compromised computer. It blocks access to some security-related websites, and attempts to end security-related processes. Opens a backdoor and listens for remote commands by connecting to an IRC server on port 4661/tcp.
Nemog backdoor (discovered 2004.08.16) - a backdoor trojan horse that allows an infected computer to be used as an email relay and HTTP proxy, dropped by W32.Mydoom.Q@mm.
It can use one of the following ports: 3306,4242,4646,4661,6565,8080
Port used by aMule and eMule p2p file sharing (eDonkey server default listening port). eMule p2p file sharing software uses ports 4661/tcp, 4662/tcp, 4665/udp, 4672/udp, 4711/tcp (web interface) by default. Some versions of this P2P client are vulnerable to a DecodeBase16 buffer overflow. |
SG
|
4661 |
tcp |
eDonkey2000 |
eDonkey2000 Server Default Port |
SANS
|
4661 |
tcp |
threat |
Nemog |
Bekkoame
|
4661 |
tcp,udp |
kar2ouche |
Kar2ouche Peer location service |
IANA
|
|
4 records found
Related ports: 3306 4242 4662 4646 4663 4665 6565
|