Port 5232 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
5232 |
tcp |
trojans |
Backdoor.Lateda.C [Symantec-2005-033112-4545-99] (2005.03.31) - backdoor trojan with remote access capabilities. Connects to an IRC server on the l33t.freeshellz.org domain on port 5232/tcp, opens a backdoor on port 9999/tcp.
W32.Mytob.EP@mm [Symantec-2005-061413-5518-99] (2005.06.14) - mass mailing worm that uses its own SMTP engine. Opens a backdoor and listens for remote commands via IRC on this port.
W32.Spybot.UBH [Symantec-2005-081412-4342-99] (2005.08.14) - a worm with backdoor and distributed denial of service (DDoS) capabilities. Spreads by exploiting the MS Plug and Play Buffer Overflow vulnerability ([MS05-039]).
Opens a backdoor and listens for remote commands via IRC on this port.
The presence of the Distributed GL Daemon (dgld) service on port 5232 on SGI IRIX systems allows remote attackers to identify the target host as an SGI system.
References: [CVE-2000-0893]
Silicon Graphics Distributed Graphics Library daemon
Cruse Scanning System Service (IANA official) |
SG
|
5232 |
tcp |
sgi-dgl |
SGI Distributed Graphics |
SANS
|
5232 |
tcp |
sgi-dgl |
SGI Distributed Graphics |
Nmap
|
5232 |
tcp |
threat |
Lateda |
Bekkoame
|
5232 |
tcp |
threat |
W32.Mytob |
Bekkoame
|
5232 |
tcp |
threat |
W32.Spybot |
Bekkoame
|
5232 |
tcp |
csedaemon |
Cruse Scanning System Service, registered 2011-03-09 |
IANA
|
5232 |
udp |
|
Reserved |
IANA
|
5120-5300 |
udp |
applications |
Neverwinter Nights 2 |
Portforward
|
|
9 records found
|