The Broadband Guide
SG
search advanced
 Username:
 Password:
Register
 forgot password?

Vulnerable Ports

This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats. We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please . Any feedback and suggestions can also be posted to our Security forum.

 1 | 2 | 3 | 4 | 5 | 6 |....| 43 
Port(s) Protocol Service Scan level Description
 995 tcp,udp POP3-SSL not scanned Incoming POP3 mail over SSL
used by Gmail
 24 tcp priv-mail not scanned Port used by any private mail system.
Also used by the Back Orifice 2000 (BO2K) trojan as Control Port
 1 udp tcpmux not scanned IANA assigned to TCP Port Service Multiplexer.

Sockets des Troie remote access trojan uses this port (a.k.a. Backdoor.Sockets23, Lame, Backdoor.Kamikaze, IRC_trojan, TROJ_Backdoor, W32/Cheval.gen, coded in Delphi 3, 06.1998). It might also use ports 1/udp, 5000, 5001, 30303, 50505, 60000 and 65000.
 33434-33523 udp traceroute not scanned incoming traceroute - under Unix-like operating systems, the traceroute utility uses User Datagram Protocol (UDP) datagrams with destination port numbers from 33434 to 33534 by default. Under Windows, the tracert command sends ICMP requests.
 1645 udp RADIUS not scanned RADIUS (Remote Authentication Dial-In User Service, RFC 2865 and RFC 2866) is a freely available distributed security system developed by Lucent Technologies InterNetworking Systems. Lucent has worked with the IETF (Internet Engineering Task Force) to define RADIUS as an interoperable method for distributed security on the Internet. RADIUS was designed based on a previous recommendation from the IETF's Network Access Server Working Requirements Group.

Uses UDP ports 1645 & 1646, or 1812 & 1813.

A vulnerability has been reported in Cisco Secure Access Control Server, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an error when parsing EAP-FAST user identities and can be exploited to execute arbitrary commands via specially crafted packets sent to UDP port 1645 or 1812.
References: [CVE-2013-3466], [SECUNIA-54610]
 1812 udp RADIUS not scanned RADIUS (Remote Authentication Dial-In User Service, RFC 2865 and RFC 2866 ) is a freely available distributed security system developed by Lucent Technologies InterNetworking Systems. Lucent has worked with the IETF (Internet Engineering Task Force) to define RADIUS as an interoperable method for distributed security on the Internet. RADIUS was designed based on a previous recommendation from the IETF's Network Access Server Working Requirements Group.

Uses UDP ports 1645 & 1646, or 1812 & 1813.

A vulnerability has been reported in Cisco Secure Access Control Server, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an error when parsing EAP-FAST user identities and can be exploited to execute arbitrary commands via specially crafted packets sent to UDP port 1645 or 1812.
References: [CVE-2013-3466], [SECUNIA-54610]
 5228 tcp,udp android not scanned Port 5228 is used by the Google Playstore (Android market). Google talk also uses ports 443, 5222 and 5228. Google Chrome user settings sync (facorites, history, passwords) uses port 5228.
 513 udp applications not scanned Multiple buffer overflows in the Syslog server in ManageEngine EventLog Analyzer 6.1 allow remote attackers to cause a denial of service (SysEvttCol.exe process crash) or possibly execute arbitrary code via a long Syslog PRI message header to UDP port 513 or 514.
References: [CVE-2010-4840]
 1101 tcp applications not scanned ZenSysSrv.exe in Ing. Punzenberger COPA-DATA zenon 6.51 SP0 allows remote attackers to cause a denial of service (service crash) or possibly execute arbitrary code via a series of connections and disconnections on TCP port 1101, aka Reference Number 25212.
References: [CVE-2011-4534], [BID-51897]

Backdoor.Hatckel - a backdoor Trojan that gives an attacker unauthorized access to an infected computer. By default it opens 15 ports on the infected computer: 1101 to 1115. Backdoor.Hatckel is written in Visual Basic.
 65000 udp trojans not scanned Devil trojan horse 1.03
 32768 tcp,udp first-os-ports not scanned first ports typically used for outgoing connections by some Linux distros like Red Hat: see /etc/rc.d/init.d/network and /proc/sys/net/ipv4/ip_local_port_range

Nascar 4 (UDP), Joint Operations Typhoon Rising (UDP) use port 32768.

Hacker's Paradise trojan also uses port 32768 (TCP).
 2130 udp trojans not scanned Mini Backlash remote access and password stealing trojan. Affects Windows 9x/ME. Uses ports 2130/udp and 3150/udp.
 4592 tcp applications not scanned webvrpcs.exe in Advantech/BroadWin WebAccess allows remote attackers to execute arbitrary code or obtain a security-code value via a long string in an RPC request to TCP port 4592.
References: [CVE-2011-4041], [BID-47008]
 256 udp trojans not scanned Trojan.SpBot (04.05.2005) - trojan horse that opens a compromised computer to be used as an email relay. Opens a backdoor on port 256/udp.
 20101 tcp applications not scanned Stack-based buffer overflow in the CGenericScheduler::AddTask function in cmdHandlerRedAlertController.dll in CmdProcessor.exe in Trend Micro Control Manager 5.5 before Build 1613 allows remote attackers to execute arbitrary code via a crafted IPC packet to TCP port 20101.
References: [CVE-2011-5001], [BID-50965]
 12401 tcp applications not scanned Buffer overflow in 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) 9.0.0.11200 allows remote attackers to cause a denial of service via a crafted packet to TCP port 12401.
References: [CVE-2011-4050] [BID-51146]

PRLicenseMgr.exe in the Proficy Server License Manager in GE Intelligent Platforms Proficy Plant Applications 5.0 and earlier allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted TCP session on port 12401.
References: [CVE-2012-0231]

Multiple stack-based buffer overflows in IGSSdataServer.exe 9.00.00.11063 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted (1) ListAll, (2) Write File, (3) ReadFile, (4) Delete, (5) RenameFile, and (6) FileInfo commands in an 0xd opcode; (7) the Add, (8) ReadFile, (9) Write File, (10) Rename, (11) Delete, and (12) Add commands in an RMS report templates (0x7) opcode; and (13) 0x4 command in an STDREP request (0x8) opcode to TCP port 12401.
References: [CVE-2011-1567] [BID-46936] [SECUNIA-43849]

WellinTech KingSCADA is vulnerable to a stack-based buffer overflow, caused by an integer overflow in kxNetDispose.dll. By sending a specially-crafted packet to TCP port 12401, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
References: [CVE-2014-0787], [XFDB-92641]
 7555 udp worm-linux not scanned Linux.Plupii.B (11.17.2005) - a worm with backdoor capabilities. Attempts exploiting Linux vulnerabilities. Opens a backdoor and listens for remote commands on port 7555/udp.
 7222 udp worm-linux not scanned Linux.Plupii (11.10.2005) - a worm with backdoor capabilities. Attempts exploiting several Linux web server related vulnerabilities. Opens a backdoor and listens for remote commands on port 7222/udp.
 20192 tcp trojans not scanned Backdoor.Ranky.V (11.03.2005) - a trojan horse that allows the compromised computer to be used as a covert proxy. Starts a covert proxy on a random tcp port between 1025 and 65535. Uses port 20192/tcp to send notifications of infection.
 50777 tcp applications not scanned zenAdminSrv.exe in Ing. Punzenberger COPA-DATA zenon 6.51 SP0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted packet to TCP port 50777, aka Reference Number 25240.
References: [CVE-2011-4533], [BID-51897]
 3689 tcp itunes not scanned iTunes Music Sharing (DAAP)
 3784 tcp,udp ventrilo not scanned Ventrilo

The decryption function in Flagship Industries Ventrilo 3.0.2 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) by sending a type 0 packet with an invalid version followed by another packet to TCP port 3784.
References: [CVE-2008-3680] [BID-30675]

Ventrilo 2.1.2 through 2.3.0 allows remote attackers to cause a denial of service (application crash) via a status packet that contains less data than specified in the packet header sent to UDP port 3784.
References: [CVE-2005-2719] [BID-14644] [SECUNIA-16551]

IANA registered for: BFD Control Protocol [RFC 5881]
 749 tcp,udp kerberos not scanned Kerberos administration
Related ports: 88,464,543,544,751
 636 tcp ldaps not scanned LDAPS - Lightweight Directory Access Protocol over TLS/SSL

Novell eDirectory and Netware are vulnerable to a denial of service, caused by the improper allocation of memory by the LDAP_SSL daemon. A remote attacker could exploit this vulnerability to cause a system-wide denial of service (over/on/using) port 636 TCP.
References: [XFDB-67468], [EDB-17298]
 543 tcp klogin not scanned Kerberos login
Related ports: 88,464,544,749,751
 544 tcp kshell not scanned Kerberos remote shell
Related ports: 88,464,543,749,751

A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to TCP connection information not being properly validated when connecting to a protocol translation resource and can be exploited to cause a reload via specially crafted packets sent to TCP ports 514 or 544. Successful exploitation requires a vulnerable protocol translation configuration or a Telnet-to-PAD protocol translation ruleset to be configured.
References: [CVE-2013-1147] [SECUNIA-52785]
 520 tcp efs not scanned ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.
References: [CVE-2010-3616], [BID-45360]

Port IANA registered for Extended File Name Server
 464 tcp,udp kpasswd not scanned Kerberos (v5)
Related ports: 88,543,544,749

A vulnerability has been reported in Kerberos, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to the kpasswd application not properly handling malformed UDP packets and can be exploited to exhaust CPU and network resources via the UDP "ping-pong" attack on port 464.
References: [CVE-2002-2443], [SECUNIA-53375]
 8500 tcp Macromedia not scanned Port used by Macromedia ColdFusion MX Server (Edition 6) to allow remote access as Web server

Rumble Fighter uses this ports 7000-8500 (TCP/UDP)
 3632 tcp,udp distcc not scanned 3632 is default listen port for distcc daemon (distributed C/C++ compiler). It only supports IP based authentication and defaults to allow from all, which means anyone can use it. It does no other harm than letting others to use your hardware (at +5 nice) to speed up their compilation process.
 4672 udp emule not scanned Port 4672/udp is used by the eMule file sharing software
 125 tcp misc not scanned Port is sometimes unofficially used as an alternate to port 25 SMTP (Simple Mail Transfer Protocol). This is useful as a dedicated port for VPN clients or for those who cannot directly send mail to a mail server outside of their ISP's network because of an ISP block on port 25.
 0 tcp,udp not scanned This port is technically illegal, but possible. It is often used to fingerprint machines, because different operating systems respond to this port in different ways.
 17 tcp,udp qotd not scanned Responds with Quote of the Day. See [RFC 865]

Skun trojan also uses this port.
 18 tcp,udp msp not scanned Message Send Protocol
Also: Remote Write Protocol (RWP)
Related RFCs: [RFC 1159] [RFC 1312] [RFC 1756]

Skun trojan also uses this port.
 101 tcp,udp hostname not scanned Hostnames NIC Host Name Server. [RFC953] [RFC811]

Skun trojan also uses this port (TCP).
 105 tcp,udp ccso not scanned IANA assigned to CCSO name server protocol (mailbox name nameserver). [RFC2378]

Backdoor.Nerte also uses this port (TCP).

Buffer overflow in Mercury Mail Transport System 4.01b allows remote attackers to execute arbitrary code via a long request to TCP port 105.
References: [CVE-2005-4411], [BID-16396]
 106 tcp poppassd not scanned (TCP) poppassd (aka. epass) allows passwords to be changed on POP servers. Traditionally, users would have to have shell (Telnet) accounts on the servers in order to change their passwords. This allows users with just POP access to change their passwords.
The exchange looks something like:

S: 200 Hello
C: user robert
S: 300 Please send current password
C: pass mypassword
S: 200 send New Pass Word
C: newpass newpassword
S: 200 successful
C: quite

Protocol was originally developed for Eudora. Eudora Internet Mail Server vs. 1.2, 2.0, 2.01. DoS If you connect to this server and enter the command "USER xxxxxx" with more than 1000 characters, this service will crash.

Apple Mac OS X Password Server and City of Heroes also use this port.

Mail Management Agent (MAILMA) (a.k.a. Mail Management Server) in Rockliffe MailSite 7.0.3.1 and earlier generates different responses depending on whether or not a username is valid, which allows remote attackers to enumerate valid usernames via user requests to TCP port 106.
References: [CVE-2006-0129]

Buffer overflow in Eudora Internet Mail Server (EIMS) 2.01 and earlier on MacOS systems allows remote attackers to cause a denial of service via a long USER command to port 106.
References: [CVE-1999-1113] [BID-75]
 109 tcp,udp pop2 not scanned Post Office Protocol 2 (obsolete). While POP2 has largely been replaced by POP3, hackers still scan for this port because many older POP servers have vulnerabilities associated with them. [RFC937]

ADM trojan also uses this port (TCP).
 54321 udp loadavg not scanned UDP port used by "loadavg" - a service that replies with the load average of a machine.
 14690 tcp,udp applications not scanned Port used by BitKeeper.
14690/udp is also used by Battlefield 1942.
 18888 tcp,udp liquidaudio not scanned Port used by LiquidAudio servers.
 21157 udp games not scanned Activision gaming protocol [RFC 3027]
 700 udp buddyphone not scanned Port used by BuddyPhone Internet Telephony software. Also uses TCP range 5000-5111.
 1494 tcp citrix not scanned Citrix WinFrame. Also uses port 1604 udp.
 1604 udp citrix not scanned Citrix WinFrame uses port 1604 UDP and port 1494 TCP.
DarkComet RAT (Remote Administration Tool) uses port 1604 (both TCP and UDP) by default.

 22555 udp vocaltec not scanned Port used by VocalTec Internet Phone.
 22703 tcp,udp webtv not scanned WebTV is vulnerable to a DoS exploit on this port that can reboot the machine.
 22793 tcp vocaltec not scanned VocalTec Internet Phone - tcp connection to VocalTec servers on this port.
 26000 tcp,udp quake not scanned Quake-based games (e.g. Half-Life, Quakeworld, QuakeIII, etc.), Empire Earth 2 (TCP), Star Trek Voyager: Elite Force (UDP) use this port.

Multiple buffer overflows in the client and server in Racer 0.5.3 beta 5 allow remote attackers to execute arbitrary code via a long string to UDP port 26000.
References: [CVE-2007-4370], [BID-25297]
 31335 udp trojan not scanned Trinoo distributed attack tool port.
 639 tcp,udp msdp not scanned MSDP - Multicast Source Discovery Protocol
 641 tcp,udp proxy not scanned SupportSoft Nexus Remote Command (control/listening): A proxy gateway connecting remote control traffic
 653 tcp,udp proxy not scanned SupportSoft Nexus Remote Command (data): A proxy gateway connecting remote control traffic
 4502-4534 tcp silverlight not scanned Ports are used by the Microsoft Silverlight plugin. Silverlight can add graphics, interactive and multimedia functionality to the Web browser.

Websites with Silverlight-compatible content will send requests to the computer and access the policy file on port 943. Once the policy file is read, ports 4502-4534 can be used to send data to the Web browser.
 7123 tcp applications not scanned Port used by RealAudio.
Also the default port for the "fakewww" web server used with NDT (Network Diagnostic Tool).
 3001 tcp applications not scanned The web100 NDT (Network Diagnostic Tool) server uses ports 3001, 3002, and 3003 tcp to communicate with the Java applet on the client's desktop. NDT also uses port 7123/tcp.

Alt-N Technologies MDaemon 3.5.4 allows a remote attacker to create a denial of service via the URL request of a MS-DOS device (such as GET /aux) to the Worldclient service at port 3000, or the Webconfig service at port 3001.
References: [CVE-2001-0583], [BID-2478]

DenyAll WAF before 6.4.1 allows unauthenticated remote command execution via TCP port 3001 because shell metacharacters can be inserted into the type parameter to the tailDateFile function in /webservices/stream/tail.php. An iToken authentication parameter is required but can be obtained by exploiting CVE-2017-14706. This affects DenyAll i-Suite LTS 5.5.0 through 5.5.12, i-Suite 5.6, Web Application Firewall 5.7, and Web Application Firewall 6.x before 6.4.1, with On Premises or AWS/Azure cloud deployments.
References: [CVE-2017-14705]
 3 tcp,udp compressnet not scanned SynDrop trojan uses this port.
Delta Force also uses port 3 (TCP).
IANA assigned for: Compression Process
Port also used by: Midnight Commander
 42042-42051 tcp,udp voddler not scanned Voddler uses ports 42042-42051 and 50726.
 43 tcp,udp whois not scanned WHOIS protocol
 1237 tcp,udp tsdos390 not scanned Port is IANA assigned to tsdos390. Also used by Command and Conquer, Dune2000.
 77 tcp,udp priv-rje not scanned IANA assigned for any private RJE service, netjrs.

The error message "TK_SPACE undeclared" is common to this port. This occurs when installed ports keep bombing out on sqlite3.
 103 tcp,udp gppitnp not scanned Port IANA registered for Genesis Point-to-Point Trans Net
Also sometimes used with MS Exchange X.400 mail messaging traffic.

Known trojans that use this port: Skun
 751 tcp,udp pump not scanned Port used by kerberos_master, Kerberos 'kadmin' (v4) authentication.
IANA assigned to: pump
 660 tcp,udp mac-srvr-admin not scanned Mac OS X Server administration

Zaratustra trojan also uses this port (TCP).

Buffer overflow in the GUI admin service in Mac OS X Server 10.3 allows remote attackers to cause a denial of service (crash and restart) via a large amount of data to TCP port 660.
References: [CVE-2004-1832], [BID-9914]
 221 tcp,udp fln-spx not scanned Port is IANA registered for Berkeley rlogind with SPX auth

Trojans that use this port: Snape
 222 tcp,udp rsh-spx not scanned IANA registered for Berkeley rshd with SPX auth

Trojans that use this port: NeuroticKat, Snape
 1646 udp RADIUS not scanned RADIUS (Remote Authentication Dial-In User Service, RFC 2865 and RFC 2866 ) is a freely available distributed security system developed by Lucent Technologies InterNetworking Systems. Lucent has worked with the IETF (Internet Engineering Task Force) to define RADIUS as an interoperable method for distributed security on the Internet. RADIUS was designed based on a previous recommendation from the IETF's Network Access Server Working Requirements Group.

Uses UDP ports 1645 & 1646, or 1812 & 1813.
 1813 udp RADIUS not scanned RADIUS (Remote Authentication Dial-In User Service, RFC 2865 and RFC 2866) is a freely available distributed security system developed by Lucent Technologies InterNetworking Systems. Lucent has worked with the IETF (Internet Engineering Task Force) to define RADIUS as an interoperable method for distributed security on the Internet. RADIUS was designed based on a previous recommendation from the IETF's Network Access Server Working Requirements Group.

Uses UDP ports 1645 & 1646, or 1812 & 1813.
 9200 udp wsp not scanned WAP Connectionless Wireless Session Protocol (TCP/UDP) [WAP Forum] (IANA official)

WapServ Lite, WapServ Pro and WapServ Enterprise are vulnerable to a denial of service. By sending specific byte values over port 9200 or port 9201, a remote attacker can cause the gateway to consume large amounts of memory resources, prevent the gateway from starting, or cause the gateway to crash.
References: [BID-8472], [XFDB-13011]
 5672 tcp,udp,sctp amqp not scanned Advanced Message Queueing Protocol, see http://www.amqp.org
Also used by: MOHAA Reverend
 5269 tcp jabber not scanned Jabber instant messenging software server-to-server connection, see http://www.jabber.org/protocol/
IANA registered for: Extensible Messaging and Presence Protocol - XMPP Server Connection [RFC 3920]

Apple iChat Server also uses this port.
 5066 tcp,udp stanag-5066 not scanned IANA registered for: STANAG 5066 (http://s5066.nc3a.nato.int) Communication protocol stack for Long thin pipes with a high bit-error rate specifically, HF radio.
Applications that use this port: GeoVision RemotePlayBack
 8550 tcp,udp 4psa not scanned Primary/Master 4PSA DNS Manager server - http://www.4psa.com/
Port is used for master/slave connection between servers, also uses ports 53 and 953 tcp/udp.
 953 tcp,udp rdns not scanned Domain Name System (DNS) RDNC Service

IANA registered for: BIND9 remote name daemon controller (TCP)
 3506 udp games not scanned Take2 Bet On Soldier: Blood Sports (may require GameSpy ports to be opened - http://www.gamespyarcade.com/support/firewalls.shtml)
 6515 udp games not scanned GameSpy Arcade - Dplay UDP game data, Command & Conquer: Red Alert 3, Heroes of Might and Magic IV

Also uses ports 3783, 6500, 6515 UDP, 6667, 13139 UDP, 27900 UDP, 28900, 29900, 29901
 13139 udp games not scanned GameSpy Arcade - Custom UDP Pings, Worms 4 Mayhem

Armies of Exigo also uses this port.

Also uses ports 3783, 6500, 6515 UDP, 6667, 13139 UDP, 27900 UDP, 28900, 29900, 29901
 27900 udp games not scanned GameSpy Arcade - Master Server UDP Heartbeat, Worms 4 Mayhem

Also uses ports 3783, 6500, 6515 UDP, 6667, 13139 UDP, 27900 UDP, 28900, 29900, 29901

Battlefield 2142, ToCA Race Driver 3 also use this port.
 1159 tcp,udp oracle-oms not scanned Oracle OMS
 1521 tcp oracle not scanned Oracle database default listener. Oracle Database Management uses the following ports:
1521 TCP - Oracle SQL Net Listener and Data Guard
1832 TCP - Oracle Enterprise Management Agent HTTP (range 1830-1849)
49896 TCP - Oracle Clusterware (CRS daemon)


Transparent Network Substrate (TNS) Listener in Oracle 9i 9.0.1.1 allows remote attackers to cause a denial of service (CPU consumption) via a single malformed TCP packet to port 1521.
References: [CVE-2002-0509], [BID-4391]

Port is also IANA registered for nCube License Manager
 1830 tcp net8-cman not scanned Oracle Net8 CMan Admin.
Oracle Database Management uses the following ports:
1521 TCP - Oracle SQL Net Listener and Data Guard
1832 TCP - Oracle Enterprise Management Agent HTTP (range 1830-1849)
49896 TCP - Oracle Clusterware (CRS daemon)
 3872 tcp not scanned Oracle Management Remote Agent
 7778 tcp Oracle9iAS-OJSP not scanned Oracle 9i Application Server Oracle Java Server Pages

AT&T Connect Web Conferencing uses TCP ports 443,80 and 7778.

The OHS component 1.0.2 through 10.x, when UseWebcacheIP is disabled, in Oracle Application Server allows remote attackers to bypass HTTP Server mod_access restrictions via a request to the webcache TCP port 7778.
References: [CVE-2005-1383] [BID-13418] [OSVDB-15908] [SECUNIA-15143]

Tribes Vengeance also uses this port (TCP/UDP).
 1211 tcp,udp groove-dpp not scanned Groove DPP

CoDeSys Gateway Server is vulnerable to a heap-based buffer overflow, caused by the failure to check for a signed value. By sending a specially-crafted packet to TCP port 1211, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
References: [XFDB-82254], [CVE-2012-4706], [BID-58032]
 2492 tcp,udp groove not scanned GROOVE
 1459 tcp,udp proshare1 not scanned Prosahre Notebook Application
 1460 tcp,udp proshare2 not scanned Proshare Notebook Application
 1503 tcp Netmeeting not scanned NetMeeting with H323

T.120 Data sharing, CU-SeeMe-CUworld also use port 1503 (TCP/UDP)
 1513 tcp,udp fujitsu-dtc not scanned Fujitsu Systems Business of America Inc
 1514 tcp,udp fujitsu-dtcns not scanned Fujitsu Systems Business of America Inc
 1525 tcp,udp orasrv not scanned Oracle

Archie, Prospero trojans also use this port (TCP).
 1526 tcp not scanned Oracle database common alternative for listener
 1527 tcp,udp tlisrv not scanned Oracle
 1612 tcp,udp appliactions not scanned Numara Asset Manager Platform (AMP) uses the following ports:
1610 - primary AMP port
1611 - communication between console and master server
Other optional ports used by AMP:
1609 - used to calculate available bandwidth for transfer windows
1612 - used by the application kiosk feature
2500 - used for multicast data transfers to agents
5400 - used for remote control only
22,23,25,135-139,445 - used for auto discovery, SSH remote inventory scans, SMB remote inventory
161 - SNMP remote inventory scan
67-69 - relays can be used to avoid opening ports over the wan

Port also used by:
NetBill Transaction Server
Video game Black and White (TCP)
 1613 tcp,udp netbill-keyrep not scanned NetBill Key Repository
 1614 tcp,udp netbill-cred not scanned NetBill Credential Server
 1615 tcp,udp netbill-auth not scanned NetBill Authorization Server
 1616 tcp,udp netbill-prod not scanned NetBill Product Server
 1661 tcp,udp netview-aix-1 not scanned netview-aix-1

Vulnerabilities listed: 100 (some use multiple ports)
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About