Digital Voodoo -= The craft of Hacking on the Internet =- - Release 2.2 - Kurruppt2k, 1999 kurruppt2k@mailcity.com Related material and necessary programs available at The CyberUnderground http://www.users.uswest.net/~kurruppt2k Information Insemination __________________________________________________ New in Release 2 Intro Prerequisites A little Hacker lingo What you need - a Hacker's equipment Keeping from getting caught TCP/IP and the Clent/Server model Getting Started I dub thee... "Hacker" Unix NT Netware "Unbeleivable... a Hacker!" Eleet Hacker Tactics Firewall Penatration In Summary Appendix A - commonly used passwords / usernames Appendix B - basic Unix commands Appendix C - further reading Appendix D - well known UDP and TCP ports __________________________________________________ New in Release 2 Why a second release so soon? Well, the first release was written in very little time. I put Digital Voodoo out on TCU (The CyberUnderground) immediately after it was finished. Soon later, after reading over it a few times, I decided that, though informative and braud, the text was still missing a little. For the most part, I left what I had alone, but I did add a few sections. Rather than just updating it and reposting it on my site, so many copies had already circulated in such a short amount of time, I decided to just call it a second realease. Penetrating Firewalls is a brand new section, and offers valuable info to those who aren't complete newbies. Also, I added a lot of usefull NT breakin tactics to the NT section. More usefull info was also included in the Unix section as well. A few more appendicies were added too - all in all, release 2 (now 2.2!) is quite a bit more full of content than its predecessors. By the way: I wrote this with Windows WordPad which you all know doesn't have a spell checker. Deal with it. So sit back, crack open a can of Jolt Cola, and dig in. About the Author My name is Kurruppt2k. Occasionally, I've gone by the handles (\/)3n4c3 (\/)n3m0n|c and | )igi741 Vood00 (hence the title of this text). As of the writing of this second addition, I'm 19 years old, and in college for a degree in Network Support. I absolutely love computers, networks, TCP/IP and internetworks, and therefore the Internet (not the WWW). Though a bit immature and overquoted, I beleive in most of the Hacker Manifesto (if you've never read it, now would be a good time to do so). Information, in my humble opinion, is hoarded and safegaurded. The biggest advances the technological world has made were due to people willing to share thier ideas and informational resources with others. Take Linux and GNU, for example (if you are unfarmilliar with GNU... you aught not be). I, as a hacker, don't wish to wreak havoc, crash systems, deface websites, prove my 'leetness' to my friends by breaking into systems. I like to be pitted in a match of wits, to use my head and knowlege of computers and networks to circumvent traditionally unpenatrable systems. I want to know what's out there, and why its so secretive. I want that euphoric feeling of understanding exacly how a certain system works. Lots of people become hackers (or attempt to become) for all the wrong reasons. The desire to deface someone's website will not usually be motivation enough to accomplish the task. Only an unsatiable curiosity will drive you to obtain whatever goal you set for yourself. Cliche, but true. Intro The reason I wrote this is because there are a vast amount of "hacking for newbies" texts available on the Internet, most by very knowlegable individuals. However, they all (to the best of my knowlege) cover dialup hacking only. To explain what I mean by that, let me catogorize the various means in which a hacker gains access to a computer, supermini, mainframe, etc - into three distict genres. There's the obvious on-site access, which is as simple as being in the premesis of the system in question. Threre's dial-up access, which is simply using a modem to to dial into another modem, and going from there. And finally, there's what I will hereafter refer to as IP access. In short, this means accessing a system via the Internet. On-site (relatively unfeezable in most cases) hacking is usually covered breifly in most of the readily available texts out there, though they mostly focus on dial-up hacking. The idea of connecting to a computer elsewhere with a modem has been around a long time, so therefore has the dial-up access method of hacking. But the Internet, having only been around for about 30 years, has not been a widely used method of access. Until recently. Actually, it hasn't been that recent, so why a guide to hacking on the internet hasn't already been written is beyond me. That is the primary focus of this text. Take any computer or network of any potential target of yours, and most likely they are connected to the Internet. Which means you, as a Internet-hacker-to-be can break into it. This is very good for people like us, because finding a computer or network on the Internet is much easier than finding a modem number (I'll explain how later). One last thing before we get into the actual hacking stuff: this text will not teach you to be a hacker, nor will any text out there or any collection of texts. Hacking is a self-tought craft, meaning you will need the dedication to go out and find materials on your own. If you have a specific question, go ahead and ask someone on a hacker IRC channel of whatever, but if your question is too broad ('how do I hack into a Netware box?') you will be ridiculed and labeled a lamer. Keep your questuins technical in nature ('what's the SMTP command to set the recipient'), and most will be happy to share thier knowlege with you. Once you've comleted this text, I suggest you play around with what you've learned (as 80% or so of what you learn will come from hands-on experience). Next you will need some material on topics just glazed over in this text. Get yourself a UNIX book (UNIX for dummies, Teach yourself UNIX in 24 hours, whatever). Then get yourself a book on Windows Networking. These are also readily available. Other books you should have in your collection are general hacking books. The book Maximum Security is very informative, as is Secrets The Happy Hacker. Secrets of a Super Hacker, Steal This Computer Book, and the New Hacker's Dictionary are at least worth checking out at your library. If all this seems like too much work, well then you probably lack the dedication to become a hacker. If you're still eager to learn - great! This text will point you in the right direction. So, without further adoo (adu?) - on with the hacking! Prerequisites First of all, let me say that it is assumed that the reader of this text already has a basic working knowlege of computers and the Internet. Not exstensive, by any means. This text is targeted to people who probably have thier own computer (or ready access to one), surf the web, and have always wanted to know what exactly hacking was all about. If you start reading and find yourself lost, put this down and go get yourself a basic book on computers and the Internet before you delve into this. For example, its assumed that you already know what a URL is (eg: http://www.hackers.com/archives). This realy goes without saying, but I as the writer of this text, take no responsibility in the actons of those who act based upon principals learned by reading this material. Really, this is intended to inform anyone who's always wondered how exactly these "hackers" they hear so much about do what they do, and for concerned sytem administrators who want to know how hackers can infiltrate thier network. Okay, anyways, onto the good stuff. A little Hacker lingo I'll get the jargon out of the way now, in case I refer to one of these terms later. Hacker - one who infiltrates and explores various computer sytems for the sole purpose of expanding their knowlege and satisfying ther insatiable thirst for information. Cracker - a hacker who acts maliciously. Deletes, crashes, implements viruses, etc. Warez d00d - a lowlife techno weenie who sells pirated software (basically people who couldn't quite make it as a hacker). Eleet, leet, el33t, 31337, etc - a hacker who's learned just about everything there is to know regaurding computers, networks, and security (not really possible). Many claim to be leet, very few are. Newbie - an amatuer hacker (different from a lamer). Lamer - a complete hacker wannabe. The difference between a newbie and a lamer is this: a lamer knows a little bit, decides that's enough, and calls himself a hacker. A newbie also knows a little bit, but is humble enough to know that there is a lot more to be learned. Root - status on any sytem that gives the hacker total control of it. Usually, root is the desired end result of any hack. Rootshell - a shell is an interface between you as a user and a particular computer. Windows Explorer is a shell, DOS prompts are a shell. If you log into a UNIX machine, you are using a shell. So a rootshell is a shell with root (superuser) privelages to resources on that machine. You can obtain a rootshell by either logging into the box as root (assuming you have the password) or by using an exploit program to create a rootshell for you (more on this later). Packet - when data is sent over a network, it is broken down into managable chuks called packets. This isn't always the case, but in TCP/IP (the protocol used on the Internet), this is always true. Protocol - a set of rules and guidlines that computers on a network must follow in order for communicatios to be coordinated, and therefor successful. A protocol defines specifically how data is broken into packets, sent over a wire, and reassembled at the other computer (and how sessions are set up over a network). Client - Usually refers to either A: a computer on a network that requests resources from a server, or a computer that is not a server; or B: a program that makes request of a server or service. Netscape Navigator and Internet Explorer are client software programs in that they request web pages from servers. Server - Either A: a computer set up to share resources such as printers, files, or serve web sites, or B: a program used to fofull requests, such as IIS (Microsoft's Internet Information Server). More on clients and servers later. Proxy Server - Okay, if a company has its own network and its own sebsite, there will be a portion of the network accessable (with a username and password, of course) by anyone with Internet access. All the HTML files for the company's website will be somewhere on this segment of the network. Then, there will be the portion of the network stricly for business purposes, hidden from the rest of the world. A proxy server (along with sometimes a firewall) seperates these two segments. So if you want to access the restricted part of any network, you will need to do it via the proxy server. Also, if all the workstations in an office have Internet access, they most likely do through the proxy server. Firewall - Sort of like a proxy server, but has no other purpose but to keep unautorized user out. Even if you have a valid username and password for a system - if a firewall is in your way, you're pretty much out of luck. Hacking through one is next to impossible. Hacking around one is slightly easier (more on this later). What you need - a Hacker's equipment Here is a basic list of the hardware, software, and other miscellaneous things you will need to begin your days in the world of digital espionage. A computer (duh) with some kind of Internet access, beit PPP, a T1, or whatever (more on this later). One, prefferably two accounts with an ISP, your phone company, or whatever. One should be in no way shape of form attatched to you (ie: someone elses account!) More on this later. The following software: An Internet browser (Netscape Communicator, Microsoft Internet Explorer, whatever). A telnet client (comes with most UNIX sytems, Windows 95/98/NT/2000). An FTP client (comes with most UNIX systems,Windows 95/98/NT/2000). A ping utility (comes with most UNIX and Windows products, I beleive). An IP scanner. A port scanner. A sharescanner. A finger client. A whois and lookup utility (though this can be done on the Web) A traceroute utility (comes with most Windows products, I beleive). A password cracker . A brute force engine of some sort (this you can make yourself). Sound complicated already? Its really not - I'll explain the function of each shortly. First, I'll list some effective programs for each. Browsers (actually, not that important to a hacker) are pretty commonplace. As far as a telnet client, if you have any UNIX system (BSD, System V, Linux, or whatever) or Windows 95 or above, you most likely have one. Do a search for 'telnet.' Otherwise, grab a copy of it from a friend - its pretty common. Most computers come with some sort of FTP client as well - in either UNIX or at a DOS prompt type 'ftp' and it should come up. Otherwise, get it from a friend (most have it, even though they might not even have heard of it). Ping utilities are as common as telnet and FTP. Type 'ping' at a UNIX or DOS prompt. The later versions of Netscape and MIE have an FTP client built in, but are pretty limited. Now the various types of scanners are a little harder to find, as they aren't used for much besides hacking (or attempting to hack). HakTek is an oldie but goodie - it has an IP scanner, a port scanner, a ping utility, and a finger client (and even an email bomb utility, if you're into that sort of thing). WS Ping ProPack (a legitimate program beleive it or not) is a great piece of software. It has an IP scanner, a port scanner, a ping utility, a finger client, whois and lookup utilities, traceroute, and a variety of other possibly useful utilities. I seriously suggest that you download the evaluation version at http://www.ipswitch.com. Tracerout is also integrated into (I beleive) Windows 95 and above. Type 'tracert' at a DOS prompt. Legion is a pretty good sharescanner, and I'm told Winhack Gold is decent (for UNIX). Now as far as password crackers go, there are a lot. What you need all depends on what platform (operating system) you have, and the platform of the computer that the password file belongs to. If you have any flavor of UNIX and are cracking a UNIX password file, get Cracker Jack. If you have a Windows product and are cracking a UNIX password, get John the Ripper. If you have a Windows product and are hacking an NT Server (or any other Windows machine) get Lopht Crack. Finally, the brute force engine. Simply a program designed to spit out words from a dictionary file (or a range of numbers) into a login/password prompt, used by hackers in hopes to find a valid username/password combo. The problem with pre-made BF engines is that there are almost unlimited combinations of login screens (as far as in what order, 'group,' or related login prompts, number of attempts before disconnection, etc), so you are usually better of writing your own. If you have absolutely no programming experience, well, now's the time to learn a little. This isn't nearly as tough as it may seem, as I'll discuss later. One more program you might want to look into is a nuking program of some kind (WinNuke, Bitch Slap, anything). These come in handy in basically two instances (unless you just like to cause trouble - in which case you are considered a 'cracker,' not a hacker). You may, in your explorations, run into a not-so-friendly hacker, who feels threatened by your attempting to move in his territory (Acid Burn in Hackers). Nuking programs allow you to 'nuke' an IP address, and you can usually find out the IP address of anyone logged on to a certain system. So if you are being threatened by a cracker somewhere - nuke em! The other instance where this utility comes in handy is if you get caught red-handed hacking by the system's administrator or operator, and he becomes hell-bent on finding your actual location. Nuke the computer you were on or the network's proxy server, to slow him down, and disconnect as soon as possible. Please, though, don't go around nuking everything because you are getting frusterated. This is very lamer-like, and will get you busted much quicker than breaking into the system. Now to turn your UNIX or Windows machinge (or even Mac, I suppose) into a mean h4x0r b0x, you should go about the Internet and download at least one of each of these. Make one of the first options on your start menu something like 'hacker utilities', and have a shortcut to each program on that menu, for quick access. Keeping from getting caught Hacking is a grey area, as far as what exactly is legal, and what exactly isn't. Even if you follow the hacker code of ethics (never harm), you are still quite possibly braking one or more laws. Let me just say that if you are already on a system, with someone else's login name and password, you are blatently breaking a few laws. Nuking is also illegal. IP and port scanning are not illegal, though they definately cause suspiscion. In the past, measures to keep oneself safe included hacking from payphones, splicing your neghbor's line, 'bouncing' your call (explained later), and even using programs such as Modem Jammer. Now, you should use one or more of these methods to keep from being physically traced, and another to keep from being traced over the Internet (to your ISP). The best and probably easiest way to do this is use someone else's account, prefferably on a different ISP. This is much easier to do that one might expect. Shouldersurf someone typing in thier login/password, do a little social engineering (explained later), or even brute forcing to get a valid account. There are even programs out there that if run on a machine used to access the Internet via a dial-up (with an ISP) it will give you the password. One such example is Dripper (avalable at The CyberUnderground). As far as physically tracing you goes, if you are using someone else's account you are sort of safe. If you have hacked into a system with a low-level account (a 'guest' account, for example) and just got yourself root (see definition above), you should seriously consider adding a few methods of security before reconnecting. To hack from a payphone, get an acuistic coupler for your modem, set the receiver on it, and just dial out. Bouncing your call means basically calling a modem somewhere that is designated as an 'outdial', meaning once connected, any modem commands you issue will go to it, so you can dial from it somewhere else. If you are traced - it will be to that modem. This can be defeated though, so its a good idea to bounce calls off a few outdials. Outdials are pretty hard to find, but are most common on X.25's and other PSN's (for more info on outdials, read any other hacking text, like "The Neophite's Guide to Hacking," or "The Newbie's Handbook." Anther secutiy method (similar to bouncing your call) is bouncing your IP attack. Meaning - telnet to system that supports telnet itself - then telnet to your target. Finding and obtaining access to one of these is difficult for a new hacker, so I'll go into greater detail on this later. Another effective meathod to having your IP addresse logged into the system you're connected to (and thereby "busted,") is bouncing your packets off a WinGate host. WinGate is a server software program that acts kind of like a proxy server and firewall all in one (see above for definitions). As with a generic proxy server, all computers in the office that the WinGate computer is in connect to it to get to the Internet - and you can do the same. All you need is the IP address or domain name of a WinGate host. Telnet to it, and type the IP address you want to get to at the prompt you get. The IP address of the WinGate box will be logged as you connect - not your own. Finding WinGates is very easy - just go to any hacker website (www.cyberarmy.com is a good one) and look at their database of WinGate's. You'll have to weed through lists of bad WinGate's though, so you may be better off getting a WinGate scanner and doing it yourself. If you're realy smart, you'll bounce your packets off a few WinGate's before getting to your target. As a rule of thumb, the amount of security you should be using is directly related to the seriousness of your hack. Though, you could be breaking many federal and state laws without even being close to having root access, and not even quite sure what you are doing. It cannot be stressed enough: be as safe as possible. TCP/IP and the Clinet/Server model Transfer Control Protocol/Internetwork Protocol. The 'language,' or means for which packets are exchanged over the Internet, or any intranet. TCP/IP is nothing more than a set of rules and regulations that specifically define exacly how data is transferred between computers on a network. This protocol has several sub-protocols, known as the TCP/IP protocol suite. To utilize any of these subprotocols, you just need a client of that. For example, Windows 95 and above has a built-in FTP and Telnet client (a client, when referring to a protocol, is a program that lets a user utilize that protocol). In this section I will explain each of these subprotocols, and other protocols used over the internet. One concept that it is imperitive you understand is the Client/Server model. Every protocol is utilized with software. For example: HTTP (Hyper Text Tranfer Protocol, the protocol used to transfer HTML web pages to and from your computer [this is why it is at the beginning of URL's you visit] ). This protocul is put to use by software. This software has two pieces, a client side and a server side. When you type in a URL or click on a link, you are using a HTTP client software program (a browser) to request a copy of a particular web page. Then, the server of the URL you requested has HTTP server software, that recieves the request (in the form of packets), and provides you with a copy of it, by sending it back to your computer. A server side software package is also called a service, and is accessed via ports. A port is a "virtaul channel" used to transfer packets of a specific protocol between a client and a server. When you hear the term 'portscanning,' what is being referred to is the scanning for protocol, or services. Also, each port (service installed on the server in question) has a number assigned to it (eg: telnet is generally number 23). At any rate, think of client side software as the requestor, and the server side software as the provider. PPP. There are many protocols, most of which discussed here are used over the Internet's high-speed digital lines. However, there are lots of protocols used over regular analog phonelines, used before the Internet was a major computing tool. These include Kermit, Xmodem, Ymodem, etc, and all have parralles in the TCP/IP protocol suite. However, the only "analog phoneline" one I'll cover is PPP. PPP (Point to Point Protocol) is the protocol used to connect to your ISP's server, who intern sends and recieves TCP/IP packets over the internet for you. SLIP is similar, but not as effective and as widely used. Basically, the way you are able to communicate with the digital network of the Internet is that your ISP translates TCP/IP packets to PPP so they can travel over phone lines, and vice versa. Telnet. Let's start at the basics - on, say, a UNIX platform, there is one or more UNIX boxes - the computer that does the processing and holds all the data (files, applications, the OS, etc) which is the computer on the network that you are most likely trying to hack into. Then there are a slew of dumb terminals directly connected to it. A dumb termianl consists of nothing more than a monitor and a keyboard - everything a user types/does on a dumb terminal is handled by the UNIX box. Now, telnet is a protocol/application that allows people to connect to a computer remotely (over a phone line or the Interent) and proccess data localy - meaning when you connect to a UNIX box via telnet, it just as if you were at a dumb terminal directly connected to the UNIX box. Telnet is the protocol you will be using to access the computer you are hacking into. FTP. File Transfer Protocol. This is the protocol used to transfer files between computers over the Internet. Whether you are downloading password files or uploading changes to their HTML files, you will do it through FTP. To start an FTP session, you need to log in to the service with an FTP client, just as you would with Telnet. More on this later. Incidentally, the later browsers from Netcape and Microsoft have an FTP client built in. To use it, type 'ftp' instead of 'http' in your browser. SMTP. Simple Mail Transfer Protocol. This is the protocol used to send and receive email. If you connect to a SMTP port (by telnetting into it) you can issue SMTP commands. When you send an email, along with the actual letter go along its protocol. This means that the SMTP packets (made up of your letter and other protocol-specific data) connects to port 25, and issues the appropriate commands to the SMTP service in order for the letter to reach its recipient. You can also connect to this port and issue these commands manually. The use of this could be sending email and changing the sender address to someone else (possibly the recipients employer). Also, with the VRFY command, you can find out whether or not a particular account (login name) exists on the network in question. Use the HELP command to fermiliarize yourself with the various SMTP commands. HTTP. Hyper Text Transfer Protocol. This, again, is the protocol used to transfer HTML pages back and forth between two computers. Finger. This protocol (also a UNIX utility) is used to obtain informatin about users on a remote machine. With a finger client, you can see who's logged on currently, and can find specific information about a specific user. DNS. Domain Name Service. If a computer has this port open, it generally means that this particular computer is a domain server of that network (the spokesperson, if you will). If you were to telnet to a network/domain, and didn't specify a computer (eg: hackers.com, instead of comp3.hackers.com) you would by default be connected to one of the name servers of that network. NBT. This stands for NetBIOS over TCP/IP, and is what Windows networks use. Another name for this is 'nbsession,' which generally indicates NetBIOS used over a Wide Area Network (such as the Internet), being that NetBIOS by itself (without TCP/IP) cannot be used over a WAN. SNMP, UDP, ICMP, SMB, NetBEUI, POP. These, along with many other protocols are used regularly over the internet as well. It is not in the scope of this text to explain them all, so I encourage you to research them and the others I've covered in more detail. Getting Started Okay - you've found the network/system that you want to hack. What's first? Find out which of these protocols the target supports. Can you telnet to this computer? Can you FTP to it and copy files from it? To find out, you will need to run a portscan on it, with you portscanning utility. Just type in the URL or IP address of the machine in question, and start scanning. You will be shown what protocols (TCP/IP subprotocols and others) the target has. It will not, however, tell you that it supports TCP/IP, because, to put it simply, it has to have TCP/IP to be on the Internet. What you are looking for here is services - these TCP/IP subprotocols and other services/ports. Do not let the term port mislead you - we're not talking about physical ports. Now, if the portscan indicated that the target maching supportds telnet (port 23), you can telnet to it, and attempt to log in. Go ahead - try it. You'll need a valid username/password combo to get it, which we'll get to later. If port 21 is open, that means that the maching supports FTP, and files can be transfered back and forth from it. But, like access via telnet, you'll need a login name and password. A default "anonymous" account is ftp/ftp for a username/password, so go ahead and try that. If this works (and don't be surprised if it doesn't), you won't have much in the way of access privelages (meaning you'll be able to look at files, but usually not copy files to your computer, and most likely not copy files to it). If you can anonymously log on, you at least have your foot in the door, and can possibly use this as a stair stepping to get further into the system. More on this later. Once logged on via an FTP port, commands to jump around from directory to directory and copy files is very DOS-like (actially more UNIX-like than DOS, but if you know a little DOS, you should feel comforable navigating the system). Type 'help' or '?' for a list of commands. When you do this, you are accessing a help file on your computer. To access the help file on the computer your on (which is usually more extensive and has commands specific to the computer your logged on to) type 'rhelp' or 'remotehelp,' or something similar. Or you could telnet to the FTP port and type 'help.' FTP is the only way to transfer files between the target computer and yours - which you will need to do to get password files, change thier website ('this site has been hacked by Kurruppt2k'), or whatever. More on this later. One last note on FTP - you can telnet to an FTP port, and log in. However, since you are not using an FTP client, you will not be able to do much once inside (like get directory listings or download files) because your telnet program does not follow the rules and guidelines (protocol) specified in FTP. In fact, you can telnet to any port, but if the right commands are not issued (usually done by your client program), you may not get anywhere, and may even be disconnected. Telnetting to ports that you aren't sure what are, though, is a very good way to learn about the computer you are targeting, and is usually necessary to break in. Now, if your portscan turned up either 'www' or 'http,' that means that you've found the computer that has all the HTML files (website files) that contain this organizations website. This realy is only relevant if you are attempting to break into the target's website. To do so, you'll need access to the index.html file (usually only accessable to superusers, or root accounts), and will have to FTP the page you will replace thiers with, and replace index.html with your own. Doing this, though, could be considered cracker-like, and slightly malicious. This also tends to piss sysadmins off, and may drive them to attempting to find you - so be careful! A last few notes on TCP/IP. You need to understand the structure of a URL, and of an IP address. Every computer on the Internet is designated by an address. The addressing scheme (IPv4) looks something like this: 38.233.203.2. Generally, the very last number is the node address, or the computer's address. The second to last is the subnet address. Each number between the decimals (called an octet) can be from 0 to 254. So the IP address is in the 38.233.203 subnet. The last number, again, specifies the computer in that subnet. So if you wanted to see what other machines were on that subnet, you would scan from 38.233.203.0 to 38.233.203.254. Now, each IP address can also have a name. If 38.233.203.2 belongs to the netscape.com domain, it might be www.netscape.com, or mail.netscape.com, or something similar. So when you type www.netscape.com to visit its website, you could also type http://38.233.203.2 (assuming that was its IP address). Which brings ut to URL. Here is a typeical "web address": http://www.microsoft.com/servives/windowsNT. The http:// specifies the protocol used. You could also replace it with ftp:// or even telnet://. (Note: to log in via ftp with your browser, use ftp://username:password@www.yourtarget.com.) The www.microsoft.com is just the computer name. The DNS protocol handles resolving the name into an IP address. The /services/windowsNT is the path to the file you are requesting (index.html, if none other is specified), just like a path on your computer (with foreward slashed instead of backslashes). I dub thee... "Hacker" Okay, you now should have enough preliminary knowlege to start your very first hack. Pick a target. Universities usually have somewhat lax security. Pick something relatively easy for your first time. Stay away from government networks and those belonging to large businesses and corporations. The very first step is finding the domain name of your target. If your target is www.spicegirls.com, the domain name is simply spicegirls.com. Step one. Every successful hack starts with a little preliminary investiagation. The more information you have about a specific domain, the better armed you are. Open a notebook and start an "info collection" of your target. First, visit thier website. Try to view every page, and write down anything of importance. Copy down all email addresses - as these are also usually valid login names. Write down anything else of relevence. Next run a whois or NSlookup on the domain, with your appropriate utility (available at The CyberUnderground). This will give you very usefull information. You'll get the doman's nameservers, the administrator, and a few more email addresses, other computers on the network, and other usefull stuff. Copy everything down. Another trick is sending an email to the domain with a username that you know doesn't exist (eg: blablabla@yourtarget.com). The SMTP service of whatever server is designated as the primary mail server of that network will return a letter to you saying that there is no such user. In the header of this email will also be some usefull information - copy it all down. Step two. Next you should try to get a scope of what kinds of computers are on the outside of this network (by outside, I mean what machines are "on the Internet," and not behind a firewall or proxy server). To do so, you will scan the subnet with your trusty IP scanner. Again, a subnet is every computer (nubmers 1 through 254) on a particular range of IP addresses. For example, 253.87.8.3 and 253.87.8.45 would be on the same subnet, whereas 253.87.8.45 and 253.87.11.12 are not. (Actually, class C subnets are often-times broken up even further - read an RFC on IP to learn all about IP addressing, packet structure, etc.) To scan the subnet of your target, do as follows. Ping the hostname (your computer should have a ping utility, as do most of the hacker programs you should already have). This will give you the IP address of the domain's primary name server (as would a lookup or whois). If the IP address is 253.87.8.45, scan the entire subnet, which would be 253.87.8.1 through 253.87.8.254. This will tell you every computer on that subnet - thier IP address'es and hostnames if applicable. If you already know of two computers on different subnets, scan both. Now, write down each computer you found and thier IP addresses, along with any relevent notes. When you're done, you should have a list of each (or most) of the servers on your target's network, not behind a firewall/proxy server. Step three. Now that you know what servers are on this network, you need to find out what services are running on each one. So what do you do next? You guessed it - you'll scan for services, or ports, on each computer you found. Use your portscanner and scan each computer you wrote down. Think of each service running on a machine is like a door that you might be able to break in through. Below I'll explain methods to use to possibly "break and enter" through each "door." Now, to get in, and have the power to acutally do things and explore the network, you'll need to telnet into one of the machines. This is usually the last step of hacking your way in, and you'll need a username and password to do so (or an exploit, which will be explained shortly). You'll hack into other ports in order to get these usernames and passwords. Now, a username and password that works one one machine of the network will usually work on all on that same network, so if you get passwords from one computer, you can use them on a different one to get in. Also, if there are no telnet ports, you can still (sometimes) log in via FTP. You won't be able to do much (like run any programs on the computer), but you will be able to look around and upload or download files from the computer. This all, of course, is assuming the computer is a Unix machine, which most computers on the Internet are. You may come across a Windows NT machine, which are entirely different. This means to become elite, you'll have to learn both operating systems. Unix The vast majority of the computers you'll come across on the Internet will be some flavor of Unix, beit BSD, Solaris, AIX, Linux, or whatever. Unix systems are set up to be multiuser. There will be a Unix box with lots of dumb terminals (monitors and keyboards with no boxes of thier own) directly hardwired into it. Each person who is authorized to be on a dumb terminal (or access the box via telnet) has an account on that system, and probably on each machine on that subnet. Thier account has thier own directory (folder), which is the same as thier username. As soon as they log in, they will be placed in that directory, or thier home directory. Every file and directory in a user's home directory belongs to that user, beit a text file, program, or whatever. Also, every user belongs to a group. This is important, because it is a fundamental of how permissions work. Not every user is allowed to read every file on the computer, change every file, and run every program. To list the files in your pwd (present working directory, the "folder" your currently in) type 'ls' (without the quotations). This is equivalent to the 'dir' command in DOS. To see the permissions of the files in your pwd, type 'ls -l'. This will tell you the permissions of that file, including who owns it, and what group that user belongs to. Permission categories are set for read permissions (the ability to read the file), write (the ability to make changes to the file), and execute (the ability to run the program). Each cagegory is set for the owner of that file (user), everyone in that user's group (group), and then for everyone else on the system (other). When you issue an ls -l for each file will be listed a ten character string. The first chacter will be a dash (-) if its a regular file, a 'd' if its a directory, or an 'l' if its a symbolic link (kinda like a windows shortcut). Other less common letters may appear, which I won't cover. The next nine characters are broken up to three sets of three. The first three apply to 'user,' or the owner of that file. Each of the three characters represent either an r for read, a w for write, or an x for execute. If they have permissions to read, write, or execute that file, the corresponding letter will appear, if not, a dash will. The next set of three characters apply to the file owner's group, with r, w, and x in the same manner. And the last set of three are for 'other,' meaning the permissions (r, w, and x) for everyone else on that system. So a permissions string of -rwxr--r-- means that its a regular file (not a directory or link), that the owner of that file can read it, make changes to it, and execute it. Also, we see that the group that the user belongs to can also read the file (but not change or execute it), and that everyone else can read it but nothing else. Unix is set up much like DOS, in that there are directories with subdirectories, and a root directory. Intead of C:\tools\ftp you would see /tools/ftp. The slashes are foreward instead of back, and there is no drive letter - root is simply /. Oftentimes, if you find a Unix machine on the Internet, it is connected to a variety of other computers. What's more exiciting is that the Unix machine you just broke into may be directly connected to another, mor secret Unix computer that was behind a firewall (meaning that you normally wouldn't be able to just telnet to it from your home computer, and it probably didn't show up on a subnet scan). If you telnet from your hacked Unix account, to another unix machine, your source IP address becomes that of the unix machine you are on (this is often done to deter authorities from tracing a hack). So lets pretend you run a subnet scan on your target network, looking for a computer called secret.network.com. Among others, you find comp1.network.com, comp2.network.com, and comp3.network.com. But no computer named secret. And if you try to telnet to secret.network.com, you're connection lasts only a split second. Firewall.After a few hours of plugging away gets you a rootshell on comp2. You then telnet from comp2 to secret, and are presented with a logon prompt. Why can you now connect to secret? Because your IP address is now comp2's, meaning secret is set up to allow connections from computers only on its network - and it thinks you are comp2. For a list of connected Unix machines, look at /etc/hosts. When you first log into a machine with a username and password you 'hacked,' find out what group that accont belongs to, and get a feel for what kinds of stuff you have access to, and what you don't. If you find yourself with just about zero access to anything fun, you'll have to use the account you have to obtain one with more privelages. For more info on Unix, get a Unix book, or read the Unix Bible text file (available at The CyberUnderground). This is one operating system that you will need to know, and well, if you plan on becoming eleet. For some basic Unix commands, look at Appendix B at the end of this text. NT Until recently, UNIX machines make up the vast majority of machines on the Internet. Windows NT has eaten up some of that percintile. Now, somewhere between 10% and 15% of machines you'll find on the Net are NT boxes. NT machines ship and are compatable with almost as many services as UNIX, with a few differences. Generally, you won't find as many open ports on a Windows box because they don't use raw sockets like the various flavors of Unix (a socket is a two-way connection between two computers, using any protocol). NT Server ships with and FTP server (IIS). Finger servers can also be purchased for NT machines. SMTP and POP (Post Office Protocol) servers come with Microsoft Exchange, which is pretty commonplace. One port that will give your target away as a Windows box is an open port 139. This is the port for NBT, or 'nbsession' according to some portscanners. Unix machines use strictly TCP/P for communications (making them ideal machines for the Internet), whereas NT uses NetBIOS (NetBIOS does not work over the Internet, so NT Servers must utilize NetBIOS over TCP/IP in oder to do so), or what they call NetBEUI (NetBIOS Extended User Interface). To connect to an NT machine, you must use Microsoft Client. Using MS Client to connec to a NetBIOS port on a Windows machine is similar in nature to telnetting to port 23 on a UNIX machine. If you have Windows 95 / 98 / NT, you have Microsoft Client. It might not have it installed though. To check, go to Control Panel, then Network. You should then see a list of protocols you have installed on your machine. In order to use MS Client, you need NetBEUI, Client for Microsoft Networks, and (of course) TCP/IP. If you are missing any of these, click on 'Add' and add the appropriate client or protocol (you'll probably need Windows disks). To use MS Client, open a DOS box. The command you will be using is 'net.' Type 'net' to see a list of Net commands. Some of these cannot be issued from a DOS windows. The two you as a hacker should be concened with are 'net view' and 'net use'. If ever you come across a machine with an open port 139, there is a chance that the machine has open shares on it. A Windows share is a directory somewhere on the server (beit Windows 95, 98, or NT) that is set up to be accessed by others in the network. Sometimes they are password protected, sometimes not. Once connected to a share, you can use regular DOS commands (cd, mkdir, edit, etc.) to move about and manipulate files within it. To look for shares on an NT box with NetBIOS, at a DOS prompt type: net view \\[ip address] Again, this will only work if you have NetBEUI, TCP/IP, and Client for Microsoft Networks installed on your computer. If there are any open shares, they will be listed by name after you issue this command. So lets say you net view some.server.net, and are told that there is a share called 'users'. To connect to it, type: net use [d]: \\[ip address]\[sharename] or in this case... net use w: \\some.server.net\users where w: is the drive letter you are mapping a share to. If you get a 'the command was completed succesfully' then you are connected to the share. Change drives to w: (or whatever drive letter you picked) and hit 'dir.' Now, lets say that the share 'users' was 'C:\network\users' on the NT box. Your drive w: is now C:\network\users, though you can't go any higher up the filesystem than where you start. Unlike UNIX, you won't be alble to issue a command to see what permissoins you have - so you'll just have to try it out. Create and erase a file. Make and delete a directory. You could have only read permissions, or you may have read and write (read files and modify them). If you see a file you want a copy of, do someting like this: type fileIwant.txt > C:\mybox\fileIwant.txt And it will copy over to your machine. If ever you come across a passworded share, you have a few options on how to get past the protection. You could get the password hashes and crack them with L0phtCrack (explained later). Or, you could write a batch file that connects to the share, then spits passwords from a wordlist (available all over). If you aren't skilled at writing batch files, get yourself a good DOS book, and at least find out about commands and DOS environment variables. You could make yourself quite a powerfull brute force share-cracker batch file in under 20 lines. I personally use VB for brute force engie making. Also, if you want to quickly search an entire (or even multiple) subnet(s) for open shares, use a sharescanner such as Legion. One last thing on shares - often times Administrators hide certain shares. This means that it wont show up on a Net View. But if you connect to it (Net Use) by name, you will be granted access. Below is a list of common hidden shares: ADMIN$ (remote administration - can you say rootshell?) IPC$ (these are really fun...) SMB$ (samba server) SMBSERVER$ The dollar sign at the ends is what makes it a hidden share. You must include it in your Net Use command. One last note on NT hacking. The WINS (Windows Internet Naming Service) protocol is responsible for translating NetBEUI names (NetBIOS uses computer names instead of addresses) to IP addresses. To look at the WINS configuration of any computer, use the nbtstat command. Furthermore, the file lmhosts.sam on any windows machine will act as a mini WINS table if WINS itself is disabled (TCP/IP properties under Control Panel/Network). What does this mean to you as a hacker? Lets say the NT computer you are trying to break into is 200.23.54.1. Do an nbtstat -A 200.23.54.1 to get its NetBEUI over TCP/IP info. Of importance is any entry with a <20> hex value - this means the computer is sharing (and that you can connect via the NET command, or in the technique I'm about to explain). A <00> means that this is the computer's name. So to connect to the computer, add it to your lmhosts.sam file. The entry would look something like: 200.23.54.1 compname #pre Then, reload your NBT cache by issuing a nbtstat -R Your computer now knows how to directly 'NetBEUI into' that machine. Go to Find on your start menu, then Computers, and type in the computer name. If you did everything correctly and have your network configurations correct (see above for instructions on how to do it), that computer will pop up. To connect, just double click on it. I suggest copying a shortcut to your desktop, or your Network Neighborhood. Novell Netware Unix machines still claim most machines on the Net. NT is catching up, and between the Posix and Microsoft platforms, you wont find much else on the Internet. Once in a great while, however, you just might run into a completely different operating system. Novell Netware used to be the biggest Client/Server Network Operating System around, and rivals NT to this day. So just in case you run into one of these foreign systems, here is a little info on Novell Netware. Netware has been around for quite some time - the first version was command-line and sat on top of DOS. Now GUI (Graphical User Interfaces) clients exist for it, and version 4.5 has been released. Like Windows NT, computing is not centralized (like Unix), and resources are distributed among the network. One computer may be a print server, on might be a mail server, another a file server. The thing that makes Netware unique is what's called the NDS database, or Novell Directory Services. The NDS is comparable to an NT network's PDC's registry. It is a heirarchticle representation of the entire network. At the root of the NDS tree is the object 'root,' similary to a root directory. Stemming from the root object, are one or more 'organizational' objects, comparable to subdirectories. Inside these objects can be more organizational objects, or what are known as 'leaf' objects, comparable to files. These leaf objects are what make up the conceptual network. Leaves include user objects, representing users of the network, server objects, representing servers, and so on. The organizational units exist for no other reason to conceptually organize the network. The whole idea of an NDS is sometimes hard to grasp at first, due to its being so abstract, but greatly eases administration. When you refer to a specific file on a hard disk, you refer to its path. When you refer to an NDS object's location, you refer to its context. Paths start with root at the left, such as: C:\Winnt\programs\file.ini Contexts, on the other, hand, start with the root at the right, such as: .user22.market.UAS wherer user22 is the object we are referring to. We don't need to specify root because its assumed that root is always after the last organizational unit listed. The context above specifies the user22 object, which is in the organizational unit 'market,' which resides in the organization 'UAS.' When referring to objects absolutelty (full context), you must start the context with a perions (.), and separate each entry with a period also. Now if your current working context was .market.UAS (same concept as a current working directory), you could refer to user22 relatively (just as in Unix or DOS filesystems) with simply: user22 with no period. Now, Netware networks are usually GUI interfaces. If you ever connect to a Novell server over the Net, you will have to navigate it commandline, though. Mapping network drives to Netware volumes (simiar to a Windows share) as you would to an NT machine, with the MAP command. You would change your context and navigate the NDS with the CX command. In order to do this, you will need to get your hands on a Netware client. You can get a free command-line client at www.novell.com. Now each user in a Novell network is represented by a user leaf object on the NDS tree. So to log in as user22 who's object is in the marketing.UAS container, you have to log in as: .user22.marketing.UAS Mapping drives to Netware volumes is done in one of two ways. You can either specify the server name you are connecting to physically, such as: map x: servername/volumename or by its NDS object, such as map x: server_nds_object:volumename When trying to break into a Novell server on the net, with say, an IP address of 212.14.6.2, you would issue this command (with a novell client in a DOS box): map x: 212.14.6.2/volumename It is beond the scope of this text to get into great detail about all the commands and innerworkings of Netware, so feel free to jump into a Netware book. Really. "Unbeleivable - a Hacker!" The object of your hack will most likely be to obtain root, ie: total control over the network. With a rootshell (any shell with root privelages, such as the superuser account) you can read, write, and execute everything on the network (or at least that particular computer). To obtain root, you'll probably have to break in with some other account first. From there you can run a local exploit, download the password file, or whatever. Sploits A local sploit (exploit) is a program that exploits some security bug inherint in the operating system, and will greatly increase your access levels, oftentimes to root. There are many exploits out there, for many different network operating systems. One of the most common of these is the Buffer Overflow (also known as a Stack Overflow). This is a technique which when ran, the OS's buffer (a container of memory set aside by the OS for data it's working with) if filled with garbage. When the buffer is "filled," the last string on the stack can be executed, to do such things as initate a root shell. To use any exploit, of course, you need to have an account that you can log into FTP with and upload the exploit from your computer to the server you want to run it on. You then need to log in via telnet and run it. Exploits are OS and version specific, and it's sometimes hard to find one for a specific one (they are usually available all over the Internet). If this is the case, you'll have to resort to more traditional methods of getting root. Like cracking the password file. The Password File In the /etc directory (UNIX) is a file called passwd, which holds every password for every user, along with some other information. Unfortunately for you, the passwords are encrypted. This means you'll have to download the password file and crack it on your own computer. You'll use a password cracker such as John the Ripper for this. Another security feature system administrators will use to keep hackers out is password shadowing. If shadowing is done (and oftentimes is), all the encrypted passwords will be replaced with *'s or x's. These are not crackable. The real password hashes (encrypted passwords) are most likely on a different file, such as /etc/master.passwd, or /ect/shadow. Look around. To give you an idea of what to look for, here is an encrypted password file: root:2fkbNba29uWys:0:1:Operator:/:/bin/csh admin:rYsKMjnvRppro:100:11:WWW administrator:/home/Common/WWW:/bin/csh kangaroo:3A62i9qr:1012:10:Hisaharu Here is a shadowed password file: root:*:0:1:Operator:/:/bin/csh admin:*:100:11:WWW administrator:/home/Common/WWW:/bin/csh kangaroo:*:1012:10:Hisaharu TANAKA:/home/user/kangaroo:/usr/local/bin/tcsh At any rate, when you crack these, depending on the encryption strength and passwords used, you should get a handfull of valid usernames and passwords. If you didn't get the root password, you could also use one that belongs to the same group as root (such as admin or sysop). One note about root: a lot of systems are set up so that root cannot log in remotely (from outside). This means you'll have to log in as someone else, then use the 'su' command and enter the root password (su is used for system administrators to jump around from account to account, and stands for 'substitute user.') NT passwords are a little different. They are kept in the registry, not just a file like Unix, which makes them harder to get your hands on. They are encrypted as well. There are a few ways to get them. Since most of the registry is held in memory while the computer runs, you can do a core dump, or more specifically, a registry dump. You'll need L0phtCrack to do this, and Windows NT (so now might be a good idea to put an NT partition on your hard drive). If you are physically near the NT box you want to hack, just install L0phtCrack and select the Registry Dump option. Otherwise, you have two options on getting the password hashes (encryped password) over the Internet. If the NT machine allows for remote registry sharing (not common), and you have NT at home, you can extract the password from your target's registry with L0phtCrack. Just enter your target's IP address, and in a few seconds you'll find out if it allows for RRS or not. If not, you have only on option left. Windows NT registry's are made up of Hives. Each hive is stored in a *._ file. The hive with the passwords in it is SAM._. So why don't you just download it like a UNIX password file? Because NT is set up not to let anyone see, copy, or modify the SAM hive. Your only hope is to boot your target machine into an alternative OS, like Linux or DOS, then get the file (NT protects the file, DOS and Linux doesn't). This is difficultover the net. It is, however possible. Also, you'll need a program that will allow DOS (which uses the FAT filesystem) or Linux (which uses the EXT2 filesystem) access the partition that SAM._ is on (which is in an NTFS filesystem partition). Once in a while, though, you may come across copies of the hives (all with ._ extentions) stored in a directory like 'repair' or 'reg_backup'. With all the work that it takes to get NT passwords, you're usually better off trying some other method of getting in, like exploits. Infiltration Again, every open port (port that you found during your portscan) is a door to the insides of that computer. To find out how each port is a potential point of infiltration for you, you'll need to find out a little more about each protocol. Do some research. For now, I've provided a little info on how you can use these protocols against the computer. Again, when you log in via a telnet port, it as if you are directly connected to and part of that network. One of the first things you should try is the "front door." Telnet to the machine, and try some commonly used username and password combinations. Next, try each of the email addressed you've collected. About one in twenty people are dumb enough to use thier first name or login name as thier password (assuming they are allowed to set thier own password), so try that too. Chances are this won't work (though its a good idea to try anyways), so you can move on to hacking in through various ports. Oftentimes the FTP service allows for anonymous logins (logging in with 'ftp' as a username and no password). When you do so, your home directory will be something like /usr/daemon/ftp or /home/ftp. However, if you issue a pwd (to find what directory you're currently in), it will say that your pwd is / (root). This means that you are in a restricted shell. So if after logging in anonymously you cd (change directory) to lib, you will be told that you are in /lib, while you'll really be in /home/ftp/lib, or whatever. System admins like to put /bin's and /etc's in the ftp directory, and in the /etc will be a password file - but don't get your hopes up - 99% of the time its shadowed. Anonymous ftp access is realy only helpful if you can download usefull information. If you see an open finger port, this could be the break you were looking for. Use a finger client and do a generic query (no usernames) to possibly get a list of users logged on. Next try putting an @ symbol in front of the domain you are querying, for a list of all users, logged on or not. For specific user information, type in username@domain. If you see a port called 'nbsession' open, you may also be in luck. This usually means that this particular server is an NT box (much less commonly used than Unix). Refer to the NT section. The rlogin port may be another point of infiltration. This is kind of like telnet, though older and not as secure. Telnet to it and see what you can do. The Gopher protocol was used as a text transfer protocol before the days of HTML, the WWW, and graphics on the web. If you come across a gopher port, use a browser with a built in gopher client (newer versions of Navigator and MIE) and connect to it. You'd be amazed as to what the gopher service will sometimes let you see. Write down any other ports you see. Telnet to them all, and see what happens. If after you telnet in nothing happens, issue commands, hit enter a few times. Play around - as I said before, 80% of what you will know will come from experience, not texts. Remote Sploits Another way to use the FTP and SMTP ports against the server is with a remote exploit. Local exploits are those that you execute on the server, whereas remote exploits you launch from your computer. Both can be found on various sploit archives on the Net. Remote, as with local exploits, are service and version specific, in that they exploit a security bug inherint in the programming of the service itself. If the FTP port has the service wu-ftp ver 2.2.4, go out and find the exploit for that exact service of that exact version. If the SMTP port is running sendmail 8.8.8, get the sploit for it. These exploits will be in the form of C code (usually), so you'll need to compile them. Most assume that you have specific header files (*.h), so you may need to find those as well - look at the code to be sure. To make obtaining the header files and compiling the exploits a heck of a lot easier, you ought to think about putting a Linux partition on your hard drive. At any rate, most remote exploits, if correctly implemented, when lauched give you root access, or at least access. To find out what service an FTP port is running, telnet to it, it might just tell you. If not, use the SYST command, and then you'll be told. You may have to log in to do so - try doing so anonymously. As far as SMTP, it hides its service software and version much less often that FTP does. Eleet Hacker Tactics Up to this point, you've learned the basics of various NOS's, and how the Internet works. "When will we get to the core hacking stuff?" You have been - breaking into a system is nothing more than understanding it thouroughly, knowing the 'rules', what you can and can't do. Hacking is taking what you know, and using that to circumvent usually half-hearted attempts to keep casual onlookers from being where they aren't supposed to be. Your most powerfull weapon is a braud knowlege of computers and networks, and thourough knowlege of your target. Meaning go get yourself a Unix boox. Well, now that you know the basics of hacking, I'll go into some more advanced tactics you can employ to gain access to computers on the Internet. Service Exploitation One of the first things you should do when you target a particular machine is telnet to every port and find out what services are running. Find out what FTP service, what POP and SMTP daemons are running (when you telnet to the appropriate port, it will usually tell you). Then go to sploit archives like www.securityfocus.com, www.roothshell.com, and subscribe to BugTraq and NT BugTraq. Look up every service/daemon you find, as well as the Operating system. Most exploits are in C, so you'll need to put a Linux partition on your hard drive to get it to compile and run. If you have problems compiling the sploits, brush up on your UNIX C utilities. Look in the manpages for cc, gcc, and make (if there is a makefile, which makes compiling the sploits lots easier). CGI Exploitation CGI (Common Gateway Interface) is a method used to make web pages more interactive. For example. You visit your account at Hotmail. You type your username and password into the text boxes, and click 'enter.' The hotmail computer then reads what you typed, and runs a script (which could be in a variety of programming or scripting languages) that logs you into your account. That's CGI. Anytime you interface with the website (such as search engines) you are using CGI. CGI adds lots of functionality, and lots of security issues. There are currently all kinds of know CGI exploitations. Two old ones are http://www.someserver.com/cgi-bin/phf and http://www.someserver.com/cgi-bin/finger. If the file in question (/cgi-bin/finger) exists, and you request it, you will get a box up. In the box, type: root ; mail you@youremail.address < /etc/passwd. What this does when the computer runs the script is issue the command: finger (whatever you type in the box). The ; operator starts a new command, which in this case is displaying the password file on your browser. Copy it, paste it into a text file, and crack it. To find CGI exploits, get a CGI exploit scanner (such as WebChk, available at The CyberUnderground) or use on on a web site such as CyberArmy.com or infinityzone.cjb.net. Another problem with CGI is that webservers that are CGI enabled have special 'CGI executable direcories'. These include /cgi-bin/ (Unix), /cg-win/, and /cgi-dos/ (windows machines). The HTTP daemon knows to execute any file requested in those directories. Normally, when you type www.someserver.com/index.html, all that is happening is the daemon sends you a copy of index.html. If you type www.someserver.com/cgi-bin/program, the daemon will actually run program, if it exists. The output of this proccess is usually exported to HTML format and sent to your computer. You as a hacker could exploit this, though, by running programs of your own on the remote machine (if, say, you had FTP access but not telnet). Great for spawning exploits. In order to find out whether or not a particular web serveris vulnerable (ie: has a CGI file somewhere on it that can be used to gain access), you can do a number of things. Download WebChk to scan for you. Go to a website such as infinityzone.cjb.net and use thier built in CGI scanner. Or, for best results, obtain a list of vulnerable CGI files/servers and use a browswer to scan for them manually. Doing things yourself, rather than useing canned hacker tools, always provides better results along with expanding your own knowlege. Sniffiing and Keylogging Oftentimes you'll need to break into not-so-interesting computers to get to your ultimate goal. If you are trying to break into your target network's webserber (www.yourgarget.com), and while trying, found a vulnerability in thier mail server (mail.yourtarget.com), you have a few options on how to get into the webserver from the mailserver. If you install a sniffer (available at many hacker sites), it will look at all data passing it on the network for passwords and the like. It will copy and store that information in a file for you to peridically check. Sniffing (which is considered an eleet hacker tactic), if done correctly, almost always provides results. Another option is installing a keylogger on the mailserver. Any keystrokes entered on that computer are kept in a log file. Periodically check the file, and you'll usually come up with a password to something else interesting. Be carefull though. If you don't hide your sniffers or keyloggers well, you stand a good chance of getting busted, or at least losing any access you had. Leapfrogging Most firewalls keep you out of 90% of any given network on the Internet. How? They look at your IP address, and determine if it should allow you in or not. Usually, this is a router (a piece of hardware used to connect different networks) that has a list of IP addresses to accept. If yours is not in that list, it will reject your connection. It's a good bet that this list contains mostly machines inside that network, or from a few other trusted networks. Oftentimes router firewalls let connections pass from other computers in the same subnet. Lets pretend you are 203.22.54.77. You want to get into admin.somecorp.com (34.14.91.15), which is behind the firewall. Www.somecorp.com is (like most webservers are) in front of the firewall, and is 34.14.91.3. If you try to telnet to admin, chances are you wont even get a login prompt, just a 'connectoin failed' messege. But if you telnet to www, then to admin, your IP address is that of www's - 34.14.91.3. Which is in the same subnet of admin, and will most likely be accepted in. And there you have your login prompt at admon.somecorp.com. This is conceptually hacking around a firewall. To break right through, well, you'd better be elite. Trojans Dont assume that once you have access (beit a rootshell or just user or guest access) to a computer, you always will. One good way to increase your chances of keeping access to this computer is to put in a back door of some kind. The easiest (and arguably most helpful to a hacker) is a Trojan Horse. Trojans come in all shapes and sizes, for all kinds of OS's. The two most popular are Back Orifice (BO 2000 just came out), and NetBus. Both are for Windows boxes (try RootKit for a UNIX trojan). BO by itself is commandline, but GUI's (Graphical User Interfaces) are available for it. BO has a server (that you install on your target) and a client program (that you use at home to controll your target). With it, you can browse and manipulate data and directories on your target. You can send message boxes to the computer to scare people on it. NetBus, on the other hand, has more functions than BO (like screenshots of your victim, opening and closing the CD-ROM, etc), but doesn't hide itself quite as well as BO. NetBus, like BO, has a client and a server. Though Trojans are extrememly fun to scare sysadmins, if you want to keep your access to the box, you should only use it as a backdoor. Port Hacking If you cant find any exploits for the daemon you've found, that doesn't mean its not vulnerable. Theoretically, every daemon bound to a TCP port is vulnerable to be used an access point to the computers insides. Telnet to the port, and interact with the daemon. At the top of your telnet window is the word 'Telnet.' As soon as it says 'Telnet - www.yourtarget.com' (or some IP address) you are connected, have established a session, whether you see text or not. Send controll characters (control-x, control-c, etc). Type commands like, GET, GO, START, LOGON, INIT, START, etc. If what you type doesn't show up on the screen, that means that the daemon isn't echoing your characters back to you - turn on your local echo so you can see what you are typing. For example, did you know that when browsers connect to the HTTP port, they issue commands based on URL's you request? You can do this manually - telnet to port 80, issue a GET command with the page you want to view, hit enter twice, and the HTML will pour accross the screen. You are doing manually what Netscape, Internet Explorer, and Lynx do for you (except, browsers parse the HTML into readable text). Any client program that communicates with a server program on some port is just issuing various commands to the daemon based on how the user interacts with the client interface. Some times, an initialization command needs to be issued before the daemon will talk to you. Try anything you can think of. Also, it helps to know what types of programs are bound the the port you are hacking. Refer to the RFC on well known ports at the end of this text. One last note on this topic. Sometimes, sysadmins, authorized users, and even other hackers will bind a daemon to some extremely high port number as a back door. Casual portscans will miss these, unless they are set to scan to high numbers. If you see port 12345 or 31337 open on some computer, someone was here before you - these are the defaults used by the NetBus and Back Orifice trojans. Also, lazy system administrators sometimes put daemons on high port numbers that let them telnet in without a password. The morale of this story? Always scan to at least 40000. Brute Force When all else fails, you might be left with no other option than a brute force attack. This means hurling usernames and passwords at sytem until it cracks. Use the list of commonly used combination supplimented with this text. Spend time trying to crack individual email addresses. Honestly, you havn't made a full-hearted brute force attempt untill you've spent at least two or three hours doing nothing but trying different combinations. Since Unix login prompts wont tell you if you've used a valid login name or not, narrow it down! Here is a quick list on how to obtain usernames: *If port 59 (finger) is open, you will be able to obtain lots of usernames. Telnet in! *Telnet to port 25 (SMTP) and use the VRFY command to verify the existence of usernames. Type HELP for more commands. *Any email addresses on the network's webiste will be valid usernames. *Look at the /etc/passwd file of any Unix machine (including one of your own). There are tons of default usernames that get used all the time. Also, you could write a program (or shell script if you have a Unix box yourself) to spit usernames and passwords from a dictionary wordlist fill at the system (available all around the Net, usually in suppliment to password crackers). If you want to become eleet eventually, you'll need to learn at least a little about at least a few programming languages. The easiest (yet still effective) language to learn, especially for newbies, is Visual Basic. I once wrote a VB prog that used NetCat, and repeatedly telnetted to my target and spat usernames (from a list that I compiled that I knew to be valid usernames) and passwords (from a huge dictionary file), and redirected all output to my screen and a log file. I'm no programming expert, but with an hour of coding and another of debugging, all I had to do was sit back and watch as my little proggie automated a brute force attack with decent speed. Just remember - brute force will always work, eventually. Firewall Penetration Ahh firewalls. Technology with only one purpose - keeping hackers out. Many newbies are intimidated by a system they know has a firewall, and don't even bother. Technically, though, every network has a firewall. A firewall, by definition, is nothing more than a system used to secure the network. Nothing specific, just that and nothing more. So if all that is blocking a network from outside access in a UNIX login prompt, that is its firewall. Generally speaking, though, when we refer to a firewall, there are a few distinct levels. Here I'll explain those levels, and how to circumvent them. Routers as Firewalls When you scan a class C subnet, and find three computers, do you think that those are the only three computers on that network? Not usually. Every network that is connected to the Internet is connected via a complex piece of hardware known as a router. Routers route packets of data based on the source IP address of the sending machine, and the destination IP address of the receiving machine. Similarly, routers can block certain IP addresses. Every packet of data sent to any computer in your target network must pass through the router connecting the two, and if the router is programmed to not let connections be made to one particular computer, it will discard all packets sent to it, thus blocking you from connecting to it. Also, routers can be setup to allow connections to certain machines, but block certain port numbers. So if you scan a machine that has an open port 23 but is being blocked by the router, you won't be able to establish a connection. It is rare, though, that routers are configured to disallow connections from all IP addresses. Generally, it will allow a select number of IP addresses through. Like affiliate companies, or different networks of the same company. So how do you penetrate a firewall router that won't let you through? Masquarade as a trusted computer. Bounce your connection off a computer that the router might let by. For example, lets say you hacked an account on the webserver (port 23 was not blocked). That's not enough for you - you want root on the hub computer of the network. But port 23 is blocked on it. You might connect to the webserver, then, from it, telnet to your target machine. Chances are the router will let you connect - why wouldn't it let a computer from its own network connect? Any computer that is blocked by a IP filtering router is said to be behind the firewall. Any that is not blocked is said to be in front of the firewall. There are a number of computers that cannot be behind a firewall. The web server, for example. How could people get the web page of your target if it was blocked? Also, mail servers have to be in front of the firewall, so that emails aren't blocked, and get sent t appropriate recipient. Name servers (computers with port 59, DNS, open) also cannot be blocked, as they are the computers that translate names (such as www.microsoft.com) into a network IP address. The trick to connecting to a computer blocked by a packet filtering router is to masquarade as a computer in a trusted network, or from a computer in front of the firewall. There are other ways to masquarade as a computer from inside your target network to pass through a firewall. What if your target machine is an NT Server? There is no telnet daemon. Well, if there are NT servers on the network, there will be NT Workstations and Windows 9x boxes too. And those machines will probably have internet access. How do they connect to the internet? Via a proxy server - all HTTP requests are directed to the designated proxy server, who requests the URL for them, gets it from whatever webserver the web page is on, and sends it back to the workstation inside the internal network that originally requested it. Remember that when computers surf the Internet via a proxy server, thier IP address (to the Internet) is that of the proxy servers (read the 'keeping from getting caught' section for more details on how this works, or check the definition of 'proxy server' at the beginning of this text). So how do you connect to a webpage inside on an internal computer that is blocked by the router? Connect via the network's proxy server. If a proxy server exists (which one will, 99% of the time), it cannot be blocked by a firewall - how would the requested web pages be sent back to it if it were? Okay, so we know that one of the computers that turned up on a subnet scan is probably a proxy server. Your next step is to use it to make connections for you. Go to your Netscape of Internet Explorer settings, and select 'proxies.' (Note: proxy setting on your Internet Prefferences of Control Panel only work if you are physically connected to the a proxy server, meaning on the same LAN as it.) For HTTP ports, try 80, 8080, 88, and 8888. For FTP, try 21, 2121, etc. Its less common, though, for proxy servers to be setup to handle FTP proxying. So for each computer you found on the subnet, enter it in as a proxy server in your browser settings, hit 'Okay,' and then just request any web page. Www.hackers.com, or whatever. On the bottom of your screen, you will see your browser attemptint to connect to the proxy server. If you get an error message, the computer is not a proxy server, or you specified the wrong port number (try some others). If the web page you requested shows up on your browser - congratulations, you connected to the proxy. Now request pages (or an FTP session) with a computer behind the firewall - chances are it will let you in since your IP address is now the proxy sever's when making connections of the protocol you specified to use proxies for (and again, firewalls generally allow connections from computers of its own network). Now, proxy servers will allow computers to use it as a proxy based on a set of criteria. These are: *Always - any computer connecting will be allowed to use this proxy (known as a public proxy) *Depending on who connects to it, ie: the IP address of the connecting computer, or *If the connecting computer can validate itself with a username and password If you are prompted with a username and password request, you are not out of luck. Get yourself WebCrack, enter the proxy server as the target machine, and launch an attack. Proxy server authentication is exactly the same as password protection of private web pages, and WebCrack will brute force untill its let in. Once you find a valid username and password combo, you will be able to use the proxy. Now connect to the computer blocked by the router. You've just cracked a firewall. Private IP Networks as Firewalls Certain ranges of IP addresses are known as 'private.' For example, all the 10.x.x.x (class A) networks are private, and if you try to connect (telnet, http, whatever) to one of these addresses, the address will not resolve (ie: you wont be able to connect). Often times, companys will buy a range of private IP addresses, in order to keep hackers out. This is another form of a firewall. However, if the company wants thier network connected to the internet in any fashion (for thier workstations to be able to surf, or for email, or whatever), at least on computer has to have an public IP address, meaning an IP address that the Internet (and therefor you) can connect to. This computer is a proxy server of types, and generally has two Network Interface Cards (adapters used to connect network cable to), one with one of the private addresses, on with a public address. This 'public' computer, being the specialized proxy server, will (unlike your computer, and any other on the Internet) understand the private address. So to connect to the 10.x.x.x (or whatever private address your target uses internally), you'll need to connect to the proxy server. If its a Unix machine, you'll have to get an account with telnet access, and telnet from it to your destination. If its a Windows machine, you'll have to use the proxying method explained above. Since the proxy server is the only computer on the entire Internet that is able to connect to the private network protected by this type of network, you will have to connect through it. One other option is hacking into it, and installing a port redirector program. For example: if you can install NetBus onto the computer, you can set it to redirect all connections made to a port you specify to another address. So lets say when you try to connect to 10.2.56.14 (reserverd) with telnet, you get a 'failed to resolve address' message, meaning that address is not on the Internet, and your computer (nor any other on the Internet) understands that address. But you know that 204.56.87.5 (an address that is on the Internet, and that you can connect to) is the proxy server for the 10.2.56 network. You break in, install NetBus, and set the port redirector to 10.2.56.14. Next - telnet to 204.56.87.5 (on the port you specified to be redirected) and sine 204.56.87.5 knows where 10.2.56.14 is, your connection will be bounced over to that machine. Congrats - you've just penatrated another firewall. In Summary With this text I've scratched the surface of the hacking of today. If nothing else, you should have learned just how much you're going to have to learn to become a proficient hacker. You'll need to learn more about various protocols, about different operating systems. Learning programming languages such as C or Perl would definitely help you. There are a lot of programs out there, but most do the same as its legitimate counterpart would do, and don't allow much room for fine tuning. Emagine the power in the ability to write a target-specific program to aid you in hacking it! Anyways, I also strongly suggest installing Linux on your machine as well. Unix is more powerfull (and therefore more complex) than DOS and Windows, and the only way you'll learn anything about it is to have it (not to mention raw sockets!). Even a book wouldn't be of much use if you had nothing to apply what you've learned on. When faced with a challeng that you don't quite understand, fumble your way through. Try not to ask for help all the time. You'll learn a lot more that way - and not just about the obstacle in question. In closing, let me say that you should never decide that you know enough. An unquenchable thirst for knowlege is what drives the real hacker. The process, not the end result. I guess I see no better way to end this text than with my favorite quote (from a good friend of mine): "What do you want to hack today?" < Kurruppt2k > Appendix A - Commonly used and default usernames/passwords root: root sys: sys / system / bin bin: sys / bin mountfsys: mountfsys adm: adm uucp: uucp nuucp: anon anon: anon user: user games: games install: install demo: demo / tour / guest umountfsys: umountfsys sync: sync admin: admin guest: guest daemon: daemon qadmin: adm / admin sys: sys system / bin 123: lotus / lotus123 anonuucp: anon / uucp asg: device / devadmin backup: save / tar csr: support / castup dbcat: database / catalog default: user / guest diag: diag / sysdiag(s) field: fld / test / support end: visitor / demo / tour informix: database ingres: database lib: library / syslib lp: print / lpadmin / main: sysmaint / service mail: mail / email / phones manager: mgr / man ncrm: ncr net: netowrk netinst: inst / install / net netman: net / man / mgr netmgr: mgr / man / net network: net nobody: anon nuucp: anon oasys: oa odt: opendesktop oper: operator / sysop sysop: sysadm / sysop ftp: ftp / anon / anonymous telnet: telnet visitor: anon / guest www: webmaster / webadmin Appendix B - Unix commands Here are some basic commands that work on most Unix flavors cd [dir] change directory to [dir]. cd with no arguments will place you in your home directory. pwd tells you what directory you're currently in. ls lists the files in your pwd ls -a lists all files in your pwd, even hidden files (files that begin with a period) ls -l lists the files in your pwd, and gives the permissions for them cat [file] displays the file you argue on the screen, equivalent to 'type' in DOS vi, emacs, and pico text editors, similar to MS-DOS Edit man [command] gives you the manual (help pages) on a particular command - USE THIS!!! cp [src][dst] copy a file rm [file] delete a file mv [file] move or rename a file mkdir create a directory chmod change permissions of a file you own grep search a file for a particular string talk chat with a user mail, pine and elm email utilities Also, if you are fermilliar with DOS redirects, appends, and pipes, they work similarly in Unix. Remember, when in doubt, RTFM! Appendix C - Further Reading There are lots of text on hacking and Internet security out there, and a few books as well. As stated at the beginning of this one, a large portion of those are vague and too theroized to be of use to anyone. So here is a small collection of recommended reading I put together. Texts Hacking Kit (www.hackers.com) - focuses on UNIX hacking, and has lots of c code for various utlities and exploits. Hacker's Desk Reference (www.hackersclub.com/km/fils/hfiles) - focuses on NT and Windows Networking environments. A great resource, but might be a bit much for newbies. Guides to Mostly Harmless Hacking (www.happyhacker.org) this series is great for green hackers. They provide step-by-step methods and techniques on a variety of topics, from encryption to Windows hacking, to Unix, etc. Books Maximum Security - "The Hacker's Bible." This book will not give you step-by-step instructions on how to hack. If you already know a lot of the basics, this book is a must. The second edition is about two inches thick. Even when you become "elite," this book is a great reference to have around. Happy Hacker - a compilation of the GtMHH's. A good book for aspiring hackers. Inside TCP/IP - gives you a wide knowlege of the protocol used on the Internet, and explains how to use it to set up all kinds of servers (web, FTP, etc). The Big Unix Book - you will need to know Unix, so grab this book too. Windows NT Core Technology - if you want to know the innerworkings of NT, grab this one too. The Rainbow Books - priceless resources to any hacker... but I won't tell you any more. Appendix D - Commonly known UDP and TCP ports PORT NUMBERS The port numbers are divided into three ranges: the Well Known Ports, the Registered Ports, and the Dynamic and/or Private Ports. The Well Known Ports are those from 0 through 1023. The Registered Ports are those from 1024 through 49151 The Dynamic and/or Private Ports are those from 49152 through 65535 WELL KNOWN PORT NUMBERS The Well Known Ports are assigned by the IANA and on most systems can only be used by system (or root) processes or by programs executed by privileged users. Ports are used in the TCP [RFC793] to name the ends of logical connections which carry long term conversations. For the purpose of providing services to unknown callers, a service contact port is defined. This list specifies the port used by the server process as its contact port. The contact port is sometimes called the "well-known port". To the extent possible, these same port assignments are used with the UDP [RFC768]. The assigned ports use a small portion of the possible port numbers. For many years the assigned ports were in the range 0-255. Recently, the range for assigned ports managed by the IANA has been expanded to the range 0-1023. Port Assignments: Keyword Decimal Description References 0/tcp Reserved 0/udp Reserved # Jon Postel tcpmux 1/tcp TCP Port Service Multiplexer tcpmux 1/udp TCP Port Service Multiplexer # Mark Lottor compressnet 2/tcp Management Utility compressnet 2/udp Management Utility compressnet 3/tcp Compression Process compressnet 3/udp Compression Process # Bernie Volz # 4/tcp Unassigned # 4/udp Unassigned rje 5/tcp Remote Job Entry rje 5/udp Remote Job Entry # Jon Postel # 6/tcp Unassigned # 6/udp Unassigned echo 7/tcp Echo echo 7/udp Echo # Jon Postel # 8/tcp Unassigned # 8/udp Unassigned discard 9/tcp Discard discard 9/udp Discard # Jon Postel # 10/tcp Unassigned # 10/udp Unassigned systat 11/tcp Active Users systat 11/udp Active Users # Jon Postel # 12/tcp Unassigned # 12/udp Unassigned daytime 13/tcp Daytime (RFC 867) daytime 13/udp Daytime (RFC 867) # Jon Postel # 14/tcp Unassigned # 14/udp Unassigned # 15/tcp Unassigned [was netstat] # 15/udp Unassigned # 16/tcp Unassigned # 16/udp Unassigned qotd 17/tcp Quote of the Day qotd 17/udp Quote of the Day # Jon Postel msp 18/tcp Message Send Protocol msp 18/udp Message Send Protocol # Rina Nethaniel <---none---> chargen 19/tcp Character Generator chargen 19/udp Character Generator ftp-data 20/tcp File Transfer [Default Data] ftp-data 20/udp File Transfer [Default Data] ftp 21/tcp File Transfer [Control] ftp 21/udp File Transfer [Control] # Jon Postel ssh 22/tcp SSH Remote Login Protocol ssh 22/udp SSH Remote Login Protocol # Tatu Ylonen telnet 23/tcp Telnet telnet 23/udp Telnet # Jon Postel 24/tcp any private mail system 24/udp any private mail system # Rick Adams smtp 25/tcp Simple Mail Transfer smtp 25/udp Simple Mail Transfer # Jon Postel # 26/tcp Unassigned # 26/udp Unassigned nsw-fe 27/tcp NSW User System FE nsw-fe 27/udp NSW User System FE # Robert Thomas # 28/tcp Unassigned # 28/udp Unassigned msg-icp 29/tcp MSG ICP msg-icp 29/udp MSG ICP # Robert Thomas # 30/tcp Unassigned # 30/udp Unassigned msg-auth 31/tcp MSG Authentication msg-auth 31/udp MSG Authentication # Robert Thomas # 32/tcp Unassigned # 32/udp Unassigned dsp 33/tcp Display Support Protocol dsp 33/udp Display Support Protocol # Ed Cain # 34/tcp Unassigned # 34/udp Unassigned 35/tcp any private printer server 35/udp any private printer server # Jon Postel # 36/tcp Unassigned # 36/udp Unassigned time 37/tcp Time time 37/udp Time # Jon Postel rap 38/tcp Route Access Protocol rap 38/udp Route Access Protocol # Robert Ullmann rlp 39/tcp Resource Location Protocol rlp 39/udp Resource Location Protocol # Mike Accetta # 40/tcp Unassigned # 40/udp Unassigned graphics 41/tcp Graphics graphics 41/udp Graphics name 42/tcp Host Name Server name 42/udp Host Name Server nameserver 42/tcp Host Name Server nameserver 42/udp Host Name Server nicname 43/tcp Who Is nicname 43/udp Who Is mpm-flags 44/tcp MPM FLAGS Protocol mpm-flags 44/udp MPM FLAGS Protocol mpm 45/tcp Message Processing Module [recv] mpm 45/udp Message Processing Module [recv] mpm-snd 46/tcp MPM [default send] mpm-snd 46/udp MPM [default send] # Jon Postel ni-ftp 47/tcp NI FTP ni-ftp 47/udp NI FTP # Steve Kille auditd 48/tcp Digital Audit Daemon auditd 48/udp Digital Audit Daemon # Larry Scott tacacs 49/tcp Login Host Protocol (TACACS) tacacs 49/udp Login Host Protocol (TACACS) # Pieter Ditmars re-mail-ck 50/tcp Remote Mail Checking Protocol re-mail-ck 50/udp Remote Mail Checking Protocol # Steve Dorner la-maint 51/tcp IMP Logical Address Maintenance la-maint 51/udp IMP Logical Address Maintenance # Andy Malis xns-time 52/tcp XNS Time Protocol xns-time 52/udp XNS Time Protocol # Susie Armstrong domain 53/tcp Domain Name Server domain 53/udp Domain Name Server # Paul Mockapetris xns-ch 54/tcp XNS Clearinghouse xns-ch 54/udp XNS Clearinghouse # Susie Armstrong isi-gl 55/tcp ISI Graphics Language isi-gl 55/udp ISI Graphics Language xns-auth 56/tcp XNS Authentication xns-auth 56/udp XNS Authentication # Susie Armstrong 57/tcp any private terminal access 57/udp any private terminal access # Jon Postel xns-mail 58/tcp XNS Mail xns-mail 58/udp XNS Mail # Susie Armstrong 59/tcp any private file service 59/udp any private file service # Jon Postel 60/tcp Unassigned 60/udp Unassigned ni-mail 61/tcp NI MAIL ni-mail 61/udp NI MAIL # Steve Kille acas 62/tcp ACA Services acas 62/udp ACA Services # E. Wald whois++ 63/tcp whois++ whois++ 63/udp whois++ # Rickard Schoultz covia 64/tcp Communications Integrator (CI) covia 64/udp Communications Integrator (CI) # "Tundra" Tim Daneliuk # tacacs-ds 65/tcp TACACS-Database Service tacacs-ds 65/udp TACACS-Database Service # Kathy Huber sql*net 66/tcp Oracle SQL*NET sql*net 66/udp Oracle SQL*NET # Jack Haverty bootps 67/tcp Bootstrap Protocol Server bootps 67/udp Bootstrap Protocol Server bootpc 68/tcp Bootstrap Protocol Client bootpc 68/udp Bootstrap Protocol Client # Bill Croft tftp 69/tcp Trivial File Transfer tftp 69/udp Trivial File Transfer # David Clark gopher 70/tcp Gopher gopher 70/udp Gopher # Mark McCahill netrjs-1 71/tcp Remote Job Service netrjs-1 71/udp Remote Job Service netrjs-2 72/tcp Remote Job Service netrjs-2 72/udp Remote Job Service netrjs-3 73/tcp Remote Job Service netrjs-3 73/udp Remote Job Service netrjs-4 74/tcp Remote Job Service netrjs-4 74/udp Remote Job Service # Bob Braden 75/tcp any private dial out service 75/udp any private dial out service # Jon Postel deos 76/tcp Distributed External Object Store deos 76/udp Distributed External Object Store # Robert Ullmann 77/tcp any private RJE service 77/udp any private RJE service # Jon Postel vettcp 78/tcp vettcp vettcp 78/udp vettcp # Christopher Leong finger 79/tcp Finger finger 79/udp Finger # David Zimmerman http 80/tcp World Wide Web HTTP http 80/udp World Wide Web HTTP www 80/tcp World Wide Web HTTP www 80/udp World Wide Web HTTP www-http 80/tcp World Wide Web HTTP www-http 80/udp World Wide Web HTTP # Tim Berners-Lee hosts2-ns 81/tcp HOSTS2 Name Server hosts2-ns 81/udp HOSTS2 Name Server # Earl Killian xfer 82/tcp XFER Utility xfer 82/udp XFER Utility # Thomas M. Smith mit-ml-dev 83/tcp MIT ML Device mit-ml-dev 83/udp MIT ML Device # David Reed <--none---> ctf 84/tcp Common Trace Facility ctf 84/udp Common Trace Facility # Hugh Thomas mit-ml-dev 85/tcp MIT ML Device mit-ml-dev 85/udp MIT ML Device # David Reed <--none---> mfcobol 86/tcp Micro Focus Cobol mfcobol 86/udp Micro Focus Cobol # Simon Edwards <--none---> 87/tcp any private terminal link 87/udp any private terminal link # Jon Postel kerberos 88/tcp Kerberos kerberos 88/udp Kerberos # B. Clifford Neuman su-mit-tg 89/tcp SU/MIT Telnet Gateway su-mit-tg 89/udp SU/MIT Telnet Gateway # Mark Crispin ########### PORT 90 also being used unofficially by Pointcast ######### dnsix 90/tcp DNSIX Securit Attribute Token Map dnsix 90/udp DNSIX Securit Attribute Token Map # Charles Watt mit-dov 91/tcp MIT Dover Spooler mit-dov 91/udp MIT Dover Spooler # Eliot Moss npp 92/tcp Network Printing Protocol npp 92/udp Network Printing Protocol # Louis Mamakos dcp 93/tcp Device Control Protocol dcp 93/udp Device Control Protocol # Daniel Tappan objcall 94/tcp Tivoli Object Dispatcher objcall 94/udp Tivoli Object Dispatcher # Tom Bereiter <--none---> supdup 95/tcp SUPDUP supdup 95/udp SUPDUP # Mark Crispin dixie 96/tcp DIXIE Protocol Specification dixie 96/udp DIXIE Protocol Specification # Tim Howes swift-rvf 97/tcp Swift Remote Virtural File Protocol swift-rvf 97/udp Swift Remote Virtural File Protocol # Maurice R. Turcotte # tacnews 98/tcp TAC News tacnews 98/udp TAC News # Jon Postel metagram 99/tcp Metagram Relay metagram 99/udp Metagram Relay # Geoff Goodfellow newacct 100/tcp [unauthorized use] hostname 101/tcp NIC Host Name Server hostname 101/udp NIC Host Name Server # Jon Postel iso-tsap 102/tcp ISO-TSAP Class 0 iso-tsap 102/udp ISO-TSAP Class 0 # Marshall Rose gppitnp 103/tcp Genesis Point-to-Point Trans Net gppitnp 103/udp Genesis Point-to-Point Trans Net acr-nema 104/tcp ACR-NEMA Digital Imag. & Comm. 300 acr-nema 104/udp ACR-NEMA Digital Imag. & Comm. 300 # Patrick McNamee <--none---> cso 105/tcp CCSO name server protocol cso 105/tcp CCSO name server protocol # Martin Hamilton csnet-ns 105/tcp Mailbox Name Nameserver csnet-ns 105/udp Mailbox Name Nameserver # Marvin Solomon 3com-tsmux 106/tcp 3COM-TSMUX 3com-tsmux 106/udp 3COM-TSMUX # Jeremy Siegel rtelnet 107/tcp Remote Telnet Service rtelnet 107/udp Remote Telnet Service # Jon Postel snagas 108/tcp SNA Gateway Access Server snagas 108/udp SNA Gateway Access Server # Kevin Murphy pop2 109/tcp Post Office Protocol - Version 2 pop2 109/udp Post Office Protocol - Version 2 # Joyce K. Reynolds pop3 110/tcp Post Office Protocol - Version 3 pop3 110/udp Post Office Protocol - Version 3 # Marshall Rose sunrpc 111/tcp SUN Remote Procedure Call sunrpc 111/udp SUN Remote Procedure Call # Chuck McManis mcidas 112/tcp McIDAS Data Transmission Protocol mcidas 112/udp McIDAS Data Transmission Protocol # Glenn Davis ident 113/tcp auth 113/tcp Authentication Service auth 113/udp Authentication Service # Mike St. Johns audionews 114/tcp Audio News Multicast audionews 114/udp Audio News Multicast # Martin Forssen sftp 115/tcp Simple File Transfer Protocol sftp 115/udp Simple File Transfer Protocol # Mark Lottor ansanotify 116/tcp ANSA REX Notify ansanotify 116/udp ANSA REX Notify # Nicola J. Howarth uucp-path 117/tcp UUCP Path Service uucp-path 117/udp UUCP Path Service sqlserv 118/tcp SQL Services sqlserv 118/udp SQL Services # Larry Barnes nntp 119/tcp Network News Transfer Protocol nntp 119/udp Network News Transfer Protocol # Phil Lapsley cfdptkt 120/tcp CFDPTKT cfdptkt 120/udp CFDPTKT # John Ioannidis erpc 121/tcp Encore Expedited Remote Pro.Call erpc 121/udp Encore Expedited Remote Pro.Call # Jack O'Neil <---none---> smakynet 122/tcp SMAKYNET smakynet 122/udp SMAKYNET # Mike O'Dowd ntp 123/tcp Network Time Protocol ntp 123/udp Network Time Protocol # Dave Mills ansatrader 124/tcp ANSA REX Trader ansatrader 124/udp ANSA REX Trader # Nicola J. Howarth locus-map 125/tcp Locus PC-Interface Net Map Ser locus-map 125/udp Locus PC-Interface Net Map Ser # Eric Peterson unitary 126/tcp Unisys Unitary Login unitary 126/udp Unisys Unitary Login # locus-con 127/tcp Locus PC-Interface Conn Server locus-con 127/udp Locus PC-Interface Conn Server # Eric Peterson gss-xlicen 128/tcp GSS X License Verification gss-xlicen 128/udp GSS X License Verification # John Light pwdgen 129/tcp Password Generator Protocol pwdgen 129/udp Password Generator Protocol # Frank J. Wacho cisco-fna 130/tcp cisco FNATIVE cisco-fna 130/udp cisco FNATIVE cisco-tna 131/tcp cisco TNATIVE cisco-tna 131/udp cisco TNATIVE cisco-sys 132/tcp cisco SYSMAINT cisco-sys 132/udp cisco SYSMAINT statsrv 133/tcp Statistics Service statsrv 133/udp Statistics Service # Dave Mills ingres-net 134/tcp INGRES-NET Service ingres-net 134/udp INGRES-NET Service # Mike Berrow <---none---> epmap 135/tcp DCE endpoint resolution epmap 135/udp DCE endpoint resolution # Joe Pato profile 136/tcp PROFILE Naming System profile 136/udp PROFILE Naming System # Larry Peterson netbios-ns 137/tcp NETBIOS Name Service netbios-ns 137/udp NETBIOS Name Service netbios-dgm 138/tcp NETBIOS Datagram Service netbios-dgm 138/udp NETBIOS Datagram Service netbios-ssn 139/tcp NETBIOS Session Service netbios-ssn 139/udp NETBIOS Session Service # Jon Postel emfis-data 140/tcp EMFIS Data Service emfis-data 140/udp EMFIS Data Service emfis-cntl 141/tcp EMFIS Control Service emfis-cntl 141/udp EMFIS Control Service # Gerd Beling bl-idm 142/tcp Britton-Lee IDM bl-idm 142/udp Britton-Lee IDM # Susie Snitzer <---none---> imap 143/tcp Internet Message Access Protocol imap 143/udp Internet Message Access Protocol # Mark Crispin uma 144/tcp Universal Management Architecture uma 144/udp Universal Management Architecture # Jay Whitney uaac 145/tcp UAAC Protocol uaac 145/udp UAAC Protocol # David A. Gomberg iso-tp0 146/tcp ISO-IP0 iso-tp0 146/udp ISO-IP0 iso-ip 147/tcp ISO-IP iso-ip 147/udp ISO-IP # Marshall Rose jargon 148/tcp Jargon jargon 148/udp Jargon # Bill Weinman aed-512 149/tcp AED 512 Emulation Service aed-512 149/udp AED 512 Emulation Service # Albert G. Broscius sql-net 150/tcp SQL-NET sql-net 150/udp SQL-NET # Martin Picard <<---none---> hems 151/tcp HEMS hems 151/udp HEMS bftp 152/tcp Background File Transfer Program bftp 152/udp Background File Transfer Program # Annette DeSchon sgmp 153/tcp SGMP sgmp 153/udp SGMP # Marty Schoffstahl netsc-prod 154/tcp NETSC netsc-prod 154/udp NETSC netsc-dev 155/tcp NETSC netsc-dev 155/udp NETSC # Sergio Heker sqlsrv 156/tcp SQL Service sqlsrv 156/udp SQL Service # Craig Rogers knet-cmp 157/tcp KNET/VM Command/Message Protocol knet-cmp 157/udp KNET/VM Command/Message Protocol # Gary S. Malkin pcmail-srv 158/tcp PCMail Server pcmail-srv 158/udp PCMail Server # Mark L. Lambert nss-routing 159/tcp NSS-Routing nss-routing 159/udp NSS-Routing # Yakov Rekhter sgmp-traps 160/tcp SGMP-TRAPS sgmp-traps 160/udp SGMP-TRAPS # Marty Schoffstahl snmp 161/tcp SNMP snmp 161/udp SNMP snmptrap 162/tcp SNMPTRAP snmptrap 162/udp SNMPTRAP # Marshall Rose cmip-man 163/tcp CMIP/TCP Manager cmip-man 163/udp CMIP/TCP Manager cmip-agent 164/tcp CMIP/TCP Agent smip-agent 164/udp CMIP/TCP Agent # Amatzia Ben-Artzi <---none---> xns-courier 165/tcp Xerox xns-courier 165/udp Xerox # Susie Armstrong s-net 166/tcp Sirius Systems s-net 166/udp Sirius Systems # Brian Lloyd namp 167/tcp NAMP namp 167/udp NAMP # Marty Schoffstahl rsvd 168/tcp RSVD rsvd 168/udp RSVD # Neil Todd send 169/tcp SEND send 169/udp SEND # William D. Wisner print-srv 170/tcp Network PostScript print-srv 170/udp Network PostScript # Brian Reid multiplex 171/tcp Network Innovations Multiplex multiplex 171/udp Network Innovations Multiplex cl/1 172/tcp Network Innovations CL/1 cl/1 172/udp Network Innovations CL/1 # Kevin DeVault <<---none---> xyplex-mux 173/tcp Xyplex xyplex-mux 173/udp Xyplex # Bob Stewart mailq 174/tcp MAILQ mailq 174/udp MAILQ # Rayan Zachariassen vmnet 175/tcp VMNET vmnet 175/udp VMNET # Christopher Tengi genrad-mux 176/tcp GENRAD-MUX genrad-mux 176/udp GENRAD-MUX # Ron Thornton xdmcp 177/tcp X Display Manager Control Protocol xdmcp 177/udp X Display Manager Control Protocol # Robert W. Scheifler nextstep 178/tcp NextStep Window Server NextStep 178/udp NextStep Window Server # Leo Hourvitz bgp 179/tcp Border Gateway Protocol bgp 179/udp Border Gateway Protocol # Kirk Lougheed ris 180/tcp Intergraph ris 180/udp Intergraph # Dave Buehmann unify 181/tcp Unify unify 181/udp Unify # Vinod Singh <--none---> audit 182/tcp Unisys Audit SITP audit 182/udp Unisys Audit SITP # Gil Greenbaum ocbinder 183/tcp OCBinder ocbinder 183/udp OCBinder ocserver 184/tcp OCServer ocserver 184/udp OCServer # Jerrilynn Okamura <--none---> remote-kis 185/tcp Remote-KIS remote-kis 185/udp Remote-KIS kis 186/tcp KIS Protocol kis 186/udp KIS Protocol # Ralph Droms aci 187/tcp Application Communication Interface aci 187/udp Application Communication Interface # Rick Carlos mumps 188/tcp Plus Five's MUMPS mumps 188/udp Plus Five's MUMPS # Hokey Stenn qft 189/tcp Queued File Transport qft 189/udp Queued File Transport # Wayne Schroeder gacp 190/tcp Gateway Access Control Protocol gacp 190/udp Gateway Access Control Protocol # C. Philip Wood prospero 191/tcp Prospero Directory Service prospero 191/udp Prospero Directory Service # B. Clifford Neuman osu-nms 192/tcp OSU Network Monitoring System osu-nms 192/udp OSU Network Monitoring System # Doug Karl srmp 193/tcp Spider Remote Monitoring Protocol srmp 193/udp Spider Remote Monitoring Protocol # Ted J. Socolofsky irc 194/tcp Internet Relay Chat Protocol irc 194/udp Internet Relay Chat Protocol # Jarkko Oikarinen dn6-nlm-aud 195/tcp DNSIX Network Level Module Audit dn6-nlm-aud 195/udp DNSIX Network Level Module Audit dn6-smm-red 196/tcp DNSIX Session Mgt Module Audit Redir dn6-smm-red 196/udp DNSIX Session Mgt Module Audit Redir # Lawrence Lebahn dls 197/tcp Directory Location Service dls 197/udp Directory Location Service dls-mon 198/tcp Directory Location Service Monitor dls-mon 198/udp Directory Location Service Monitor # Scott Bellew smux 199/tcp SMUX smux 199/udp SMUX # Marshall Rose src 200/tcp IBM System Resource Controller src 200/udp IBM System Resource Controller # Gerald McBrearty <---none---> at-rtmp 201/tcp AppleTalk Routing Maintenance at-rtmp 201/udp AppleTalk Routing Maintenance at-nbp 202/tcp AppleTalk Name Binding at-nbp 202/udp AppleTalk Name Binding at-3 203/tcp AppleTalk Unused at-3 203/udp AppleTalk Unused at-echo 204/tcp AppleTalk Echo at-echo 204/udp AppleTalk Echo at-5 205/tcp AppleTalk Unused at-5 205/udp AppleTalk Unused at-zis 206/tcp AppleTalk Zone Information at-zis 206/udp AppleTalk Zone Information at-7 207/tcp AppleTalk Unused at-7 207/udp AppleTalk Unused at-8 208/tcp AppleTalk Unused at-8 208/udp AppleTalk Unused # Rob Chandhok qmtp 209/tcp The Quick Mail Transfer Protocol qmtp 209/udp The Quick Mail Transfer Protocol # Dan Bernstein z39.50 210/tcp ANSI Z39.50 z39.50 210/udp ANSI Z39.50 # Mark Needleman # 914c/g 211/tcp Texas Instruments 914C/G Terminal 914c/g 211/udp Texas Instruments 914C/G Terminal # Bill Harrell <---none---> anet 212/tcp ATEXSSTR anet 212/udp ATEXSSTR # Jim Taylor ipx 213/tcp IPX ipx 213/udp IPX # Don Provan vmpwscs 214/tcp VM PWSCS vmpwscs 214/udp VM PWSCS # Dan Shia softpc 215/tcp Insignia Solutions softpc 215/udp Insignia Solutions # Martyn Thomas <---none---> CAIlic 216/tcp Computer Associates Int'l License Server CAIlic 216/udp Computer Associates Int'l License Server # Chuck Spitz dbase 217/tcp dBASE Unix dbase 217/udp dBASE Unix # Don Gibson # mpp 218/tcp Netix Message Posting Protocol mpp 218/udp Netix Message Posting Protocol # Shannon Yeh uarps 219/tcp Unisys ARPs uarps 219/udp Unisys ARPs # Ashok Marwaha <---none---> imap3 220/tcp Interactive Mail Access Protocol v3 imap3 220/udp Interactive Mail Access Protocol v3 # James Rice fln-spx 221/tcp Berkeley rlogind with SPX auth fln-spx 221/udp Berkeley rlogind with SPX auth rsh-spx 222/tcp Berkeley rshd with SPX auth rsh-spx 222/udp Berkeley rshd with SPX auth cdc 223/tcp Certificate Distribution Center cdc 223/udp Certificate Distribution Center # Kannan Alagappan # 224-241 Reserved # Jon Postel direct 242/tcp Direct direct 242/udp Direct # Herb Sutter sur-meas 243/tcp Survey Measurement sur-meas 243/udp Survey Measurement # Dave Clark dayna 244/tcp Dayna dayna 244/udp Dayna # Steve Bateman link 245/tcp LINK link 245/udp LINK dsp3270 246/tcp Display Systems Protocol dsp3270 246/udp Display Systems Protocol # Weldon J. Showalter subntbcst_tftp 247/tcp SUBNTBCST_TFTP subntbcst_tftp 247/udp SUBNTBCST_TFTP # John Fake bhfhs 248/tcp bhfhs bhfhs 248/udp bhfhs # John Kelly # 249-255 Reserved # Jon Postel rap 256/tcp RAP rap 256/udp RAP # J.S. Greenfield set 257/tcp Secure Electronic Transaction set 257/udp Secure Electronic Transaction # Donald Eastlake yak-chat 258/tcp Yak Winsock Personal Chat yak-chat 258/udp Yak Winsock Personal Chat # Brian Bandy esro-gen 259/tcp Efficient Short Remote Operations esro-gen 259/udp Efficient Short Remote Operations # Mohsen Banan openport 260/tcp Openport openport 260/udp Openport # John Marland nsiiops 261/tcp IIOP Name Service over TLS/SSL nsiiops 261/udp IIOP Name Service over TLS/SSL # Jeff Stewart arcisdms 262/tcp Arcisdms arcisdms 262/udp Arcisdms # Russell Crook (rmc@sni.ca> hdap 263/tcp HDAP hdap 263/udp HDAP # Troy Gau # 264-279 Unassigned http-mgmt 280/tcp http-mgmt http-mgmt 280/udp http-mgmt # Adrian Pell # personal-link 281/tcp Personal Link personal-link 281/udp Personal Link # Dan Cummings cableport-ax 282/tcp Cable Port A/X cableport-ax 282/udp Cable Port A/X # Craig Langfahl # 283-308 Unassigned entrusttime 309/tcp EntrustTime entrusttime 309/udp EntrustTime # Peter Whittaker bhmds 310/tcp bhmds bhmds 310/udp bhmds # John Kelly asip-webadmin 311/tcp AppleShare IP WebAdmin asip-webadmin 311/udp AppleShare IP WebAdmin # Ann Huang vslmp 312/tcp VSLMP vslmp 312/udp VSLMP # Gerben Wierda netfusion 313/tcp Net Fusion netfusion 313/udp Net Fusion # Karl Rousseau opalis-robot 314/tcp Opalis Robot opalis-robot 314/udp Opalis Robot # Laurent Domenech, Opalis dpsi 315/tcp DPSI dpsi 315/udp DPSI # Tony Scamurra decauth 316/tcp decAuth decauth 316/udp decAuth # Michael Agishtein zannet 317/tcp Zannet zannet 317/udp Zannet # Zan Oliphant # 318-343 Unassigned pdap 344/tcp Prospero Data Access Protocol pdap 344/udp Prospero Data Access Protocol # B. Clifford Neuman pawserv 345/tcp Perf Analysis Workbench pawserv 345/udp Perf Analysis Workbench zserv 346/tcp Zebra server zserv 346/udp Zebra server fatserv 347/tcp Fatmen Server fatserv 347/udp Fatmen Server csi-sgwp 348/tcp Cabletron Management Protocol csi-sgwp 348/udp Cabletron Management Protocol mftp 349/tcp mftp mftp 349/udp mftp # Dave Feinleib matip-type-a 350/tcp MATIP Type A matip-type-a 350/udp MATIP Type A matip-type-b 351/tcp MATIP Type B matip-type-b 351/udp MATIP Type B # Alain Robert # The following entry records an unassigned but widespread use bhoetty 351/tcp bhoetty (added 5/21/97) bhoetty 351/udp bhoetty # John Kelly dtag-ste-sb 352/tcp DTAG (assigned long ago) dtag-ste-sb 352/udp DTAG # Ruediger Wald # The following entry records an unassigned but widespread use bhoedap4 352/tcp bhoedap4 (added 5/21/97) bhoedap4 352/udp bhoedap4 # John Kelly ndsauth 353/tcp NDSAUTH ndsauth 353/udp NDSAUTH # Jayakumar Ramalingam bh611 354/tcp bh611 bh611 354/udp bh611 # John Kelly datex-asn 355/tcp DATEX-ASN datex-asn 355/udp DATEX-ASN # Kenneth Vaughn cloanto-net-1 356/tcp Cloanto Net 1 cloanto-net-1 356/udp Cloanto Net 1 # Michael Battilana bhevent 357/tcp bhevent bhevent 357/udp bhevent # John Kelly shrinkwrap 358/tcp Shrinkwrap shrinkwrap 358/udp Shrinkwrap # Bill Simpson tenebris_nts 359/tcp Tenebris Network Trace Service tenebris_nts 359/udp Tenebris Network Trace Service # Eric Jacksch scoi2odialog 360/tcp scoi2odialog scoi2odialog 360/udp scoi2odialog # Keith Petley semantix 361/tcp Semantix semantix 361/udp Semantix # Semantix srssend 362/tcp SRS Send srssend 362/udp SRS Send # Curt Mayer rsvp_tunnel 363/tcp RSVP Tunnel rsvp_tunnel 363/udp RSVP Tunnel # Andreas Terzis aurora-cmgr 364/tcp Aurora CMGR aurora-cmgr 364/udp Aurora CMGR # Philip Budne dtk 365/tcp DTK dtk 365/udp DTK # Fred Cohen odmr 366/tcp ODMR odmr 366/udp ODMR # Randall Gellens mortgageware 367/tcp MortgageWare mortgageware 367/udp MortgageWare # Ole Hellevik qbikgdp 368/tcp QbikGDP qbikgdp 368/udp QbikGDP # Adrien de Croy # 369-370 Unassigned clearcase 371/tcp Clearcase clearcase 371/udp Clearcase # Dave LeBlang ulistproc 372/tcp ListProcessor ulistproc 372/udp ListProcessor # Anastasios Kotsikonas legent-1 373/tcp Legent Corporation legent-1 373/udp Legent Corporation legent-2 374/tcp Legent Corporation legent-2 374/udp Legent Corporation # Keith Boyce <---none---> hassle 375/tcp Hassle hassle 375/udp Hassle # Reinhard Doelz nip 376/tcp Amiga Envoy Network Inquiry Proto nip 376/udp Amiga Envoy Network Inquiry Proto # Heinz Wrobel # Dale L. Larson tnETOS 377/tcp NEC Corporation tnETOS 377/udp NEC Corporation dsETOS 378/tcp NEC Corporation dsETOS 378/udp NEC Corporation # Tomoo Fujita is99c 379/tcp TIA/EIA/IS-99 modem client is99c 379/udp TIA/EIA/IS-99 modem client is99s 380/tcp TIA/EIA/IS-99 modem server is99s 380/udp TIA/EIA/IS-99 modem server # Frank Quick hp-collector 381/tcp hp performance data collector hp-collector 381/udp hp performance data collector hp-managed-node 382/tcp hp performance data managed node hp-managed-node 382/udp hp performance data managed node hp-alarm-mgr 383/tcp hp performance data alarm manager hp-alarm-mgr 383/udp hp performance data alarm manager # Frank Blakely arns 384/tcp A Remote Network Server System arns 384/udp A Remote Network Server System # David Hornsby ibm-app 385/tcp IBM Application ibm-app 385/udp IBM Application # Lisa Tomita <---none---> asa 386/tcp ASA Message Router Object Def. asa 386/udp ASA Message Router Object Def. # Steve Laitinen aurp 387/tcp Appletalk Update-Based Routing Pro. aurp 387/udp Appletalk Update-Based Routing Pro. # Chris Ranch unidata-ldm 388/tcp Unidata LDM Version 4 unidata-ldm 388/udp Unidata LDM Version 4 # Glenn Davis ldap 389/tcp Lightweight Directory Access Protocol ldap 389/udp Lightweight Directory Access Protocol # Tim Howes uis 390/tcp UIS uis 390/udp UIS # Ed Barron <---none---> synotics-relay 391/tcp SynOptics SNMP Relay Port synotics-relay 391/udp SynOptics SNMP Relay Port synotics-broker 392/tcp SynOptics Port Broker Port synotics-broker 392/udp SynOptics Port Broker Port # Illan Raab dis 393/tcp Data Interpretation System dis 393/udp Data Interpretation System # Paul Stevens embl-ndt 394/tcp EMBL Nucleic Data Transfer embl-ndt 394/udp EMBL Nucleic Data Transfer # Peter Gad netcp 395/tcp NETscout Control Protocol netcp 395/udp NETscout Control Protocol # Anil Singhal <---none---> netware-ip 396/tcp Novell Netware over IP netware-ip 396/udp Novell Netware over IP mptn 397/tcp Multi Protocol Trans. Net. mptn 397/udp Multi Protocol Trans. Net. # Soumitra Sarkar kryptolan 398/tcp Kryptolan kryptolan 398/udp Kryptolan # Peter de Laval iso-tsap-c2 399/tcp ISO Transport Class 2 Non-Control over TCP iso-tsap-c2 399/udp ISO Transport Class 2 Non-Control over TCP # Yanick Pouffary work-sol 400/tcp Workstation Solutions work-sol 400/udp Workstation Solutions # Jim Ward ups 401/tcp Uninterruptible Power Supply ups 401/udp Uninterruptible Power Supply # Charles Bennett genie 402/tcp Genie Protocol genie 402/udp Genie Protocol # Mark Hankin <---none---> decap 403/tcp decap decap 403/udp decap nced 404/tcp nced nced 404/udp nced ncld 405/tcp ncld ncld 405/udp ncld # Richard Jones <---none---> imsp 406/tcp Interactive Mail Support Protocol imsp 406/udp Interactive Mail Support Protocol # John Myers timbuktu 407/tcp Timbuktu timbuktu 407/udp Timbuktu # Marc Epard prm-sm 408/tcp Prospero Resource Manager Sys. Man. prm-sm 408/udp Prospero Resource Manager Sys. Man. prm-nm 409/tcp Prospero Resource Manager Node Man. prm-nm 409/udp Prospero Resource Manager Node Man. # B. Clifford Neuman decladebug 410/tcp DECLadebug Remote Debug Protocol decladebug 410/udp DECLadebug Remote Debug Protocol # Anthony Berent rmt 411/tcp Remote MT Protocol rmt 411/udp Remote MT Protocol # Peter Eriksson synoptics-trap 412/tcp Trap Convention Port synoptics-trap 412/udp Trap Convention Port # Illan Raab smsp 413/tcp SMSP smsp 413/udp SMSP infoseek 414/tcp InfoSeek infoseek 414/udp InfoSeek # Steve Kirsch bnet 415/tcp BNet bnet 415/udp BNet # Jim Mertz silverplatter 416/tcp Silverplatter silverplatter 416/udp Silverplatter # Peter Ciuffetti onmux 417/tcp Onmux onmux 417/udp Onmux # Stephen Hanna hyper-g 418/tcp Hyper-G hyper-g 418/udp Hyper-G # Frank Kappe ariel1 419/tcp Ariel ariel1 419/udp Ariel # Jonathan Lavigne smpte 420/tcp SMPTE smpte 420/udp SMPTE # Si Becker <71362.22@CompuServe.COM> ariel2 421/tcp Ariel ariel2 421/udp Ariel ariel3 422/tcp Ariel ariel3 422/udp Ariel # Jonathan Lavigne opc-job-start 423/tcp IBM Operations Planning and Control Start opc-job-start 423/udp IBM Operations Planning and Control Start opc-job-track 424/tcp IBM Operations Planning and Control Track opc-job-track 424/udp IBM Operations Planning and Control Track # Conny Larsson icad-el 425/tcp ICAD icad-el 425/udp ICAD # Larry Stone smartsdp 426/tcp smartsdp smartsdp 426/udp smartsdp # Alexander Dupuy svrloc 427/tcp Server Location svrloc 427/udp Server Location # ocs_cmu 428/tcp OCS_CMU ocs_cmu 428/udp OCS_CMU ocs_amu 429/tcp OCS_AMU ocs_amu 429/udp OCS_AMU # Florence Wyman utmpsd 430/tcp UTMPSD utmpsd 430/udp UTMPSD utmpcd 431/tcp UTMPCD utmpcd 431/udp UTMPCD iasd 432/tcp IASD iasd 432/udp IASD # Nir Baroz nnsp 433/tcp NNSP nnsp 433/udp NNSP # Rob Robertson mobileip-agent 434/tcp MobileIP-Agent mobileip-agent 434/udp MobileIP-Agent mobilip-mn 435/tcp MobilIP-MN mobilip-mn 435/udp MobilIP-MN # Kannan Alagappan dna-cml 436/tcp DNA-CML dna-cml 436/udp DNA-CML # Dan Flowers comscm 437/tcp comscm comscm 437/udp comscm # Jim Teague dsfgw 438/tcp dsfgw dsfgw 438/udp dsfgw # Andy McKeen dasp 439/tcp dasp Thomas Obermair dasp 439/udp dasp tommy@inlab.m.eunet.de # Thomas Obermair sgcp 440/tcp sgcp sgcp 440/udp sgcp # Marshall Rose decvms-sysmgt 441/tcp decvms-sysmgt decvms-sysmgt 441/udp decvms-sysmgt # Lee Barton cvc_hostd 442/tcp cvc_hostd cvc_hostd 442/udp cvc_hostd # Bill Davidson https 443/tcp http protocol over TLS/SSL https 443/udp http protocol over TLS/SSL # Kipp E.B. Hickman snpp 444/tcp Simple Network Paging Protocol snpp 444/udp Simple Network Paging Protocol # [RFC1568] microsoft-ds 445/tcp Microsoft-DS microsoft-ds 445/udp Microsoft-DS # Pradeep Bahl ddm-rdb 446/tcp DDM-RDB ddm-rdb 446/udp DDM-RDB ddm-dfm 447/tcp DDM-RFM ddm-dfm 447/udp DDM-RFM ddm-byte 448/tcp DDM-BYTE ddm-byte 448/udp DDM-BYTE # Jan David Fisher as-servermap 449/tcp AS Server Mapper as-servermap 449/udp AS Server Mapper # Barbara Foss tserver 450/tcp TServer tserver 450/udp TServer # Harvey S. Schultz sfs-smp-net 451/tcp Cray Network Semaphore server sfs-smp-net 451/udp Cray Network Semaphore server sfs-config 452/tcp Cray SFS config server sfs-config 452/udp Cray SFS config server # Walter Poxon creativeserver 453/tcp CreativeServer creativeserver 453/udp CreativeServer contentserver 454/tcp ContentServer contentserver 454/udp ContentServer creativepartnr 455/tcp CreativePartnr creativepartnr 455/udp CreativePartnr # Jesus Ortiz macon-tcp 456/tcp macon-tcp macon-udp 456/udp macon-udp # Yoshinobu Inoue # scohelp 457/tcp scohelp scohelp 457/udp scohelp # Faith Zack appleqtc 458/tcp apple quick time appleqtc 458/udp apple quick time # Murali Ranganathan ampr-rcmd 459/tcp ampr-rcmd ampr-rcmd 459/udp ampr-rcmd # Rob Janssen skronk 460/tcp skronk skronk 460/udp skronk # Henry Strickland datasurfsrv 461/tcp DataRampSrv datasurfsrv 461/udp DataRampSrv datasurfsrvsec 462/tcp DataRampSrvSec datasurfsrvsec 462/udp DataRampSrvSec # Diane Downie alpes 463/tcp alpes alpes 463/udp alpes # Alain Durand kpasswd 464/tcp kpasswd kpasswd 464/udp kpasswd # Theodore Ts'o smtps 465/tcp smtp protocol over TLS/SSL (was ssmtp) smtps 465/udp smtp protocol over TLS/SSL (was ssmtp) # John Hemming digital-vrc 466/tcp digital-vrc digital-vrc 466/udp digital-vrc # Peter Higginson mylex-mapd 467/tcp mylex-mapd mylex-mapd 467/udp mylex-mapd # Gary Lewis photuris 468/tcp proturis photuris 468/udp proturis # Bill Simpson rcp 469/tcp Radio Control Protocol rcp 469/udp Radio Control Protocol # Jim Jennings +1-708-538-7241 scx-proxy 470/tcp scx-proxy scx-proxy 470/udp scx-proxy # Scott Narveson mondex 471/tcp Mondex mondex 471/udp Mondex # Bill Reding ljk-login 472/tcp ljk-login ljk-login 472/udp ljk-login # LJK Software, Cambridge, Massachusetts # hybrid-pop 473/tcp hybrid-pop hybrid-pop 473/udp hybrid-pop # Rami Rubin tn-tl-w1 474/tcp tn-tl-w1 tn-tl-w2 474/udp tn-tl-w2 # Ed Kress tcpnethaspsrv 475/tcp tcpnethaspsrv tcpnethaspsrv 475/tcp tcpnethaspsrv # Charlie Hava tn-tl-fd1 476/tcp tn-tl-fd1 tn-tl-fd1 476/udp tn-tl-fd1 # Ed Kress ss7ns 477/tcp ss7ns ss7ns 477/udp ss7ns # Jean-Michel URSCH spsc 478/tcp spsc spsc 478/udp spsc # Mike Rieker iafserver 479/tcp iafserver iafserver 479/udp iafserver iafdbase 480/tcp iafdbase iafdbase 480/udp iafdbase # ricky@solect.com ph 481/tcp Ph service ph 481/udp Ph service # Roland Hedberg bgs-nsi 482/tcp bgs-nsi bgs-nsi 482/udp bgs-nsi # Jon Saperia ulpnet 483/tcp ulpnet ulpnet 483/udp ulpnet # Kevin Mooney integra-sme 484/tcp Integra Software Management Environment integra-sme 484/udp Integra Software Management Environment # Randall Dow powerburst 485/tcp Air Soft Power Burst powerburst 485/udp Air Soft Power Burst # avian 486/tcp avian avian 486/udp avian # Robert Ullmann # saft 487/tcp saft Simple Asynchronous File Transfer saft 487/udp saft Simple Asynchronous File Transfer # Ulli Horlacher gss-http 488/tcp gss-http gss-http 488/udp gss-http # Doug Rosenthal nest-protocol 489/tcp nest-protocol nest-protocol 489/udp nest-protocol # Gil Gameiro micom-pfs 490/tcp micom-pfs micom-pfs 490/udp micom-pfs # David Misunas go-login 491/tcp go-login go-login 491/udp go-login # Troy Morrison ticf-1 492/tcp Transport Independent Convergence for FNA ticf-1 492/udp Transport Independent Convergence for FNA ticf-2 493/tcp Transport Independent Convergence for FNA ticf-2 493/udp Transport Independent Convergence for FNA # Mamoru Ito pov-ray 494/tcp POV-Ray pov-ray 494/udp POV-Ray # Chris Cason intecourier 495/tcp intecourier intecourier 495/udp intecourier # Steve Favor pim-rp-disc 496/tcp PIM-RP-DISC pim-rp-disc 496/udp PIM-RP-DISC # Dino Farinacci dantz 497/tcp dantz dantz 497/udp dantz # Dotty Yackle siam 498/tcp siam siam 498/udp siam # Philippe Gilbert iso-ill 499/tcp ISO ILL Protocol iso-ill 499/udp ISO ILL Protocol # Mark H. Needleman isakmp 500/tcp isakmp isakmp 500/udp isakmp # Mark Schertler stmf 501/tcp STMF stmf 501/udp STMF # Alan Ungar asa-appl-proto 502/tcp asa-appl-proto asa-appl-proto 502/udp asa-appl-proto # Dennis Dube intrinsa 503/tcp Intrinsa intrinsa 503/udp Intrinsa # Robert Ford citadel 504/tcp citadel citadel 504/udp citadel # Art Cancro mailbox-lm 505/tcp mailbox-lm mailbox-lm 505/udp mailbox-lm Beverly Moody ohimsrv 506/tcp ohimsrv ohimsrv 506/udp ohimsrv # Scott Powell crs 507/tcp crs crs 507/udp crs # Brad Wright xvttp 508/tcp xvttp xvttp 508/udp xvttp # Keith J. Alphonso snare 509/tcp snare snare 509/udp snare # Dennis Batchelder fcp 510/tcp FirstClass Protocol fcp 510/udp FirstClass Protocol # Mike Marshburn mynet 511/tcp mynet-as mynet 511/udp mynet-as # John Rainford exec 512/tcp remote process execution; # authentication performed using # passwords and UNIX loppgin names comsat 512/udp biff 512/udp used by mail system to notify users # of new mail received; currently # receives messages only from # processes on the same machine login 513/tcp remote login a la telnet; # automatic authentication performed # based on priviledged port numbers # and distributed data bases which # identify "authentication domains" who 513/udp maintains data bases showing who's # logged in to machines on a local # net and the load average of the # machine shell 514/tcp cmd # like exec, but automatic authentication # is performed as for login server syslog 514/udp printer 515/tcp spooler printer 515/udp spooler videotex 516/tcp videotex videotex 516/udp videotex # Daniel Mavrakis talk 517/tcp like tenex link, but across # machine - unfortunately, doesn't # use link protocol (this is actually # just a rendezvous port from which a # tcp connection is established) talk 517/udp like tenex link, but across # machine - unfortunately, doesn't # use link protocol (this is actually # just a rendezvous port from which a # tcp connection is established) ntalk 518/tcp ntalk 518/udp utime 519/tcp unixtime utime 519/udp unixtime efs 520/tcp extended file name server router 520/udp local routing process (on site); # uses variant of Xerox NS routing # information protocol - RIP ripng 521/tcp ripng ripng 521/udp ripng # Robert E. Minnear ulp 522/tcp ULP ulp 522/udp ULP # Max Morris ibm-db2 523/tcp IBM-DB2 ibm-db2 523/tcp IBM-DB2 # Peter Pau ncp 524/tcp NCP ncp 524/udp NCP # Don Provan timed 525/tcp timeserver timed 525/udp timeserver tempo 526/tcp newdate tempo 526/udp newdate stx 527/tcp Stock IXChange stx 527/udp Stock IXChange custix 528/tcp Customer IXChange custix 528/udp Customer IXChange # Ralph Hanan irc-serv 529/tcp IRC-SERV irc-serv 529/tcp IRC-SERV # Brian Tackett courier 530/tcp rpc courier 530/udp rpc conference 531/tcp chat conference 531/udp chat netnews 532/tcp readnews netnews 532/udp readnews netwall 533/tcp for emergency broadcasts netwall 533/udp for emergency broadcasts mm-admin 534/tcp MegaMedia Admin mm-admin 534/udp MegaMedia Admin # Andreas Heidemann iiop 535/tcp iiop iiop 535/udp iiop # Jeff M.Michaud opalis-rdv 536/tcp opalis-rdv opalis-rdv 536/udp opalis-rdv # Laurent Domenech nmsp 537/tcp Networked Media Streaming Protocol nmsp 537/udp Networked Media Streaming Protocol # Paul Santinelli Jr. gdomap 538/tcp gdomap gdomap 538/udp gdomap # Richard Frith-Macdonald apertus-ldp 539/tcp Apertus Technologies Load Determination apertus-ldp 539/udp Apertus Technologies Load Determination uucp 540/tcp uucpd uucp 540/udp uucpd uucp-rlogin 541/tcp uucp-rlogin uucp-rlogin 541/udp uucp-rlogin # Stuart Lynne commerce 542/tcp commerce commerce 542/udp commerce # Randy Epstein # Alan Bridges klogin 543/tcp klogin 543/udp kshell 544/tcp krcmd kshell 544/udp krcmd appleqtcsrvr 545/tcp appleqtcsrvr appleqtcsrvr 545/udp appleqtcsrvr # Murali Ranganathan # dhcpv6-client 546/tcp DHCPv6 Client dhcpv6-client 546/udp DHCPv6 Client dhcpv6-server 547/tcp DHCPv6 Server dhcpv6-server 547/udp DHCPv6 Server # Jim Bound afpovertcp 548/tcp AFP over TCP afpovertcp 548/udp AFP over TCP # Leland Wallace idfp 549/tcp IDFP idfp 549/udp IDFP # Ramana Kovi new-rwho 550/tcp new-who new-rwho 550/udp new-who cybercash 551/tcp cybercash cybercash 551/udp cybercash # Donald E. Eastlake 3rd deviceshare 552/tcp deviceshare deviceshare 552/udp deviceshare # Brian Schenkenberger pirp 553/tcp pirp pirp 553/udp pirp # D. J. Bernstein rtsp 554/tcp Real Time Stream Control Protocol rtsp 554/udp Real Time Stream Control Protocol # Rob Lanphier dsf 555/tcp dsf 555/udp remotefs 556/tcp rfs server remotefs 556/udp rfs server openvms-sysipc 557/tcp openvms-sysipc openvms-sysipc 557/udp openvms-sysipc # Alan Potter sdnskmp 558/tcp SDNSKMP sdnskmp 558/udp SDNSKMP teedtap 559/tcp TEEDTAP teedtap 559/udp TEEDTAP # Mort Hoffman rmonitor 560/tcp rmonitord rmonitor 560/udp rmonitord monitor 561/tcp monitor 561/udp chshell 562/tcp chcmd chshell 562/udp chcmd nntps 563/tcp nntp protocol over TLS/SSL (was snntp) nntps 563/udp nntp protocol over TLS/SSL (was snntp) # Kipp E.B. Hickman 9pfs 564/tcp plan 9 file service 9pfs 564/udp plan 9 file service whoami 565/tcp whoami whoami 565/udp whoami streettalk 566/tcp streettalk streettalk 566/udp streettalk banyan-rpc 567/tcp banyan-rpc banyan-rpc 567/udp banyan-rpc # Tom Lemaire ms-shuttle 568/tcp microsoft shuttle ms-shuttle 568/udp microsoft shuttle # Rudolph Balaz ms-rome 569/tcp microsoft rome ms-rome 569/udp microsoft rome # Rudolph Balaz meter 570/tcp demon meter 570/udp demon meter 571/tcp udemon meter 571/udp udemon sonar 572/tcp sonar sonar 572/udp sonar # Keith Moore banyan-vip 573/tcp banyan-vip banyan-vip 573/udp banyan-vip # Denis Leclerc ftp-agent 574/tcp FTP Software Agent System ftp-agent 574/udp FTP Software Agent System # Michael S. Greenberg vemmi 575/tcp VEMMI vemmi 575/udp VEMMI # Daniel Mavrakis ipcd 576/tcp ipcd ipcd 576/udp ipcd vnas 577/tcp vnas vnas 577/udp vnas ipdd 578/tcp ipdd ipdd 578/udp ipdd # Jay Farhat decbsrv 579/tcp decbsrv decbsrv 579/udp decbsrv # Rudi Martin sntp-heartbeat 580/tcp SNTP HEARTBEAT sntp-heartbeat 580/udp SNTP HEARTBEAT # Louis Mamakos bdp 581/tcp Bundle Discovery Protocol bdp 581/udp Bundle Discovery Protocol # Gary Malkin scc-security 582/tcp SCC Security scc-security 582/udp SCC Security # Prashant Dholakia philips-vc 583/tcp Philips Video-Conferencing philips-vc 583/udp Philips Video-Conferencing # Janna Chang keyserver 584/tcp Key Server keyserver 584/udp Key Server # Gary Howland imap4-ssl 585/tcp IMAP4+SSL (use 993 instead) imap4-ssl 585/udp IMAP4+SSL (use 993 instead) # Terry Gray # Use of 585 is not recommended, use 993 instead password-chg 586/tcp Password Change password-chg 586/udp Password Change submission 587/tcp Submission submission 587/udp Submission # Randy Gellens cal 588/tcp CAL cal 588/udp CAL # Myron Hattig eyelink 589/tcp EyeLink eyelink 589/udp EyeLink # Dave Stampe tns-cml 590/tcp TNS CML tns-cml 590/udp TNS CML # Jerome Albin http-alt 591/tcp FileMaker, Inc. - HTTP Alternate (see Port 80) http-alt 591/udp FileMaker, Inc. - HTTP Alternate (see Port 80) # Clay Maeckel eudora-set 592/tcp Eudora Set eudora-set 592/udp Eudora Set # Randall Gellens http-rpc-epmap 593/tcp HTTP RPC Ep Map http-rpc-epmap 593/tcp HTTP RPC Ep Map # Edward Reus tpip 594/tcp TPIP tpip 594/udp TPIP # Brad Spear cab-protocol 595/tcp CAB Protocol cab-protocol 595/udp CAB Protocol # Winston Hetherington smsd 596/tcp SMSD smsd 596/udp SMSD # Wayne Barlow ptcnameservice 597/tcp PTC Name Service ptcnameservice 597/udp PTC Name Service # Yuri Machkasov sco-websrvrmg3 598/tcp SCO Web Server Manager 3 sco-websrvrmg3 598/udp SCO Web Server Manager 3 # Simon Baldwin acp 599/tcp Aeolon Core Protocol acp 599/udp Aeolon Core Protocol # Mike Marshburn ipcserver 600/tcp Sun IPC server ipcserver 600/udp Sun IPC server urm 606/tcp Cray Unified Resource Manager urm 606/udp Cray Unified Resource Manager nqs 607/tcp nqs nqs 607/udp nqs n# Bill Schiefelbein sift-uft 608/tcp Sender-Initiated/Unsolicited File Transfer sift-uft 608/udp Sender-Initiated/Unsolicited File Transfer # Rick Troth npmp-trap 609/tcp npmp-trap npmp-trap 609/udp npmp-trap npmp-local 610/tcp npmp-local npmp-local 610/udp npmp-local npmp-gui 611/tcp npmp-gui npmp-gui 611/udp npmp-gui # John Barnes hmmp-ind 612/tcp HMMP Indication hmmp-ind 612/udp HMMP Indication hmmp-op 613/tcp HMMP Operation hmmp-op 613/udp HMMP Operation # Andrew Sinclair sshell 614/tcp SSLshell sshell 614/udp SSLshell # Simon J. Gerraty sco-inetmgr 615/tcp Internet Configuration Manager sco-inetmgr 615/udp Internet Configuration Manager sco-sysmgr 616/tcp SCO System Administration Server sco-sysmgr 616/udp SCO System Administration Server sco-dtmgr 617/tcp SCO Desktop Administration Server sco-dtmgr 617/udp SCO Desktop Administration Server # Christopher Durham dei-icda 618/tcp DEI-ICDA dei-icda 618/udp DEI-ICDA # David Turner digital-evm 619/tcp Digital EVM digital-evm 619/udp Digital EVM # Jem Treadwell sco-websrvrmgr 620/tcp SCO WebServer Manager sco-websrvrmgr 620/udp SCO WebServer Manager # Christopher Durham escp-ip 621/tcp ESCP escp-ip 621/udp ESCP # Lai Zit Seng collaborator 622/tcp Collaborator collaborator 622/udp Collaborator # Johnson Davis aux_bus_shunt 623/tcp Aux Bus Shunt aux_bus_shunt 623/udp Aux Bus Shunt # Steve Williams cryptoadmin 624/tcp Crypto Admin cryptoadmin 624/udp Crypto Admin # Matt Lachance dec_dlm 625/tcp DEC DLM dec_dlm 625/udp DEC DLM # Rudi Martin asia 626/tcp ASIA asia 626/udp ASIA # Michael Dasenbrock cks-tivioli 627/tcp CKS & TIVIOLI cks-tivioli 627/udp CKS & TIVIOLI # David Sarjantson qmqp 628/tcp QMQP qmqp 628/udp QMQP # Dan Bernstein # 629-632 Unassigned servstat 633/tcp Service Status update (Sterling Software) servstat 633/udp Service Status update (Sterling Software) # Greg Rose ginad 634/tcp ginad ginad 634/udp ginad # Mark Crother rlzdbase 635/tcp RLZ DBase rlzdbase 635/udp RLZ DBase # Michael Ginn ldaps 636/tcp ldap protocol over TLS/SSL (was sldap) ldaps 636/udp ldap protocol over TLS/SSL (was sldap) # Pat Richard lanserver 637/tcp lanserver lanserver 637/udp lanserver # Chris Larsson # 638-665 Unassigned mdqs 666/tcp mdqs 666/udp doom 666/tcp doom Id Software doom 666/udp doom Id Software # disclose 667/tcp campaign contribution disclosures - SDR Technologies disclose 667/udp campaign contribution disclosures - SDR Technologies # Jim Dixon mecomm 668/tcp MeComm mecomm 668/udp MeComm meregister 669/tcp MeRegister meregister 669/udp MeRegister # Armin Sawusch vacdsm-sws 670/tcp VACDSM-SWS vacdsm-sws 670/udp VACDSM-SWS vacdsm-app 671/tcp VACDSM-APP vacdsm-app 671/udp VACDSM-APP vpps-qua 672/tcp VPPS-QUA vpps-qua 672/udp VPPS-QUA cimplex 673/tcp CIMPLEX cimplex 673/udp CIMPLEX # Ulysses G. Smith Jr. acap 674/tcp ACAP acap 674/udp ACAP # Chris Newman dctp 675/tcp DCTP dctp 675/udp DCTP # Andre Kramer vpps-via 676/tcp VPPS Via vpps-via 676/udp VPPS Via # Ulysses G. Smith Jr. # 677-703 Unassigned elcsd 704/tcp errlog copy/server daemon elcsd 704/udp errlog copy/server daemon agentx 705/tcp AgentX agentx 705/udp AgentX # Bob Natale # 706 Unassigned borland-dsj 707/tcp Borland DSJ borland-dsj 707/udp Borland DSJ # Gerg Cole # 708 Unassigned entrust-kmsh 709/tcp Entrust Key Management Service Handler entrust-kmsh 709/udp Entrust Key Management Service Handler entrust-ash 710/tcp Entrust Administration Service Handler entrust-ash 710/udp Entrust Administration Service Handler # Peter Whittaker cisco-tdp 711/tcp Cisco TDP cisco-tdp 711/udp Cisco TDP # Bruce Davie # 712-728 Unassigned netviewdm1 729/tcp IBM NetView DM/6000 Server/Client netviewdm1 729/udp IBM NetView DM/6000 Server/Client netviewdm2 730/tcp IBM NetView DM/6000 send/tcp netviewdm2 730/udp IBM NetView DM/6000 send/tcp netviewdm3 731/tcp IBM NetView DM/6000 receive/tcp netviewdm3 731/udp IBM NetView DM/6000 receive/tcp # Philippe Binet (phbinet@vnet.IBM.COM) netgw 741/tcp netGW netgw 741/udp netGW # Oliver Korfmacher (okorf@netcs.com) netrcs 742/tcp Network based Rev. Cont. Sys. netrcs 742/udp Network based Rev. Cont. Sys. # Gordon C. Galligher flexlm 744/tcp Flexible License Manager flexlm 744/udp Flexible License Manager # Matt Christiano # fujitsu-dev 747/tcp Fujitsu Device Control fujitsu-dev 747/udp Fujitsu Device Control ris-cm 748/tcp Russell Info Sci Calendar Manager ris-cm 748/udp Russell Info Sci Calendar Manager kerberos-adm 749/tcp kerberos administration kerberos-adm 749/udp kerberos administration rfile 750/tcp loadav 750/udp kerberos-iv 750/udp kerberos version iv # Martin Hamilton pump 751/tcp pump 751/udp qrh 752/tcp qrh 752/udp rrh 753/tcp rrh 753/udp tell 754/tcp send tell 754/udp send nlogin 758/tcp nlogin 758/udp con 759/tcp con 759/udp ns 760/tcp ns 760/udp rxe 761/tcp rxe 761/udp quotad 762/tcp quotad 762/udp cycleserv 763/tcp cycleserv 763/udp omserv 764/tcp omserv 764/udp webster 765/tcp webster 765/udp phonebook 767/tcp phone phonebook 767/udp phone vid 769/tcp vid 769/udp cadlock 770/tcp cadlock 770/udp rtip 771/tcp rtip 771/udp cycleserv2 772/tcp cycleserv2 772/udp submit 773/tcp notify 773/udp rpasswd 774/tcp acmaint_dbd 774/udp entomb 775/tcp acmaint_transd 775/udp wpages 776/tcp wpages 776/udp wpgs 780/tcp wpgs 780/udp concert 786/tcp Concert concert 786/udp Concert # Josyula R. Rao # 787-799 Unassigned mdbs_daemon 800/tcp mdbs_daemon 800/udp device 801/tcp device 801/udp # 802-828 Unassigned pkix-3-ca-ra 829/tcp PKIX-3 CA/RA pkix-3-ca-ra 829/tcp PKIX-3 CA/RA # Carlisle Adams # 830-885 Unassigned iclcnet-locate 886/tcp ICL coNETion locate server iclcnet-locate 886/udp ICL coNETion locate server # Bob Lyon iclcnet_svinfo 887/tcp ICL coNETion server info iclcnet_svinfo 887/udp ICL coNETion server info # Bob Lyon accessbuilder 888/tcp AccessBuilder accessbuilder 888/udp AccessBuilder # Steve Sweeney # The following entry records an unassigned but widespread use cddbp 888/tcp CD Database Protocol # Steve Scherf # # 889-899 Unassigned omginitialrefs 900/tcp OMG Initial Refs omginitialrefs 900/udp OMG Initial Refs # Christian Callsen # 889-910 Unassigned xact-backup 911/tcp xact-backup xact-backup 911/tcp xact-backup # Bill Carroll # 912-988 Unassigned ftps-data 989/tcp ftp protocol, data, over TLS/SSL ftps-data 989/udp ftp protocol, data, over TLS/SSL ftps 990/tcp ftp protocol, control, over TLS/SSL ftps 990/udp ftp protocol, control, over TLS/SSL # Christopher Allen nas 991/tcp Netnews Administration System nas 991/udp Netnews Administration System # Vera Heinau # Heiko Schlichting telnets 992/tcp telnet protocol over TLS/SSL telnets 992/udp telnet protocol over TLS/SSL imaps 993/tcp imap4 protocol over TLS/SSL imaps 993/udp imap4 protocol over TLS/SSL ircs 994/tcp irc protocol over TLS/SSL ircs 994/udp irc protocol over TLS/SSL # Christopher Allen pop3s 995/tcp pop3 protocol over TLS/SSL (was spop3) pop3s 995/udp pop3 protocol over TLS/SSL (was spop3) # Gordon Mangione vsinet 996/tcp vsinet vsinet 996/udp vsinet # Rob Juergens maitrd 997/tcp maitrd 997/udp busboy 998/tcp puparp 998/udp garcon 999/tcp applix 999/udp Applix ac puprouter 999/tcp puprouter 999/udp cadlock 1000/tcp ock 1000/udp # 1001-1022 Unassigned # 1008/udp Possibly used by Sun Solaris???? 1023/tcp Reserved 1023/udp Reserved # IANA REGISTERED PORT NUMBERS The Registered Ports are listed by the IANA and on most systems can be used by ordinary user processes or programs executed by ordinary users. Ports are used in the TCP [RFC793] to name the ends of logical connections which carry long term conversations. For the purpose of providing services to unknown callers, a service contact port is defined. This list specifies the port used by the server process as its contact port. The IANA registers uses of these ports as a convienence to the community. To the extent possible, these same port assignments are used with the UDP [RFC768]. The Registered Ports are in the range 1024-49151. Port Assignments: Keyword Decimal Description References 1024/tcp Reserved 1024/udp Reserved # IANA blackjack 1025/tcp network blackjack blackjack 1025/udp network blackjack iad1 1030/tcp BBN IAD iad1 1030/udp BBN IAD iad2 1031/tcp BBN IAD iad2 1031/udp BBN IAD iad3 1032/tcp BBN IAD iad3 1032/udp BBN IAD # Andy Malis neod1 1047/tcp Sun's NEO Object Request Broker neod1 1047/udp Sun's NEO Object Request Broker neod2 1048/tcp Sun's NEO Object Request Broker neod2 1048/udp Sun's NEO Object Request Broker # Rohit Garg nim 1058/tcp nim nim 1058/udp nim nimreg 1059/tcp nimreg nimreg 1059/udp nimreg # Robert Gordon instl_boots 1067/tcp Installation Bootstrap Proto. Serv. instl_boots 1067/udp Installation Bootstrap Proto. Serv. instl_bootc 1068/tcp Installation Bootstrap Proto. Cli. instl_bootc 1068/udp Installation Bootstrap Proto. Cli. # David Arko < socks 1080/tcp Socks socks 1080/udp Socks # Ying-Da Lee lmsocialserver 1111/tcp LM Social Server lmsocialserver 1111/udp LM Social Server # Ron Lussier murray 1123/tcp Murray murray 1123/udp Murray # Stu Mark nfa 1155/tcp Network File Access nfa 1155/udp Network File Access # James Powell mc-client 1180/tcp Millicent Client Proxy mc-client 1180/udp Millicent Client Proxy # Steve Glassman lupa 1212/tcp lupa lupa 1212/udp lupa # Barney Wolff nerv 1222/tcp SNI R&D network nerv 1222/udp SNI R&D network # Martin Freiss # 1223-1233 Unassigned search-agent 1234/tcp Infoseek Search Agent search-agent 1234/udp Infoseek Search Agent # Jackie Wu # 1235-1238 Unassigned nmsd 1239/tcp NMSD nmsd 1239/udp NMSD # Yuri Machkasov # 1240-1247 Unassigned hermes 1248/tcp hermes 1248/udp # 1249-1299 Unassigned h323hostcallsc 1300/tcp H323 Host Call Secure h323hostcallsc 1300/udp H323 Host Call Secure # Jim Toga # 1301-1312 Unassigned bmc_patroldb 1313/tcp BMC_PATROLDB bmc-patroldb 1313/udp BMC_PATROLDB # Devon Shows pdps 1314/tcp Photoscript Distributed Printing System pdps 1314/udp Photoscript Distributed Printing System # Les Klein # 1315-1344 Unassigned vpjp 1345/tcp VPJP vpjp 1345/udp VPJP # Michael Collins alta-ana-lm 1346/tcp Alta Analytics License Manager alta-ana-lm 1346/udp Alta Analytics License Manager bbn-mmc 1347/tcp multi media conferencing bbn-mmc 1347/udp multi media conferencing bbn-mmx 1348/tcp multi media conferencing bbn-mmx 1348/udp multi media conferencing sbook 1349/tcp Registration Network Protocol sbook 1349/udp Registration Network Protocol editbench 1350/tcp Registration Network Protocol editbench 1350/udp Registration Network Protocol # Simson L. Garfinkel equationbuilder 1351/tcp Digital Tool Works (MIT) equationbuilder 1351/udp Digital Tool Works (MIT) # Terrence J. Talbot lotusnote 1352/tcp Lotus Note lotusnote 1352/udp Lotus Note # Greg Pflaum relief 1353/tcp Relief Consulting relief 1353/udp Relief Consulting # John Feiler rightbrain 1354/tcp RightBrain Software rightbrain 1354/udp RightBrain Software # Glenn Reid intuitive edge 1355/tcp Intuitive Edge intuitive edge 1355/udp Intuitive Edge # Montgomery Zukowski # cuillamartin 1356/tcp CuillaMartin Company cuillamartin 1356/udp CuillaMartin Company pegboard 1357/tcp Electronic PegBoard pegboard 1357/udp Electronic PegBoard # Chris Cuilla # connlcli 1358/tcp CONNLCLI connlcli 1358/udp CONNLCLI ftsrv 1359/tcp FTSRV ftsrv 1359/udp FTSRV # Ines Homem de Melo mimer 1360/tcp MIMER mimer 1360/udp MIMER # Per Schroeder linx 1361/tcp LinX linx 1361/udp LinX # Steffen Schilke <---none---> timeflies 1362/tcp TimeFlies timeflies 1362/udp TimeFlies # Doug Kent ndm-requester 1363/tcp Network DataMover Requester ndm-requester 1363/udp Network DataMover Requester ndm-server 1364/tcp Network DataMover Server ndm-server 1364/udp Network DataMover Server # Toshio Watanabe # adapt-sna 1365/tcp Network Software Associates adapt-sna 1365/udp Network Software Associates # Jeffery Chiao <714-768-401> netware-csp 1366/tcp Novell NetWare Comm Service Platform netware-csp 1366/udp Novell NetWare Comm Service Platform # Laurie Lindsey dcs 1367/tcp DCS dcs 1367/udp DCS # Stefan Siebert screencast 1368/tcp ScreenCast screencast 1368/udp ScreenCast # Bill Tschumy gv-us 1369/tcp GlobalView to Unix Shell gv-us 1369/udp GlobalView to Unix Shell us-gv 1370/tcp Unix Shell to GlobalView us-gv 1370/udp Unix Shell to GlobalView # Makoto Mita fc-cli 1371/tcp Fujitsu Config Protocol fc-cli 1371/udp Fujitsu Config Protocol fc-ser 1372/tcp Fujitsu Config Protocol fc-ser 1372/udp Fujitsu Config Protocol # Ryuichi Horie chromagrafx 1373/tcp Chromagrafx chromagrafx 1373/udp Chromagrafx # Mike Barthelemy molly 1374/tcp EPI Software Systems molly 1374/udp EPI Software Systems # Jim Vlcek bytex 1375/tcp Bytex bytex 1375/udp Bytex # Mary Ann Burt ibm-pps 1376/tcp IBM Person to Person Software ibm-pps 1376/udp IBM Person to Person Software # Simon Phipps cichlid 1377/tcp Cichlid License Manager cichlid 1377/udp Cichlid License Manager # Andy Burgess elan 1378/tcp Elan License Manager elan 1378/udp Elan License Manager # Ken Greer dbreporter 1379/tcp Integrity Solutions dbreporter 1379/udp Integrity Solutions # Tim Dawson telesis-licman 1380/tcp Telesis Network License Manager telesis-licman 1380/udp Telesis Network License Manager # Karl Schendel, Jr. apple-licman 1381/tcp Apple Network License Manager apple-licman 1381/udp Apple Network License Manager # Earl Wallace udt_os 1382/tcp udt_os 1382/udp gwha 1383/tcp GW Hannaway Network License Manager gwha 1383/udp GW Hannaway Network License Manager # J. Gabriel Foster os-licman 1384/tcp Objective Solutions License Manager os-licman 1384/udp Objective Solutions License Manager # Donald Cornwell atex_elmd 1385/tcp Atex Publishing License Manager atex_elmd 1385/udp Atex Publishing License Manager # Brett Sorenson checksum 1386/tcp CheckSum License Manager checksum 1386/udp CheckSum License Manager # Andreas Glocker cadsi-lm 1387/tcp Computer Aided Design Software Inc LM cadsi-lm 1387/udp Computer Aided Design Software Inc LM # Sulistio Muljadi objective-dbc 1388/tcp Objective Solutions DataBase Cache objective-dbc 1388/udp Objective Solutions DataBase Cache # Donald Cornwell iclpv-dm 1389/tcp Document Manager iclpv-dm 1389/udp Document Manager iclpv-sc 1390/tcp Storage Controller iclpv-sc 1390/udp Storage Controller iclpv-sas 1391/tcp Storage Access Server iclpv-sas 1391/udp Storage Access Server iclpv-pm 1392/tcp Print Manager iclpv-pm 1392/udp Print Manager iclpv-nls 1393/tcp Network Log Server iclpv-nls 1393/udp Network Log Server iclpv-nlc 1394/tcp Network Log Client iclpv-nlc 1394/udp Network Log Client iclpv-wsm 1395/tcp PC Workstation Manager software iclpv-wsm 1395/udp PC Workstation Manager software # A.P. Hobson dvl-activemail 1396/tcp DVL Active Mail dvl-activemail 1396/udp DVL Active Mail audio-activmail 1397/tcp Audio Active Mail audio-activmail 1397/udp Audio Active Mail video-activmail 1398/tcp Video Active Mail video-activmail 1398/udp Video Active Mail # Ehud Shapiro cadkey-licman 1399/tcp Cadkey License Manager cadkey-licman 1399/udp Cadkey License Manager cadkey-tablet 1400/tcp Cadkey Tablet Daemon cadkey-tablet 1400/udp Cadkey Tablet Daemon # Joe McCollough goldleaf-licman 1401/tcp Goldleaf License Manager goldleaf-licman 1401/udp Goldleaf License Manager # John Fox <---none---> prm-sm-np 1402/tcp Prospero Resource Manager prm-sm-np 1402/udp Prospero Resource Manager prm-nm-np 1403/tcp Prospero Resource Manager prm-nm-np 1403/udp Prospero Resource Manager # B. Clifford Neuman igi-lm 1404/tcp Infinite Graphics License Manager igi-lm 1404/udp Infinite Graphics License Manager ibm-res 1405/tcp IBM Remote Execution Starter ibm-res 1405/udp IBM Remote Execution Starter netlabs-lm 1406/tcp NetLabs License Manager netlabs-lm 1406/udp NetLabs License Manager dbsa-lm 1407/tcp DBSA License Manager dbsa-lm 1407/udp DBSA License Manager # Scott Shattuck sophia-lm 1408/tcp Sophia License Manager sophia-lm 1408/udp Sophia License Manager # Eric Brown here-lm 1409/tcp Here License Manager here-lm 1409/udp Here License Manager # David Ison hiq 1410/tcp HiQ License Manager hiq 1410/udp HiQ License Manager # Rick Pugh af 1411/tcp AudioFile af 1411/udp AudioFile # Jim Gettys innosys 1412/tcp InnoSys innosys 1412/udp InnoSys innosys-acl 1413/tcp Innosys-ACL innosys-acl 1413/udp Innosys-ACL # Eric Welch <--none---> ibm-mqseries 1414/tcp IBM MQSeries ibm-mqseries 1414/udp IBM MQSeries # Roger Meli dbstar 1415/tcp DBStar dbstar 1415/udp DBStar # Jeffrey Millman novell-lu6.2 1416/tcp Novell LU6.2 novell-lu6.2 1416/udp Novell LU6.2 # Peter Liu <--none---> timbuktu-srv1 1417/tcp Timbuktu Service 1 Port timbuktu-srv1 1417/tcp Timbuktu Service 1 Port timbuktu-srv2 1418/tcp Timbuktu Service 2 Port timbuktu-srv2 1418/udp Timbuktu Service 2 Port timbuktu-srv3 1419/tcp Timbuktu Service 3 Port timbuktu-srv3 1419/udp Timbuktu Service 3 Port timbuktu-srv4 1420/tcp Timbuktu Service 4 Port timbuktu-srv4 1420/udp Timbuktu Service 4 Port # Marc Epard gandalf-lm 1421/tcp Gandalf License Manager gandalf-lm 1421/udp Gandalf License Manager # gilmer@gandalf.ca autodesk-lm 1422/tcp Autodesk License Manager autodesk-lm 1422/udp Autodesk License Manager # David Ko essbase 1423/tcp Essbase Arbor Software essbase 1423/udp Essbase Arbor Software hybrid 1424/tcp Hybrid Encryption Protocol hybrid 1424/udp Hybrid Encryption Protocol # Howard Hart zion-lm 1425/tcp Zion Software License Manager zion-lm 1425/udp Zion Software License Manager # David Ferrero sais 1426/tcp Satellite-data Acquisition System 1 sais 1426/udp Satellite-data Acquisition System 1 # Bill Taylor mloadd 1427/tcp mloadd monitoring tool mloadd 1427/udp mloadd monitoring tool # Bob Braden informatik-lm 1428/tcp Informatik License Manager informatik-lm 1428/udp Informatik License Manager # Harald Schlangmann # nms 1429/tcp Hypercom NMS nms 1429/udp Hypercom NMS tpdu 1430/tcp Hypercom TPDU tpdu 1430/udp Hypercom TPDU # Noor Chowdhury rgtp 1431/tcp Reverse Gossip Transport rgtp 1431/udp Reverse Gossip Transport # Ian Jackson blueberry-lm 1432/tcp Blueberry Software License Manager blueberry-lm 1432/udp Blueberry Software License Manager # Steve Beigel ms-sql-s 1433/tcp Microsoft-SQL-Server ms-sql-s 1433/udp Microsoft-SQL-Server ms-sql-m 1434/tcp Microsoft-SQL-Monitor ms-sql-m 1434/udp Microsoft-SQL-Monitor # Peter Hussey ibm-cics 1435/tcp IBM CICS ibm-cics 1435/udp IBM CICS # Geoff Meacock saism 1436/tcp Satellite-data Acquisition System 2 saism 1436/udp Satellite-data Acquisition System 2 # Bill Taylor tabula 1437/tcp Tabula tabula 1437/udp Tabula # Marcelo Einhorn # eicon-server 1438/tcp Eicon Security Agent/Server eicon-server 1438/udp Eicon Security Agent/Server eicon-x25 1439/tcp Eicon X25/SNA Gateway eicon-x25 1439/udp Eicon X25/SNA Gateway eicon-slp 1440/tcp Eicon Service Location Protocol eicon-slp 1440/udp Eicon Service Location Protocol # Pat Calhoun cadis-1 1441/tcp Cadis License Management cadis-1 1441/udp Cadis License Management cadis-2 1442/tcp Cadis License Management cadis-2 1442/udp Cadis License Management # Todd Wichers ies-lm 1443/tcp Integrated Engineering Software ies-lm 1443/udp Integrated Engineering Software # David Tong marcam-lm 1444/tcp Marcam License Management marcam-lm 1444/udp Marcam License Management # Therese Hunt proxima-lm 1445/tcp Proxima License Manager proxima-lm 1445/udp Proxima License Manager ora-lm 1446/tcp Optical Research Associates License Manager ora-lm 1446/udp Optical Research Associates License Manager apri-lm 1447/tcp Applied Parallel Research LM apri-lm 1447/udp Applied Parallel Research LM # Jim Dillon oc-lm 1448/tcp OpenConnect License Manager oc-lm 1448/udp OpenConnect License Manager # Sue Barnhill peport 1449/tcp PEport peport 1449/udp PEport # Qentin Neill dwf 1450/tcp Tandem Distributed Workbench Facility dwf 1450/udp Tandem Distributed Workbench Facility # Mike Bert infoman 1451/tcp IBM Information Management infoman 1451/udp IBM Information Management # Karen Burns <---none---> gtegsc-lm 1452/tcp GTE Government Systems License Man gtegsc-lm 1452/udp GTE Government Systems License Man # Mike Gregory genie-lm 1453/tcp Genie License Manager genie-lm 1453/udp Genie License Manager # Paul Applegate interhdl_elmd 1454/tcp interHDL License Manager interhdl_elmd 1454/tcp interHDL License Manager # Eli Sternheim eli@interhdl.com esl-lm 1455/tcp ESL License Manager esl-lm 1455/udp ESL License Manager # Abel Chou dca 1456/tcp DCA dca 1456/udp DCA # Jeff Garbers valisys-lm 1457/tcp Valisys License Manager valisys-lm 1457/udp Valisys License Manager # Leslie Lincoln nrcabq-lm 1458/tcp Nichols Research Corp. nrcabq-lm 1458/udp Nichols Research Corp. # Howard Cole proshare1 1459/tcp Proshare Notebook Application proshare1 1459/udp Proshare Notebook Application proshare2 1460/tcp Proshare Notebook Application proshare2 1460/udp Proshare Notebook Application # Robin Kar ibm_wrless_lan 1461/tcp IBM Wireless LAN ibm_wrless_lan 1461/udp IBM Wireless LAN # world-lm 1462/tcp World License Manager world-lm 1462/udp World License Manager # Michael S Amirault nucleus 1463/tcp Nucleus nucleus 1463/udp Nucleus # Venky Nagar msl_lmd 1464/tcp MSL License Manager msl_lmd 1464/udp MSL License Manager # Matt Timmermans pipes 1465/tcp Pipes Platform pipes 1465/udp Pipes Platform mfarlin@peerlogic.com # Mark Farlin oceansoft-lm 1466/tcp Ocean Software License Manager oceansoft-lm 1466/udp Ocean Software License Manager # Randy Leonard csdmbase 1467/tcp CSDMBASE csdmbase 1467/udp CSDMBASE csdm 1468/tcp CSDM csdm 1468/udp CSDM # Robert Stabl aal-lm 1469/tcp Active Analysis Limited License Manager aal-lm 1469/udp Active Analysis Limited License Manager # David Snocken +44 (71)437-7009 uaiact 1470/tcp Universal Analytics uaiact 1470/udp Universal Analytics # Mark R. Ludwig csdmbase 1471/tcp csdmbase csdmbase 1471/udp csdmbase csdm 1472/tcp csdm csdm 1472/udp csdm # Robert Stabl openmath 1473/tcp OpenMath openmath 1473/udp OpenMath # Garth Mayville telefinder 1474/tcp Telefinder telefinder 1474/udp Telefinder # Jim White taligent-lm 1475/tcp Taligent License Manager taligent-lm 1475/udp Taligent License Manager # Mark Sapsford clvm-cfg 1476/tcp clvm-cfg clvm-cfg 1476/udp clvm-cfg # Eric Soderberg ms-sna-server 1477/tcp ms-sna-server ms-sna-server 1477/udp ms-sna-server ms-sna-base 1478/tcp ms-sna-base ms-sna-base 1478/udp ms-sna-base # Gordon Mangione dberegister 1479/tcp dberegister dberegister 1479/udp dberegister # Brian Griswold pacerforum 1480/tcp PacerForum pacerforum 1480/udp PacerForum # Peter Caswell airs 1481/tcp AIRS airs 1481/udp AIRS # Bruce Wilson, 905-771-6161 miteksys-lm 1482/tcp Miteksys License Manager miteksys-lm 1482/udp Miteksys License Manager # Shane McRoberts afs 1483/tcp AFS License Manager afs 1483/udp AFS License Manager # Michael R. Pizolato confluent 1484/tcp Confluent License Manager confluent 1484/udp Confluent License Manager # James Greenfiel lansource 1485/tcp LANSource lansource 1485/udp LANSource # Doug Scott nms_topo_serv 1486/tcp nms_topo_serv nms_topo_serv 1486/udp nms_topo_serv # Sylvia Siu localinfosrvr 1487/tcp LocalInfoSrvr localinfosrvr 1487/udp LocalInfoSrvr # Brian Matthews docstor 1488/tcp DocStor docstor 1488/udp DocStor # Brian Spears dmdocbroker 1489/tcp dmdocbroker dmdocbroker 1489/udp dmdocbroker # Razmik Abnous insitu-conf 1490/tcp insitu-conf insitu-conf 1490/udp insitu-conf # Paul Blacknell anynetgateway 1491/tcp anynetgateway anynetgateway 1491/udp anynetgateway # Dan Poirier stone-design-1 1492/tcp stone-design-1 stone-design-1 1492/udp stone-design-1 # Andrew Stone netmap_lm 1493/tcp netmap_lm netmap_lm 1493/udp netmap_lm # Phillip Magson ica 1494/tcp ica ica 1494/udp ica # John Richardson, Citrix Systems cvc 1495/tcp cvc cvc 1495/udp cvc # Bill Davidson liberty-lm 1496/tcp liberty-lm liberty-lm 1496/udp liberty-lm # Jim Rogers rfx-lm 1497/tcp rfx-lm rfx-lm 1497/udp rfx-lm # Bill Bishop sybase-sqlany 1498/tcp Sybase SQL Any sybase-sqlany 1498/udp Sybase SQL Any # Dave Neudoerffer fhc 1499/tcp Federico Heinz Consultora fhc 1499/udp Federico Heinz Consultora # Federico Heinz vlsi-lm 1500/tcp VLSI License Manager vlsi-lm 1500/udp VLSI License Manager # Shue-Lin Kuo saiscm 1501/tcp Satellite-data Acquisition System 3 saiscm 1501/udp Satellite-data Acquisition System 3 # Bill Taylor shivadiscovery 1502/tcp Shiva shivadiscovery 1502/udp Shiva # Jonathan Wenocur imtc-mcs 1503/tcp Databeam imtc-mcs 1503/udp Databeam # Jim Johnston evb-elm 1504/tcp EVB Software Engineering License Manager evb-elm 1504/udp EVB Software Engineering License Manager # B.G. Mahesh < mahesh@sett.com> funkproxy 1505/tcp Funk Software, Inc. funkproxy 1505/udp Funk Software, Inc. # Robert D. Vincent utcd 1506/tcp Universal Time daemon (utcd) utcd 1506/udp Universal Time daemon (utcd) # Walter Poxon symplex 1507/tcp symplex symplex 1507/udp symplex # Mike Turley diagmond 1508/tcp diagmond diagmond 1508/udp diagmond # Pete Moscatelli robcad-lm 1509/tcp Robcad, Ltd. License Manager robcad-lm 1509/udp Robcad, Ltd. License Manager # Hindin Joseph mvx-lm 1510/tcp Midland Valley Exploration Ltd. Lic. Man. mvx-lm 1510/udp Midland Valley Exploration Ltd. Lic. Man. # Neil Salter Laszlo 3l-l1 1511/tcp 3l-l1 3l-l1 1511/udp 3l-l1 # Ian A. Young wins 1512/tcp Microsoft's Windows Internet Name Service wins 1512/udp Microsoft's Windows Internet Name Service # Pradeep Bahl fujitsu-dtc 1513/tcp Fujitsu Systems Business of America, Inc fujitsu-dtc 1513/udp Fujitsu Systems Business of America, Inc fujitsu-dtcns 1514/tcp Fujitsu Systems Business of America, Inc fujitsu-dtcns 1514/udp Fujitsu Systems Business of America, Inc # Charles A. Higgins <75730.2257@compuserve.com> ifor-protocol 1515/tcp ifor-protocol ifor-protocol 1515/udp ifor-protocol # Dr. R.P. Alston vpad 1516/tcp Virtual Places Audio data vpad 1516/udp Virtual Places Audio data vpac 1517/tcp Virtual Places Audio control vpac 1517/udp Virtual Places Audio control vpvd 1518/tcp Virtual Places Video data vpvd 1518/udp Virtual Places Video data vpvc 1519/tcp Virtual Places Video control vpvc 1519/udp Virtual Places Video control # Ehud Shapiro atm-zip-office 1520/tcp atm zip office atm-zip-office 1520/udp atm zip office # Wilson Kwan ncube-lm 1521/tcp nCube License Manager ncube-lm 1521/udp nCube License Manager # Maxine Yuen ricardo-lm 1522/tcp Ricardo North America License Manager ricardo-lm 1522/udp Ricardo North America License Manager # Mike Flemming cichild-lm 1523/tcp cichild cichild-lm 1523/udp cichild # Andy Burgess ingreslock 1524/tcp ingres ingreslock 1524/udp ingres orasrv 1525/tcp oracle orasrv 1525/udp oracle prospero-np 1525/tcp Prospero Directory Service non-priv prospero-np 1525/udp Prospero Directory Service non-priv pdap-np 1526/tcp Prospero Data Access Prot non-priv pdap-np 1526/udp Prospero Data Access Prot non-priv # B. Clifford Neuman tlisrv 1527/tcp oracle tlisrv 1527/udp oracle mciautoreg 1528/tcp micautoreg mciautoreg 1528/udp micautoreg # John Klensin coauthor 1529/tcp oracle coauthor 1529/udp oracle rap-service 1530/tcp rap-service rap-service 1530/udp rap-service rap-listen 1531/tcp rap-listen rap-listen 1531/udp rap-listen # Phil Servita miroconnect 1532/tcp miroconnect miroconnect 1532/udp miroconnect # Michael Fischer +49 531 21 13 0 virtual-places 1533/tcp Virtual Places Software virtual-places 1533/udp Virtual Places Software # Ehud Shapiro micromuse-lm 1534/tcp micromuse-lm micromuse-lm 1534/udp micromuse-lm # Adam Kerrison ampr-info 1535/tcp ampr-info ampr-info 1535/udp ampr-info ampr-inter 1536/tcp ampr-inter ampr-inter 1536/udp ampr-inter # Rob Janssen sdsc-lm 1537/tcp isi-lm sdsc-lm 1537/udp isi-lm # Len Wanger 3ds-lm 1538/tcp 3ds-lm 3ds-lm 1538/udp 3ds-lm # Keith Trummel intellistor-lm 1539/tcp Intellistor License Manager intellistor-lm 1539/udp Intellistor License Manager # Ron Vaughn rds 1540/tcp rds rds 1540/udp rds rds2 1541/tcp rds2 rds2 1541/udp rds2 # Sudhakar Rajamannar gridgen-elmd 1542/tcp gridgen-elmd gridgen-elmd 1542/udp gridgen-elmd # John R. Chawner +1 817 354-1004 simba-cs 1543/tcp simba-cs simba-cs 1543/udp simba-cs # Betsy Alexander +1 604-681-4549 aspeclmd 1544/tcp aspeclmd aspeclmd 1544/udp aspeclmd # V. Balaji vistium-share 1545/tcp vistium-share vistium-share 1545/udp vistium-share # Allison Carleton abbaccuray 1546/tcp abbaccuray abbaccuray 1546/udp abbaccuray # John Wendt 614-261-2000 laplink 1547/tcp laplink laplink 1547/udp laplink # Michael Crawford axon-lm 1548/tcp Axon License Manager axon-lm 1548/udp Axon License Manager # Mark Pearce < shivahose 1549/tcp Shiva Hose shivasound 1549/udp Shiva Sound # Kin Chan 3m-image-lm 1550/tcp Image Storage license manager 3M Company 3m-image-lm 1550/udp Image Storage license manager 3M Company # J. C. Canessa hecmtl-db 1551/tcp HECMTL-DB hecmtl-db 1551/udp HECMTL-DB # Maxime Belanger pciarray 1552/tcp pciarray pciarray 1552/udp pciarray # Ron Folk sna-cs 1553/tcp sna-cs sna-cs 1553/udp sna-cs # Tony Sowter caci-lm 1554/tcp CACI Products Company License Manager caci-lm 1554/udp CACI Products Company License Manager # Erik Blume livelan 1555/tcp livelan livelan 1555/udp livelan # khedayat@roadrunner.pictel.com ashwin 1556/tcp AshWin CI Tecnologies ashwin 1556/udp AshWin CI Tecnologies # Dave Neal arbortext-lm 1557/tcp ArborText License Manager arbortext-lm 1557/udp ArborText License Manager # David J. Wilson xingmpeg 1558/tcp xingmpeg xingmpeg 1558/udp xingmpeg # Howard Gordon web2host 1559/tcp web2host web2host 1559/udp web2host # Stephen Johnson asci-val 1560/tcp asci-val asci-val 1560/udp asci-val # Brian Schenkenberger facilityview 1561/tcp facilityview facilityview 1561/udp facilityview # Ed Green pconnectmgr 1562/tcp pconnectmgr pconnectmgr 1562/udp pconnectmgr # Bob Kaiser cadabra-lm 1563/tcp Cadabra License Manager cadabra-lm 1563/udp Cadabra License Manager # Arthur Castonguay pay-per-view 1564/tcp Pay-Per-View pay-per-view 1564/udp Pay-Per-View # Brian Tung winddlb 1565/tcp WinDD winddlb 1565/udp WinDD # Kelly Sims corelvideo 1566/tcp CORELVIDEO corelvideo 1566/udp CORELVIDEO # Ming Poon jlicelmd 1567/tcp jlicelmd jlicelmd 1567/udp jlicelmd # Christian Schormann <100410.3063@compuserve.com> tsspmap 1568/tcp tsspmap tsspmap 1568/udp tsspmap # Paul W. Nelson ets 1569/tcp ets ets 1569/udp ets # Carstein Seeberg orbixd 1570/tcp orbixd orbixd 1570/udp orbixd # Bridget Walsh rdb-dbs-disp 1571/tcp Oracle Remote Data Base rdb-dbs-disp 1571/udp Oracle Remote Data Base # chip-lm 1572/tcp Chipcom License Manager chip-lm 1572/udp Chipcom License Manager # Jerry Natowitz itscomm-ns 1573/tcp itscomm-ns itscomm-ns 1573/udp itscomm-ns # Rich Thompson mvel-lm 1574/tcp mvel-lm mvel-lm 1574/udp mvel-lm # David Bisset oraclenames 1575/tcp oraclenames oraclenames 1575/udp oraclenames # P.V.Shivkumar moldflow-lm 1576/tcp moldflow-lm moldflow-lm 1576/udp moldflow-lm # Paul Browne hypercube-lm 1577/tcp hypercube-lm hypercube-lm 1577/udp hypercube-lm # Christopher McLendon jacobus-lm 1578/tcp Jacobus License Manager jacobus-lm 1578/udp Jacobus License Manager # Tony Cleveland ioc-sea-lm 1579/tcp ioc-sea-lm ioc-sea-lm 1579/tcp ioc-sea-lm # Paul Nelson tn-tl-r1 1580/tcp tn-tl-r1 tn-tl-r2 1580/udp tn-tl-r2 # Ed Kress mil-2045-47001 1581/tcp MIL-2045-47001 mil-2045-47001 1581/udp MIL-2045-47001 # Eric Whitehill msims 1582/tcp MSIMS msims 1582/udp MSIMS # Glenn Olander simbaexpress 1583/tcp simbaexpress simbaexpress 1583/udp simbaexpress # Betsy Alexander +1 604-681-4549 tn-tl-fd2 1584/tcp tn-tl-fd2 tn-tl-fd2 1584/udp tn-tl-fd2 # Ed Kress intv 1585/tcp intv intv 1585/udp intv # Dermot Tynand ibm-abtact 1586/tcp ibm-abtact ibm-abtact 1586/udp ibm-abtact # Sandeep K. Singhal pra_elmd 1587/tcp pra_elmd pra_elmd 1587/udp pra_elmd # Dennis Mastin triquest-lm 1588/tcp triquest-lm triquest-lm 1588/udp triquest-lm # Nand Kumar vqp 1589/tcp VQP vqp 1589/udp VQP # Keith McCloghrie gemini-lm 1590/tcp gemini-lm gemini-lm 1590/udp gemini-lm # Tony Sawyer ncpm-pm 1591/tcp ncpm-pm ncpm-pm 1591/udp ncpm-pm # Ted Power commonspace 1592/tcp commonspace commonspace 1592/udp commonspace # Rob Chandhok mainsoft-lm 1593/tcp mainsoft-lm mainsoft-lm 1593/udp mainsoft-lm # Anand Gangadharan sixtrak 1594/tcp sixtrak sixtrak 1594/udp sixtrak # Bob Rennie radio 1595/tcp radio radio 1595/udp radio radio-sm 1596/tcp radio-sm radio-bc 1596/udp radio-bc # Ken Chapman orbplus-iiop 1597/tcp orbplus-iiop orbplus-iiop 1597/udp orbplus-iiop # Robert A. Kukura picknfs 1598/tcp picknfs picknfs 1598/udp picknfs # John Lombardo simbaservices 1599/tcp simbaservices simbaservices 1599/udp simbaservices # Betsy Alexander +1 604-681-4549 issd 1600/tcp issd 1600/udp aas 1601/tcp aas aas 1601/udp aas # Bob Beard inspect 1602/tcp inspect inspect 1602/udp inspect # Frank O'Neill picodbc 1603/tcp pickodbc picodbc 1603/udp pickodbc # John Lombardo icabrowser 1604/tcp icabrowser icabrowser 1604/udp icabrowser # Brad Pedersen slp 1605/tcp Salutation Manager (Salutation Protocol) slp 1605/udp Salutation Manager (Salutation Protocol) slm-api 1606/tcp Salutation Manager (SLM-API) slm-api 1606/udp Salutation Manager (SLM-API) # Tohru Mori stt 1607/tcp stt stt 1607/udp stt # Ryan Bolz smart-lm 1608/tcp Smart Corp. License Manager smart-lm 1608/udp Smart Corp. License Manager # Connie Qiu isysg-lm 1609/tcp isysg-lm isysg-lm 1609/udp isysg-lm # Adam Curtin taurus-wh 1610/tcp taurus-wh taurus-wh 1610/udp taurus-wh # Jeff Moffatt ill 1611/tcp Inter Library Loan ill 1611/udp Inter Library Loan # Niall Murphy netbill-trans 1612/tcp NetBill Transaction Server netbill-trans 1612/udp NetBill Transaction Server netbill-keyrep 1613/tcp NetBill Key Repository netbill-keyrep 1613/udp NetBill Key Repository netbill-cred 1614/tcp NetBill Credential Server netbill-cred 1614/udp NetBill Credential Server netbill-auth 1615/tcp NetBill Authorization Server netbill-auth 1615/udp NetBill Authorization Server netbill-prod 1616/tcp NetBill Product Server netbill-prod 1616/udp NetBill Product Server # Marvin Sirbu nimrod-agent 1617/tcp Nimrod Inter-Agent Communication nimrod-agent 1617/udp Nimrod Inter-Agent Communication # Charles Lynn skytelnet 1618/tcp skytelnet skytelnet 1618/udp skytelnet # Byron Jones xs-openstorage 1619/tcp xs-openstorage xs-openstorage 1619/udp xs-openstorage # XuiS Software Ltd. <100322.2376@compuserve.com> faxportwinport 1620/tcp faxportwinport faxportwinport 1620/udp faxportwinport # Chris Wells softdataphone 1621/tcp softdataphone softdataphone 1621/udp softdataphone # Dror Gill n ontime 1622/tcp ontime ontime 1622/udp ontime # Keith Rhodes 810-559-5955 jaleosnd 1623/tcp jaleosnd jaleosnd 1623/udp jaleosnd # Christian Schormann <100410.3063@compuserve.com> udp-sr-port 1624/tcp udp-sr-port udp-sr-port 1624/udp udp-sr-port # Herb Jensen svs-omagent 1625/tcp svs-omagent svs-omagent 1625/udp svs-omagent # Alberto Berlen # 1626-1629 Unassigned oraclenet8cman 1630/tcp Oracle Net8 Cman oraclenet8cman 1630/udp Oracle Net8 Cman # Tong-Ming Lee # 1631-1635 Unassigned cncp 1636/tcp CableNet Control Protocol cncp 1636/udp CableNet Control Protocol cnap 1637/tcp CableNet Admin Protocol cnap 1637/udp CableNet Admin Protocol cnip 1638/tcp CableNet Info Protocol cnip 1638/udp CableNet Info Protocol # Damian Hamill cert-initiator 1639/tcp cert-initiator cert-initiator 1639/udp cert-initiator cert-responder 1640/tcp cert-responder cert-responder 1640/udp cert-responder # Tom Markson invision 1641/tcp InVision invision 1641/udp InVision # Christopher Davey isis-am 1642/tcp isis-am isis-am 1642/udp isis-am isis-ambc 1643/tcp isis-ambc isis-ambc 1643/udp isis-ambc # Ken Chapman saiseh 1644/tcp Satellite-data Acquisition System 4 # Bill Taylor datametrics 1645/tcp datametrics datametrics 1645/udp datametrics # Jerry Jongerius sa-msg-port 1646/tcp sa-msg-port sa-msg-port 1646/udp sa-msg-port # Eric Whitehill rsap 1647/tcp rsap rsap 1647/udp rsap # Holger Reif # concurrent-lm 1648/tcp concurrent-lm concurrent-lm 1648/udp concurrent-lm # Maggie Brinsford inspect 1649/tcp inspect inspect 1649/udp inspect # Frank da Cruz nkd 1650/tcp nkd nkd 1650/udp nkd shiva_confsrvr 1651/tcp shiva_confsrvr shiva_confsrvr 1651/udp shiva_confsrvr # Mike Horowitz xnmp 1652/tcp xnmp xnmp 1652/udp xnmp # Ali Saleh alphatech-lm 1653/tcp alphatech-lm alphatech-lm 1653/udp alphatech-lm # Joseph Hauk stargatealerts 1654/tcp stargatealerts stargatealerts 1654/udp stargatealerts # Tim Coppernoll # dec-mbadmin 1655/tcp dec-mbadmin dec-mbadmin 1655/udp dec-mbadmin dec-mbadmin-h 1656/tcp dec-mbadmin-h dec-mbadmin-h 1656/udp dec-mbadmin-h # Nick Shipman fujitsu-mmpdc 1657/tcp fujitsu-mmpdc fujitsu-mmpdc 1657/udp fujitsu-mmpdc # Katsumi Oomuro sixnetudr 1658/tcp sixnetudr sixnetudr 1658/udp sixnetudr # Bob Rennie sg-lm 1659/tcp Silicon Grail License Manager sg-lm 1659/udp Silicon Grail License Manager # William R Bishop skip-mc-gikreq 1660/tcp skip-mc-gikreq skip-mc-gikreq 1660/udp skip-mc-gikreq # Tom Markson netview-aix-1 1661/tcp netview-aix-1 netview-aix-1 1661/udp netview-aix-1 netview-aix-2 1662/tcp netview-aix-2 netview-aix-2 1662/udp netview-aix-2 netview-aix-3 1663/tcp netview-aix-3 netview-aix-3 1663/udp netview-aix-3 netview-aix-4 1664/tcp netview-aix-4 netview-aix-4 1664/udp netview-aix-4 netview-aix-5 1665/tcp netview-aix-5 netview-aix-5 1665/udp netview-aix-5 netview-aix-6 1666/tcp netview-aix-6 netview-aix-6 1666/udp netview-aix-6 netview-aix-7 1667/tcp netview-aix-7 netview-aix-7 1667/udp netview-aix-7 netview-aix-8 1668/tcp netview-aix-8 netview-aix-8 1668/udp netview-aix-8 netview-aix-9 1669/tcp netview-aix-9 netview-aix-9 1669/udp netview-aix-9 netview-aix-10 1670/tcp netview-aix-10 netview-aix-10 1670/udp netview-aix-10 netview-aix-11 1671/tcp netview-aix-11 netview-aix-11 1671/udp netview-aix-11 netview-aix-12 1672/tcp netview-aix-12 netview-aix-12 1672/udp netview-aix-12 # Martha Crisson proshare-mc-1 1673/tcp Intel Proshare Multicast proshare-mc-1 1673/udp Intel Proshare Multicast proshare-mc-2 1674/tcp Intel Proshare Multicast proshare-mc-2 1674/udp Intel Proshare Multicast # Mark Lewis pdp 1675/tcp Pacific Data Products pdp 1675/udp Pacific Data Products # Gary Morton netcomm1 1676/tcp netcomm1 netcomm2 1676/udp netcomm2 # Bulent Kasman groupwise 1677/tcp groupwise groupwise 1677/udp groupwise # Brent Bradshaw prolink 1678/tcp prolink prolink 1678/udp prolink # Brian Abramson darcorp-lm 1679/tcp darcorp-lm darcorp-lm 1679/udp darcorp-lm # microcom-sbp 1680/tcp microcom-sbp microcom-sbp 1680/udp microcom-sbp # Boris B. Maiden sd-elmd 1681/tcp sd-elmd sd-elmd 1681/udp sd-elmd # Bryan Otey lanyon-lantern 1682/tcp lanyon-lantern lanyon-lantern 1682/udp lanyon-lantern # Robin Lewis ncpm-hip 1683/tcp ncpm-hip ncpm-hip 1683/udp ncpm-hip # Ken Hearn snaresecure 1684/tcp SnareSecure snaresecure 1684/udp SnareSecure # Marty Batchelder n2nremote 1685/tcp n2nremote n2nremote 1685/udp n2nremote # Kin Chan cvmon 1686/tcp cvmon cvmon 1686/udp cvmon # Carol Ann Krug nsjtp-ctrl 1687/tcp nsjtp-ctrl nsjtp-ctrl 1687/udp nsjtp-ctrl nsjtp-data 1688/tcp nsjtp-data nsjtp-data 1688/udp nsjtp-data # Orazio Granato firefox 1689/tcp firefox firefox 1689/udp firefox # Mark S. Edwards ng-umds 1690/tcp ng-umds ng-umds 1690/udp ng-umds # Louis E. Simard <76400.3371@compuserve.com> empire-empuma 1691/tcp empire-empuma empire-empuma 1691/udp empire-empuma # Bobby Krupczak sstsys-lm 1692/tcp sstsys-lm sstsys-lm 1692/udp sstsys-lm # Yih-Wu Wang rrirtr 1693/tcp rrirtr rrirtr 1693/udp rrirtr rrimwm 1694/tcp rrimwm rrimwm 1694/udp rrimwm rrilwm 1695/tcp rrilwm rrilwm 1695/udp rrilwm rrifmm 1696/tcp rrifmm rrifmm 1696/udp rrifmm rrisat 1697/tcp rrisat rrisat 1697/udp rrisat # Allen Briggs rsvp-encap-1 1698/tcp RSVP-ENCAPSULATION-1 rsvp-encap-1 1698/udp RSVP-ENCAPSULATION-1 rsvp-encap-2 1699/tcp RSVP-ENCAPSULATION-2 rsvp-encap-2 1699/udp RSVP-ENCAPSULATION-2 # Bob Braden mps-raft 1700/tcp mps-raft mps-raft 1700/udp mps-raft # Jason Leupen l2f 1701/tcp l2f l2f 1701/udp l2f l2tp 1701/tcp l2tp l2tp 1701/udp l2tp # Andy Valencia deskshare 1702/tcp deskshare deskshare 1702/udp deskshare # Sarah Thompson bcs-broker 1704/tcp bcs-broker bcs-broker 1704/udp bcs-broker # Andy Warner slingshot 1705/tcp slingshot slingshot 1705/udp slingshot # Paul Groarke jetform 1706/tcp jetform jetform 1706/udp jetform # gdeinsta vdmplay 1707/tcp vdmplay vdmplay 1707/udp vdmplay # Vadim Lebedev gat-lmd 1708/tcp gat-lmd gat-lmd 1708/udp gat-lmd # Igor Zaoutine centra 1709/tcp centra centra 1709/udp centra # Drew Wolff impera 1710/tcp impera impera 1710/udp impera # Stepehen Campbell pptconference 1711/tcp pptconference pptconference 1711/udp pptconference # John Tafoya registrar 1712/tcp resource monitoring service registrar 1712/udp resource monitoring service # Ron Lawson conferencetalk 1713/tcp ConferenceTalk conferencetalk 1713/udp ConferenceTalk # George Kajos sesi-lm 1714/tcp sesi-lm sesi-lm 1714/udp sesi-lm houdini-lm 1715/tcp houdini-lm houdini-lm 1715/udp houdini-lm # Paul Breslin xmsg 1716/tcp xmsg xmsg 1716/udp xmsg # Mark E. Fogle fj-hdnet 1717/tcp fj-hdnet fj-hdnet 1717/udp fj-hdnet # Manabu Makino h323gatedisc 1718/tcp h323gatedisc h323gatedisc 1718/udp h323gatedisc h323gatestat 1719/tcp h323gatestat h323gatestat 1719/udp h323gatestat h323hostcall 1720/tcp h323hostcall h323hostcall 1720/udp h323hostcall # Jim Toga caicci 1721/tcp caicci caicci 1721/udp caicci # Sylvia Scheuren hks-lm 1722/tcp HKS License Manager hks-lm 1722/udp HKS License Manager # Michael Wood pptp 1723/tcp pptp pptp 1723/udp pptp # Ken Crocker csbphonemaster 1724/tcp csbphonemaster csbphonemaster 1724/udp csbphonemaster # Mark Kellerhuis iden-ralp 1725/tcp iden-ralp iden-ralp 1725/udp iden-ralp # Chris Stanaway iberiagames 1726/tcp IBERIAGAMES iberiagames 1726/tcp IBERIAGAMES # Jose Luis <73374.313@compuserve.com> winddx 1727/tcp winddx winddx 1727/udp winddx # Bill Andrews telindus 1728/tcp TELINDUS telindus 1728/udp TELINDUS # Paul Pyck roketz 1730/tcp roketz roketz 1730/udp roketz # Ahti Heinla msiccp 1731/tcp MSICCP msiccp 1731/udp MSICCP # Max Morris proxim 1732/tcp proxim proxim 1732/udp proxim # Srinivas N. Mogalapalli siipat 1733/tcp SIMS - SIIPAT Protocol for Alarm Transmission siipat 1733/udp SIMS - SIIPAT Protocol for Alarm Transmission # Steve Ryckman cambertx-lm 1734/tcp Camber Corporation License Management cambertx-lm 1734/udp Camber Corporation License Management # Jeannie Burleson privatechat 1735/tcp PrivateChat privatechat 1735/udp PrivateChat # Louis E. Simard <76400.3371@CompuServe.COM> street-stream 1736/tcp street-stream street-stream 1736/udp street-stream # Glenn Levitt ultimad 1737/tcp ultimad ultimad 1737/udp ultimad # (Michael Lanzetta gamegen1 1738/tcp GameGen1 gamegen1 1738/udp GameGen1 # Glen Pearson webaccess 1739/tcp webaccess webaccess 1739/udp webaccess # Christian Saether encore 1740/tcp encore encore 1740/udp encore # Stuart Button cisco-net-mgmt 1741/tcp cisco-net-mgmt cisco-net-mgmt 1741/udp cisco-net-mgmt # John McCormack 3Com-nsd 1742/tcp 3Com-nsd 3Com-nsd 1742/udp 3Com-nsd # Nitza Steinberg cinegrfx-lm 1743/tcp Cinema Graphics License Manager cinegrfx-lm 1743/udp Cinema Graphics License Manager # Rodney Iwashina ncpm-ft 1744/tcp ncpm-ft ncpm-ft 1744/udp ncpm-ft # Ken Hearn remote-winsock 1745/tcp remote-winsock remote-winsock 1745/udp remote-winsock # Avi Nathan ftrapid-1 1746/tcp ftrapid-1 ftrapid-1 1746/udp ftrapid-1 ftrapid-2 1747/tcp ftrapid-2 ftrapid-2 1747/udp ftrapid-2 # Richard J. Williams oracle-em1 1748/tcp oracle-em1 oracle-em1 1748/udp oracle-em1 # Bob Purvy aspen-services 1749/tcp aspen-services aspen-services 1749/udp aspen-services # Mark B. Hurst sslp 1750/tcp Simple Socket Library's PortMaster sslp 1750/udp Simple Socket Library's PortMaster # Dr. Charles E. Campbell Jr. # swiftnet 1751/tcp SwiftNet swiftnet 1751/udp SwiftNet # Terry Lim lofr-lm 1752/tcp Leap of Faith Research License Manager lofr-lm 1752/udp Leap of Faith Research License Manager # translogic-lm 1753/tcp Translogic License Manager translogic-lm 1753/udp Translogic License Manager # Stan Dallas oracle-em2 1754/tcp oracle-em2 oracle-em2 1754/udp oracle-em2 # Bob Purvy ms-streaming 1755/tcp ms-streaming ms-streaming 1755/udp ms-streaming # Bret O'Rourke capfast-lmd 1756/tcp capfast-lmd capfast-lmd 1756/udp capfast-lmd # Chuck Neal cnhrp 1757/tcp cnhrp cnhrp 1757/udp cnhrp # William Stoye tftp-mcast 1758/tcp tftp-mcast tftp-mcast 1758/udp tftp-mcast # Tom Emberson spss-lm 1759/tcp SPSS License Manager spss-lm 1759/udp SPSS License Manager # Tex Hull www-ldap-gw 1760/tcp www-ldap-gw www-ldap-gw 1760/udp www-ldap-gw # Nick Emery cft-0 1761/tcp cft-0 cft-0 1761/udp cft-0 cft-1 1762/tcp cft-1 cft-1 1762/udp cft-1 cft-2 1763/tcp cft-2 cft-2 1763/udp cft-2 cft-3 1764/tcp cft-3 cft-3 1764/udp cft-3 cft-4 1765/tcp cft-4 cft-4 1765/udp cft-4 cft-5 1766/tcp cft-5 cft-5 1766/udp cft-5 cft-6 1767/tcp cft-6 cft-6 1767/udp cft-6 cft-7 1768/tcp cft-7 cft-7 1768/udp cft-7 # Martine Marchand 16 1 46 59 24 84 bmc-net-adm 1769/tcp bmc-net-adm bmc-net-adm 1769/udp bmc-net-adm # Cameron Haight bmc-net-svc 1770/tcp bmc-net-svc bmc-net-svc 1770/udp bmc-net-svc # Cameron Haight bmc-net-svc vaultbase 1771/tcp vaultbase vaultbase 1771/udp vaultbase # Jose A. Sesin essweb-gw 1772/tcp EssWeb Gateway essweb-gw 1772/udp EssWeb Gateway # Bob Nattenberg kmscontrol 1773/tcp KMSControl kmscontrol 1773/udp KMSControl # Roy Chastain global-dtserv 1774/tcp global-dtserv global-dtserv 1774/udp global-dtserv # Nicholas Davies # 1775/tcp 199z femis 1776/tcp Federal Emergency Management Information System femis 1776/udp Federal Emergency Management Information System # Larry Gerhardstein powerguardian 1777/tcp powerguardian powerguardian 1777/udp powerguardian # Charles Bennett prodigy-internet1778/tcp prodigy-internet prodigy-internet1778/udp prodigy-internet # Bob Dedrick pharmasoft 1779/tcp pharmasoft pharmasoft 1779/udp pharmasoft # Ola Strandberg dpkeyserv 1780/tcp dpkeyserv dpkeyserv 1780/udp dpkeyserv # Yasunari Gon Yamasita answersoft-lm 1781/tcp answersoft-lm answersoft-lm 1781/udp answersoft-lm # James A. Brewster hp-hcip 1782/tcp hp-hcip hp-hcip 1782/udp hp-hcip # Allen Baker fjris 1783/tcp Fujitsu Remote Install Service fjris 1783/udp Fujitsu Remote Install Service # Naohito Nakamura # finle-lm 1784/tcp Finle License Manager finle-lm 1784/udp Finle License Manager # Dongling Wang windlm 1785/tcp Wind River Systems License Manager windlm 1785/udp Wind River Systems License Manager # Will Dere funk-logger 1786/tcp funk-logger funk-logger 1786/udp funk-logger funk-license 1787/tcp funk-license funk-license 1787/udp funk-license # Cimarron Boozer # Eric Wilde psmond 1788/tcp psmond psmond 1788/udp psmond # Will Golson hello 1789/tcp hello hello 1789/udp hello # D. J. Bernstein nmsp 1790/tcp Narrative Media Streaming Protocol nmsp 1790/udp Narrative Media Streaming Protocol # Paul Santinelli, Jr. ea1 1791/tcp EA1 ea1 1791/udp EA1 # Kirk MacLean ibm-dt-2 1792/tcp ibm-dt-2 ibm-dt-2 1792/udp ibm-dt-2 # Sam Borman rsc-robot 1793/tcp rsc-robot rsc-robot 1793/udp rsc-robot # Andrew Jay Schneider cera-bcm 1794/tcp cera-bcm cera-bcm 1794/udp cera-bcm # Leo Moesgaard dpi-proxy 1795/tcp dpi-proxy dpi-proxy 1795/udp dpi-proxy # Charles Gordon vocaltec-admin 1796/tcp Vocaltec Server Administration vocaltec-admin 1796/udp Vocaltec Server Administration # Scott Petrack uma 1797/tcp UMA uma 1797/udp UMA # Martin Kirk etp 1798/tcp Event Transfer Protocol etp 1798/udp Event Transfer Protocol # Mike Wray netrisk 1799/tcp NETRISK netrisk 1799/udp NETRISK # Kevin Green ansys-lm 1800/tcp ANSYS-License manager ansys-lm 1800/udp ANSYS-License manager # Suzanne Lorrin msmq 1801/tcp Microsoft Message Que msmq 1801/udp Microsoft Message Que # Amnon Horowitz concomp1 1802/tcp ConComp1 concomp1 1802/udp ConComp1 # Ed Vincent <@edv@concomp.com> hp-hcip-gwy 1803/tcp HP-HCIP-GWY hp-hcip-gwy 1803/udp HP-HCIP-GWY # Allen Baker enl 1804/tcp ENL enl 1804/udp ENL # Brian Olson enl-name 1805/tcp ENL-Name enl-name 1805/udp ENL-Name # Brain Olson musiconline 1806/tcp Musiconline musiconline 1806/udp Musiconline # Craig Weeks fhsp 1807/tcp Fujitsu Hot Standby Protocol fhsp 1807/udp Fujitsu Hot Standby Protocol # Eiki Iwata (eiki@nd.net.fujitsu.co.jp> oracle-vp2 1808/tcp Oracle-VP2 oracle-vp2 1808/udp Oracle-VP2 # Craig Fowler oracle-vp1 1809/tcp Oracle-VP1 oracle-vp1 1809/udp Oracle-VP1 # Craig Fowler jerand-lm 1810/tcp Jerand License Manager jerand-lm 1810/udp Jerand License Manager # Robert Monat scientia-sdb 1811/tcp Scientia-SDB scientia-sdb 1811/udp Scientia-SDB # Ian Miller radius 1812/tcp RADIUS radius 1812/udp RADIUS # Carl Rigney radius-acct 1813/tcp RADIUS Accounting radius-acct 1813/udp RADIUS Accounting # Carl Rigney tdp-suite 1814/tcp TDP Suite tdp-suite 1814/udp TDP Suite # Rob Lockhart mmpft 1815/tcp MMPFT mmpft 1815/udp MMPFT # Ralf Muckenhirn # harp 1816/tcp HARP harp 1816/udp HARP # Bjorn Chambless # 1817 Unassigned etftp 1818/tcp Enhanced Trivial File Transfer Protocol etftp 1818/udp Enhanced Trivial File Transfer Protocol # William Polites plato-lm 1819/tcp Plato License Manager plato-lm 1819/udp Plato License Manager # Mark Morris mcagent 1820/tcp mcagent mcagent 1820/udp mcagent # Ryoichi Shinohara donnyworld 1821/tcp donnyworld donnyworld 1821/udp donnyworld # Don Oliver es-elmd 1822/tcp es-elmd es-elmd 1822/udp es-elmd # David Duncan unisys-lm 1823/tcp Unisys Natural Language License Manager unisys-lm 1823/udp Unisys Natural Language License Manager # Raymond A. Diedrichs metrics-pas 1824/tcp metrics-pas metrics-pas 1824/udp metrics-pas # Tom Haapanen # 1825-1849 Unassigned gsi 1850/tcp GSI gsi 1850/udp GSI # William Mullaney # 1851-1859 Unassigned sunscalar-svc 1860/tcp SunSCALAR Services sunscalar-svc 1860/udp SunSCALAR Services # Sanjay Radia lecroy-vicp 1861/udp LeCroy VICP lecroy-vcip 1861/tcp LeCroy VICP # Anthony Cake techra-server 1862/tcp techra-server techra-server 1862/udp techra-server # Roy Lyseng msnp 1863/tcp MSNP msnp 1863/udp MSNP # William Lai paradym-31port 1864/tcp Paradym 31 Port paradym-31port 1864/udp Paradym 31 Port # David Wooden entp 1865/tcp ENTP entp 1865/udp ENTP # Seiko Epson # 1866-1869 Unassigned sunscalar-dns 1870/tcp SunSCALAR DNS Service sunscalar-dns 1870/udp SunSCALAR DNS Service # Sanjay Radia # 1871-1880 Unassigned ibm-mqseries2 1881/tcp IBM MQSeries ibm-mqseries2 1881/udp IBM MQSeries # Steve Hall # 1882-1900 Unassigned fjicl-tep-a 1901/tcp Fujitsu ICL Terminal Emulator Program A fjicl-tep-a 1901/udp Fujitsu ICL Terminal Emulator Program A # Bob Lyon fjicl-tep-b 1902/tcp Fujitsu ICL Terminal Emulator Program B fjicl-tep-b 1902/udp Fujitsu ICL Terminal Emulator Program B # Bob Lyon linkname 1903/tcp Local Link Name Resolution linkname 1903/udp Local Link Name Resolution # Dan Harrington fjicl-tep-c 1904/tcp Fujitsu ICL Terminal Emulator Program C fjicl-tep-c 1904/udp Fujitsu ICL Terminal Emulator Program C # Bob Lyon sugp 1905/tcp Secure UP.Link Gateway Protocol sugp 1905/udp Secure UP.Link Gateway Protocol # Peter King tpmd 1906/tcp TPortMapperReq tpmd 1906/udp TPortMapperReq # Sheila Devins intrastar 1907/tcp IntraSTAR intrastar 1907/udp IntraSTAR # Peter Schoenberger dawn 1908/tcp Dawn dawn 1908/udp Dawn # Michael Crawford global-wlink 1909/tcp Global World Link global-wlink 1909/udp Global World Link # Nicholas Davies # 1908-1910 Unassigned mtp 1911/tcp Starlight Networks Multimedia Transport Protocol mtp 1911/tcp Starlight Networks Multimedia Transport Protocol # Bruce Lieberman 1912 Unassigned # Tom Lake armadp 1913/tcp armadp armadp 1913/udp armadp # Kevin Welton elm-momentum 1914/tcp Elm-Momentum elm-momentum 1914/udp Elm-Momentum # Willie Wu facelink 1915/tcp FACELINK facelink 1915/udp FACELINK # J.H. Hermans persona 1916/tcp Persoft Persona persona 1916/udp Persoft Persona # Tom Spidell noagent 1917/tcp nOAgent noagent 1917/udp nOAgent # Martin Bestmann can-nds 1918/tcp Candle Directory Service - NDS can-nds 1918/udp Candle Directory Service - NDS can-dch 1919/tcp Candle Directory Service - DCH can-dch 1919/udp Candle Directory Service - DCH can-ferret 1920/tcp Candle Directory Service - FERRET can-ferret 1920/udp Candle Directory Service - FERRET # Dannis Yang noadmin 1921/tcp NoAdmin noadmin 1921/udp NoAdmin # Martin Bestmann # 1922-1943 Unassigned close-combat 1944/tcp close-combat close-combat 1944/udp close-combat # David Hua dialogic-elmd 1945/tcp dialogic-elmd dialogic-elmd 1945/udp dialogic-elmd # Roger Kay tekpls 1946/tcp tekpls tekpls 1946/udp tekpls # Brian Abramson hlserver 1947/tcp hlserver hlserver 1947/udp hlserver # Michael Zzunke eye2eye 1948/tcp eye2eye eye2eye 1948/udp eye2eye # Trevor Bell ismaeasdaqlive 1949/tcp ISMA Easdaq Live ismaeasdaqlive 1949/udp ISMA Easdaq Live ismaeasdaqtest 1950/tcp ISMA Easdaq Test ismaeasdaqtest 1950/udp ISMA Easdaq Test # Stephen Dunne bcs-lmserver 1951/tcp bcs-lmserver bcs-lmserver 1951/udp bcs-lmserver # Andy Warner # 1952-1972 Unassigned dlsrap 1973/tcp Data Link Switching Remote Access Protocol dlsrap 1973/udp Data Link Switching Remote Access Protocol # Steve T. Chiang # 1974-1984 Unassigned ##########Use the above block for Cisco?################ hsrp 1985/tcp Hot Standby Router Protocol hsrp 1985/udp Hot Standby Router Protocol # Phil Morton licensedaemon 1986/tcp cisco license management licensedaemon 1986/udp cisco license management tr-rsrb-p1 1987/tcp cisco RSRB Priority 1 port tr-rsrb-p1 1987/udp cisco RSRB Priority 1 port tr-rsrb-p2 1988/tcp cisco RSRB Priority 2 port tr-rsrb-p2 1988/udp cisco RSRB Priority 2 port tr-rsrb-p3 1989/tcp cisco RSRB Priority 3 port tr-rsrb-p3 1989/udp cisco RSRB Priority 3 port # The following entry records an unassigned but widespread use mshnet 1989/tcp MHSnet system mshnet 1989/udp MHSnet system # Bob Kummerfeld stun-p1 1990/tcp cisco STUN Priority 1 port stun-p1 1990/udp cisco STUN Priority 1 port stun-p2 1991/tcp cisco STUN Priority 2 port stun-p2 1991/udp cisco STUN Priority 2 port stun-p3 1992/tcp cisco STUN Priority 3 port stun-p3 1992/udp cisco STUN Priority 3 port # The following entry records an unassigned but widespread use ipsendmsg 1992/tcp IPsendmsg ipsendmsg 1992/udp IPsendmsg # Bob Kummerfeld snmp-tcp-port 1993/tcp cisco SNMP TCP port snmp-tcp-port 1993/udp cisco SNMP TCP port stun-port 1994/tcp cisco serial tunnel port stun-port 1994/udp cisco serial tunnel port perf-port 1995/tcp cisco perf port perf-port 1995/udp cisco perf port tr-rsrb-port 1996/tcp cisco Remote SRB port tr-rsrb-port 1996/udp cisco Remote SRB port gdp-port 1997/tcp cisco Gateway Discovery Protocol gdp-port 1997/udp cisco Gateway Discovery Protocol x25-svc-port 1998/tcp cisco X.25 service (XOT) x25-svc-port 1998/udp cisco X.25 service (XOT) tcp-id-port 1999/tcp cisco identification port tcp-id-port 1999/udp cisco identification port callbook 2000/tcp callbook 2000/udp dc 2001/tcp wizard 2001/udp curry globe 2002/tcp globe 2002/udp mailbox 2004/tcp emce 2004/udp CCWS mm conf berknet 2005/tcp oracle 2005/udp invokator 2006/tcp raid-cc 2006/udp raid dectalk 2007/tcp raid-am 2007/udp conf 2008/tcp terminaldb 2008/udp news 2009n/tcp whosockami 2009/udp search 2010/tcp pipe_server 2010/udp raid-cc 2011/tcp raid servserv 2011/udp ttyinfo 2012/tcp raid-ac 2012/udp raid-am 2013/tcp raid-cd 2013/udp troff 2014/tcp raid-sf 2014/udp cypress 2015/tcp raid-cs 2015/udp bootserver 2016/tcp bootserver 2016/udp cypress-stat 2017/tcp bootclient 2017/udp terminaldb 2018/tcp rellpack 2018/udp whosockami 2019/tcp about 2019/udp xinupageserver 2020/tcp xinupageserver 2020/udp servexec 2021/tcp xinuexpansion1 2021/udp down 2022/tcp xinuexpansion2 2022/udp xinuexpansion3 2023/tcp xinuexpansion3 2023/udp xinuexpansion4 2024/tcp xinuexpansion4 2024/udp ellpack 2025/tcp xribs 2025/udp scrabble 2026/tcp scrabble 2026/udp shadowserver 2027/tcp shadowserver 2027/udp submitserver 2028/tcp submitserver 2028/udp device2 2030/tcp device2 2030/udp blackboard 2032/tcp blackboard 2032/udp glogger 2033/tcp glogger 2033/udp scoremgr 2034/tcp scoremgr 2034/udp imsldoc 2035/tcp imsldoc 2035/udp objectmanager 2038/tcp objectmanager 2038/udp lam 2040/tcp lam 2040/udp interbase 2041/tcp interbase 2041/udp isis 2042/tcp isis isis 2042/udp isis isis-bcast 2043/tcp isis-bcast isis-bcast 2043/udp isis-bcast # Ken Chapman dlsrpn 2065/tcp Data Link Switch Read Port Number dlsrpn 2065/udp Data Link Switch Read Port Number dlswpn 2067/tcp Data Link Switch Write Port Number dlswpn 2067/udp Data Link Switch Write Port Number lrp 2090/tcp Load Report Protocol lrp 2090/udp Load Report Protocol # Amir Peless # 2091-2101 Unassigned zephyr-srv 2102/tcp Zephyr server zephyr-srv 2102/udp Zephyr server zephyr-clt 2103/tcp Zephyr serv-hm connection zephyr-clt 2103/udp Zephyr serv-hm connection zephyr-hm 2104/tcp Zephyr hostmanager zephyr-hm 2104/udp Zephyr hostmanager # Greg Hudson minipay 2105/tcp MiniPay minipay 2105/udp MiniPay # Amir Herzberg # 2106-2179 Unassigned mc-gt-srv 2180/tcp Millicent Vendor Gateway Server mc-gt-srv 2180/udp Millicent Vendor Gateway Server # Steve Glassman ats 2201/tcp Advanced Training System Program ats 2201/udp Advanced Training System Program # imtc-map 2202/tcp Int. Multimedia Teleconferencing Cosortium imtc-map 2202/udp Int. Multimedia Teleconferencing Cosortium # Pat Galvin kali 2213/tcp Kali kali 2213/udp Kali # Jay Cotton ganymede 2220/tcp Ganymede ganymede 2220/udp Ganymede # David Quan unreg-ab1 2221/tcp Allen-Bradley unregistered port unreg-ab1 2221/udp Allen-Bradley unregistered port unreg-ab2 2222/tcp Allen-Bradley unregistered port unreg-ab2 2222/udp Allen-Bradley unregistered port inreg-ab3 2223/tcp Allen-Bradley unregistered port inreg-ab3 2223/udp Allen-Bradley unregistered port # ivs-video 2232/tcp IVS Video default ivs-video 2232/udp IVS Video default # Thierry Turletti infocrypt 2233/tcp INFOCRYPT infocrypt 2233/udp INFOCRYPT # Erica Liu directplay 2234/tcp DirectPlay directplay 2234/udp DirectPlay # Ajay Jindal sercomm-wlink 2235/tcp Sercomm-WLink sercomm-wlink 2235/udp Sercomm-WLink # Melinda Tsao nani 2236/tcp Nani nani 2236/udp Nani # Steve Benoit optech-port1-lm 2237/tcp Optech Port1 License Manager optech-port1-lm 2237/udp Optech Port1 License Manager # Gerard Cannie aviva-sna 2238/tcp AVIVA SNA SERVER aviva-sna 2238/udp AVIVA SNA SERVER # Vick Keshishian imagequery 2239/tcp Image Query imagequery 2239/udp Image Query # Charles Jacobs recipe 2240/tcp RECIPe recipe 2240/udp RECIPe # Jerry Freedman ivsd 2241/tcp IVS Daemon ivsd 2241/udp IVS Daemon # Thierry Turletti foliocorp 2242/tcp Folio Remote Server foliocorp 2242/udp Folio Remote Server # Pat Mcgowan # 2243-2278 Unassigned xmquery 2279/tcp xmquery xmquery 2279/udp xmquery # Niels Christiansen lnvpoller 2280/tcp LNVPOLLER lnvpoller 2280/udp LNVPOLLER lnvconsole 2281/tcp LNVCONSOLE lnvconsole 2281/udp LNVCONSOLE lnvalarm 2282/tcp LNVALARM lnvalarm 2282/udp LNVALARM lnvstatus 2283/tcp LNVSTATUS lnvstatus 2283/udp LNVSTATUS lnvmaps 2284/tcp LNVMAPS lnvmaps 2284/udp LNVMAPS lnvmailmon 2285/tcp LNVMAILMON lnvmailmon 2285/udp LNVMAILMON # Andrew MacKeith nas-metering 2286/tcp NAS-Metering nas-metering 2286/udp NAS-Metering # Steven Sawkins dna 2287/tcp DNA dna 2287/udp DNA # Tung Nguyen netml 2288/tcp NETML netml 2288/udp NETML # Jochen Hansmeyer # 2289-2294 Unassigned advant-lm 2295/tcp Advant License Manager advant-lm 2295/udp Advant License Manager # Lars-Goran Magnusson # theta-lm 2296/tcp Theta License Manager (Rainbow) theta-lm 2296/udp Theta License Manager (Rainbow) # David Thompson d2k-datamover1 2297/tcp D2K DataMover 1 d2k-datamover1 2297/udp D2K DataMover 1 d2k-datamover2 2298/tcp D2K DataMover 2 d2k-datamover2 2298/udp D2K DataMover 2 # Eric Lan pc-telecommute 2299/tcp PC Telecommute pc-telecommute 2299/udp PC Telecommute # John Daniel Bonamico cvmmon 2300/tcp CVMMON cvmmon 2300/udp CVMMON # Roger Kumpf cpq-wbem 2301/tcp Compaq HTTP cpq-wbem 2301/udp Compaq HTTP # Scott Shaffer binderysupport 2302/tcp Bindery Support binderysupport 2302/udp Bindery Support # Narasimha Rao N. proxy-gateway 2303/tcp Proxy Gateway proxy-gateway 2303/udp Proxy Gateway # Paul Funk attachmate-uts 2304/tcp Attachmate UTS attachmate-uts 2304/udp Attachmate UTS # George Gianelos # 2305-2306 Unassigned pehelp 2307/tcp pehelp pehelp 2307/udp pehelp # Jens Kilian sdhelp 2308/tcp sdhelp sdhelp 2308/udp sdhelp # Annette Klecha sdserver 2309/tcp SD Server sdserver 2309/udp SD Server sdclient 2310/tcp SD Client sdclient 2310/udp SD Client # Jeurgen Broesamle messageservice 2311/tcp Message Service messageservice 2311/udp Message Service # 2312 Unassigned iapp 2313/tcp IAPP (Inter Access Point Protocol) iapp 2313/udp IAPP (Inter Access Point Protocol) # Henri Moelard cr-websystems 2314/tcp CR WebSystems cr-websystems 2314/udp CR WebSystems # Robin Giese precise-sft 2315/tcp Precise Sft. precise-sft 2315/udp Precise Sft. # Michael Landwehr sent-lm 2316/tcp SENT License Manager sent-lm 2316/udp SENT License Manager # Pisharath Krishnan attachmate-g32 2317/tcp Attachmate G32 attachmate-g32 2317/udp Attachmate G32 # Bryce Bhatnagar cadencecontrol 2318/tcp Cadence Control cadencecontrol 2318/udp Cadence Control # Buck Caldwell infolibria 2319/tcp InfoLibria infolibria 2319/udp InfoLibria # Chris Chiotasso siebel-ns 2320/tcp Siebel NS siebel-ns 2320/udp Siebel NS # Gilberto Arnaiz rdlap 2321/tcp RDLAP over UDP rdlap 2321/udp RDLAP # Robert Wiebe ofsd 2322/tcp ofsd ofsd 2322/udp ofsd 3d-nfsd 2323/tcp 3d-nfsd 3d-nfsd 2323/udp 3d-nfsd # Mike Sherrill cosmocall 2324/tcp Cosmocall cosmocall 2324/udp Cosmocall # Steve Dellutri designspace-lm 2325/tcp Design Space License Management designspace-lm 2325/udp Design Space License Management # Suzanne Lorrin idcp 2326/tcp IDCP idcp 2326/udp IDCP # Keisokugiken Corp. xingcsm 2327/tcp xingcsm xingcsm 2327/udp xingcsm # Dave Spencer netrix-sftm 2328/tcp Netrix SFTM netrix-sftm 2328/udp Netrix SFTM # Garrett Herschleb nvd 2329/tcp NVD nvd 2329/udp NVD # Peter Weyman tscchat 2330/tcp TSCCHAT tscchat 2330/udp TSCCHAT # Mike Jackson agentview 2331/tcp AGENTVIEW agentview 2331/udp AGENTVIEW # Ram Iyer rcc-host 2332/tcp RCC Host rcc-host 2332/udp RCC Host # Martin Shoemaker snapp 2333/tcp SNAPP snapp 2333/udp SNAPP # Kevin Obsorn ace-client 2334/tcp ACE Client Auth ace-client 2334/udp ACE Client Auth ace-proxy 2335/tcp ACE Proxy ace-proxy 2335/udp ACE Proxy # Riaz Zolfonoon appleugcontrol 2336/tcp Apple UG Control appleugcontrol 2336/udp Apple UG Control # Gene Tyacke ideesrv 2337/tcp ideesrv ideesrv 2337/udp ideesrv # Marazzi norton-lambert 2338/tcp Norton Lambert norton-lambert 2338/udp Norton Lambert # Richard de Mornay 3com-webview 2339/tcp 3Com WebView 3com-webview 2339/udp 3Com WebView # Jennifer Grace wrs_registry 2340/tcp WRS Registry wrs_registry 2340/udp WRS Registry # Christophe Cleraux xiostatus 2341/tcp XIO Status xiostatus 2341/udp XIO Status # Randy Maas manage-exec 2342/tcp Seagate Manage Exec manage-exec 2342/udp Seagate Manage Exec # Jim Flaherty nati-logos 2343/tcp nati logos nati-logos 2343/udp nati logos # David Pierce fcmsys 2344/tcp fcmsys fcmsys 2344/udp fcmsys dbm 2345/tcp dbm dbm 2345/udp dbm # Dean Robson redstorm_join 2346/tcp Game Connection Port redstorm_join 2346/udp Game Connection Port redstorm_find 2347/tcp Game Announcement and Location redstorm_find 2347/udp Game Announcement and Location redstorm_info 2348/tcp Information to query for game status redstorm_info 2348/udp Information to query for game status redstorm_diag 2349/tcp Diagnostics Port redstorm_diag 2349/udp Disgnostics Port # David Weinstein psbserver 2350/tcp psbserver psbserver 2350/udp psbserver psrserver 2351/tcp psrserver psrserver 2351/udp psrserver pslserver 2352/tcp pslserver pslserver 2352/udp pslserver pspserver 2353/tcp pspserver pspserver 2353/udp pspserver psprserver 2354/tcp psprserver psprserver 2354/udp psprserver psdbserver 2355/tcp psdbserver psdbserver 2355/udp psdbserver # Paul Reddy gxtelmd 2356/tcp GXT License Managemant gxtelmd 2356/udp GXT License Managemant # Robert Hodgson unihub-server 2357/tcp UniHub Server unihub-server 2357/udp UniHub Server # Tim Kenyon futrix 2358/tcp Futrix futrix 2358/udp Futrix # Peter Frankenberg # 2359-2388 Unassigned ovsessionmgr 2389/tcp OpenView Session Mgr ovsessionmgr 2389/udp OpenView Session Mgr # Eric Pulsipher rsmtp 2390/tcp RSMTP rsmtp 2390/udp RSMTP # Geoff Collyer 3com-net-mgmt 2391/tcp 3COM Net Management 3com-net-mgmt 2391/udp 3COM Net Management # Prathibha Nagvar tacticalauth 2392/tcp Tactical Auth tacticalauth 2392/udp Tactical Auth # David Yon ms-olap1 2393/tcp MS OLAP 1 ms-olap1 2393/udp MS OLAP 1 ms-olap2 2394/tcp MS OLAP 2 ms-olap2 2394/udp MA OLAP 2 # Mosha Pasumansky lan900_remote 2395/tcp LAN900 Remote lan900_remote 2395/udp LAN900 Remote # Tom Quinlan wusage 2396/tcp Wusage wusage 2396/udp Wusage # Thomas Boutell ncl 2397/tcp NCL ncl 2397/udp NCL # Robert Wiebe orbiter 2398/tcp Orbiter orbiter 2398/udp Orbiter # David Goldberg fmpro-fdal 2399/tcp FileMaker, Inc. - Data Access Layer fmpro-fdal 2399/udp FileMaker, Inc. - Data Access Layer # Clay Maeckal opequus-server 2400/tcp OpEquus Server opequus-server 2400/udp OpEquus Server # Gavin Hutchinson cvspserver 2401/tcp cvspserver cvspserver 2401/udp cvspserver # Jim Kingdon taskmaster2000 2402/tcp TaskMaster 2000 Server taskmaster2000 2402/udp TaskMaster 2000 Server taskmaster2000 2403/tcp TaskMaster 2000 Web taskmaster2000 2403/udp TaskMaster 2000 Web # Ed Odjaghian iec870-5-104 2404/tcp IEC870-5-104 iec870-5-104 2404/udp IEC870-5-104 # Walter Eichelburg trc-netpoll 2405/tcp TRC Netpoll trc-netpoll 2405/udp TRC Netpoll # Bizhan Ghavami jediserver 2406/tcp JediServer jediserver 2406/udp JediServer # Paul McEntire orion 2407/tcp Orion orion 2407/udp Orion # Matthew Horoschun # 2408-2499 Unassigned rtsserv 2500/tcp Resource Tracking system server rtsserv 2500/udp Resource Tracking system server rtsclient 2501/tcp Resource Tracking system client rtsclient 2501/udp Resource Tracking system client # Aubrey Turner # # 2502-2524 Unassigned ms-v-worlds 2525/tcp MS V-Worlds ms-v-worlds 2525/udp MS V-Worlds # Pete Wong ema-sent-lm 2526/tcp EMA License Manager ema-sent-lm 2526/udp EMA License Manager # Thaddeus Perala iqserver 2527/tcp IQ Server iqserver 2527/udp IQ Server # Nick Straguzzi ncr_ccl 2528/tcp NCR CCL ncr_ccl 2528/udp NCR CCL # Amitava Dutta utsftp 2529/tcp UTS FTP utsftp 2529/udp UTS FTP # David Moore vrcommerce 2530/tcp VR Commerce vrcommerce 2530/udp VR Commerce # Yosi Mass ito-e-gui 2531/tcp ITO-E GUI ito-e-gui 2531/udp ITO-E GUI # Michael Haeuptle ovtopmd 2532/tcp OVTOPMD ovtopmd 2532/udp OVTOPMD # Eric Pulsipher # 2533 Unassigned combox-web-acc 2534/tcp Combox Web Access combox-web-acc 2534/udp Combox Web Access # Yochai Cohen # 2535-2563 Unassigned hp-3000-telnet 2564/tcp HP 3000 NS/VT block mode telnet # 2565-2591 Unassigned netrek 2592/tcp netrek netrek 2592/udp netrek # Al Guetzlaff mns-mail 2593/tcp MNS Mail Notice Service mns-mail 2593/udp MNS Mail Notice Service # Rumiko Kikuta # 2594-2627 Unassigned dict 2628/tcp DICT dict 2628/udp DICT # Rik Faith sitaraserver 2629/tcp Sitara Server sitaraserver 2629/udp Sitara Server sitaramgmt 2630/tcp Sitara Management sitaramgmt 2630/udp Sitara Management sitaradir 2631/tcp Sitara Dir sitaradir 2631/udp Sitara Dir # Manickam R.Sridhar irdg-post 2632/tcp IRdg Post irdg-post 2632/udp IRdg Post # IRdg, Inc. interintelli 2633/tcp InterIntelli interintelli 2633/udp InterIntelli # Mike Gagle pk-electronics 2634/tcp PK Electronics pk-electronics 2634/udp PK Electronics # Seb Ibis backburner 2635/tcp Back Burner backburner 2635/udp Back Burner # Kevin Teiskoetter solve 2636/tcp Solve solve 2636/udp Solve # Peter Morrison imdocsvc 2637/tcp Import Document Service imdocsvc 2637/udp Import Document Service # Zia Bhatti sybaseanywhere 2638/tcp Sybase Anywhere sybaseanywhere 2638/udp Sybase Anywhere # Verna Friesen aminet 2639/tcp AMInet aminet 2639/udp AMInet # Alcorn McBride Inc. sai_sentlm 2640/tcp Sabbagh Associates Licence Manager sai_sentlm 2640/udp Sabbagh Associates Licence Manager # Elias Sabbagh hdl-srv 2641/tcp HDL Server hdl-srv 2641/udp HDL Server # David Ely tragic 2642/tcp Tragic tragic 2642/udp Tragic # Stu Mark gte-samp 2643/tcp GTE-SAMP gte-samp 2643/udp GTE-SAMP # Asher Altman travsoft-ipx-t 2644/tcp Travsoft IPX Tunnel travsoft-ipx-t 2644/udp Travsoft IPX Tunnel # Jack Wilson novell-ipx-cmd 2645/tcp Novell IPX CMD novell-ipx-cmd 2645/udp Novell IPX CMD # Juan Carlos Luciani and-lm 2646/tcp AND Licence Manager and-lm 2646/udp AND License Manager # Dick van der Sijs syncserver 2647/tcp SyncServer syncserver 2647/udp SyncServer # Dave Finnegan upsnotifyprot 2648/tcp Upsnotifyprot upsnotifyprot 2648/udp Upsnotifyprot # Mario Leboute vpsipport 2649/tcp VPSIPPORT vpsipport 2649/udp VPSIPPORT # Joon Radley eristwoguns 2650/tcp eristwoguns eristwoguns 2650/udp eristwoguns # Ed Harris ebinsite 2651/tcp EBInSite ebinsite 2651/udp EBInSite # Lefteris Kalamaras interpathpanel 2652/tcp InterPathPanel interpathpanel 2652/udp InterPathPanel # Stephen Misel sonus 2653/tcp Sonus sonus 2653/udp Sonus # Mark Garti corel_vncadmin 2654/tcp Corel VNC Admin corel_vncadmin 2654/udp Corel VNC Admin # Oleg Noskov unglue 2655/tcp UNIX Nt Glue unglue 2655/udp UNIX Nt Glue # Peter Santoro kana 2656/tcp Kana kana 2656/udp Kana # Colin Goldstein sns-dispatcher 2657/tcp SNS Dispatcher sns-dispatcher 2657/udp SNS Dispatcher sns-admin 2658/tcp SNS Admin sns-admin 2658/udp SNS Admin sns-query 2659/tcp SNS Query sns-query 2659/udp SNS Query # Mary Holstege # 2660-2699 Unassigned tqdata 2700/tcp tqdata tqdata 2700/udp tqdata # Al Guetzlaff # 2701-2783 Unassigned www-dev 2784/tcp world wide web - development www-dev 2784/udp world wide web - development aic-np 2785/tcp aic-np aic-np 2785/udp aic-np # Brad Parker aic-oncrpc 2786/tcp aic-oncrpc - Destiny MCD database aic-oncrpc 2786/udp aic-oncrpc - Destiny MCD database # Brad Parker piccolo 2787/tcp piccolo - Cornerstone Software piccolo 2787/udp piccolo - Cornerstone Software # Dave Bellivea fryeserv 2788/tcp NetWare Loadable Module - Seagate Software fryeserv 2788/udp NetWare Loadable Module - Seagate Software # Joseph LoPilato media-agent 2789/tcp Media Agent media-agent 2789/udp Media Agent # Nitzan Daube # 2789-2907 Unassigned mao 2908/tcp mao mao 2908/udp mao # Marc Baudoin funk-dialout 2909/tcp Funk Dialout funk-dialout 2909/udp Funk Dialout # Cimarron Boozer tdaccess 2910/tcp TDAccess tdaccess 2910/udp TDAccess # Tom Haapanen blockade 2911/tcp Blockade blockade 2911/udp Blockade # Konstantin Iavid epicon 2912/tcp Epicon epicon 2912/udp Epicon # Michael Khalandovsky boosterware 2913/tcp Booster Ware boosterware 2913/udp Booster Ware # Ido Ben-David gamelobby 2914/tcp Game Lobby gamelobby 2914/udp Game Lobby # Paul Ford-Hutchinson tksocket 2915/tcp TK Socket tksocket 2915/udp TK Socket # Alan Fahrner elvin_server 2916/tcp Elvin Server elvin_server 2916/ucp Elvin Server elvin_client 2917/tcp Elvin Client elvin_client 2917/udp Elvin Client # David Arnold kastenchasepad 2918/tcp Kasten Chase Pad kastenchasepad 2918/udp Kasten Chase Pad # Marc Gauthier # 2918-2970 Unassigned netclip 2971/tcp Net Clip netclip 2971/udp Net Clip # Rudi Chiarito pmsm-webrctl 2972/tcp PMSM Webrctl pmsm-webrctl 2972/udp PMSM Webrctl # Markus Michels svnetworks 2973/tcp SV Networks svnetworks 2973/udp SV Networks # Sylvia Siu signal 2974/tcp Signal signal 2974/udp Signal # Wyatt Williams fjmpcm 2975/tcp Fujitsu Configuration Management Service fjmpcm 2975/udp Fujitsu Configuration Management Service # Hiroki Kawano # 2976-2997 Unassigned realsecure 2998/tcp Real Secure realsecure 2998/udp Real Secure # Tim Farley remoteware-un 2999/tcp RemoteWare Unassigned remoteware-un 2999/udp RemoteWare Unassigned # Tim Farley hbci 3000/tcp HBCI hbci 3000/udp HBCI # Kurt Haubner # The following entry records an unassigned but widespread use remoteware-cl 3000/tcp RemoteWare Client remoteware-cl 3000/udp RemoteWare Client # Tim Farley redwood-broker 3001/tcp Redwood Broker redwood-broker 3001/udp Redwood Broker # Joseph Morrison exlm-agent 3002/tcp EXLM Agent exlm-agent 3002/udp EXLM Agent # Randy Martin # The following entry records an unassigned but widespread use remoteware-srv 3002/tcp RemoteWare Server remoteware-srv 3002/udp RemoteWare Server # Tim Farley cgms 3003/tcp CGMS cgms 3003/udp CGMS # Jim Mazzonna csoftragent 3004/tcp Csoft Agent csoftragent 3004/udp Csoft Agent # Nedelcho Stanev geniuslm 3005/tcp Genius License Manager geniuslm 3005/udp Genius License Manager # Jakob Spies ii-admin 3006/tcp Instant Internet Admin ii-admin 3006/udp Instant Internet Admin # Lewis Donzis lotusmtap 3007/tcp Lotus Mail Tracking Agent Protocol lotusmtap 3007/udp Lotus Mail Tracking Agent Protocol # Ken Lin midnight-tech 3008/tcp Midnight Technologies midnight-tech 3008/udp Midnight Technologies # Kyle Unice pxc-ntfy 3009/tcp PXC-NTFY pxc-ntfy 3009/udp PXC-NTFY # Takeshi Nishizawa gw 3010/tcp Telerate Workstation ping-pong 3010/udp Telerate Workstation # Timo Sivonen trusted-web 3011/tcp Trusted Web trusted-web 3011/udp Trusted Web twsdss 3012/tcp Trusted Web Client twsdss 3012/udp Trusted Web Client # Alex Duncan gilatskysurfer 3013/tcp Gilat Sky Surfer gilatskysurfer 3013/udp Gilat Sky Surfer # Yossi Gal broker_service 3014/tcp Broker Service broker_service 3014/udp Broker Service # Dale Bethers nati-dstp 3015/tcp NATI DSTP nati-dstp 3015/udp NATI DSTP # Paul Austin notify_srvr 3016/tcp Notify Server notify_srvr 3016/udp Notify Server # Hugo Parra event_listener 3017/tcp Event Listener event_listener 3017/udp Event Listener # Ted Tronson srvc_registry 3018/tcp Service Registry srvc_registry 3018/udp Service Registry # Mark Killgore resource_mgr 3019/tcp Resource Manager resource_mgr 3019/udp Resource Manager # Gary Glover cifs 3020/tcp CIFS cifs 3020/udp CIFS # Paul Leach agriserver 3021/tcp AGRI Server agriserver 3021/udp AGRI Server # Frank Neulichedl # 3022-3046 Unassigned hlserver 3047/tcp Fast Security HL Server hlserver 3047/udp Fast Security HL Server # Michael Zunke pctrader 3048/tcp Sierra Net PC Trader pctrader 3048/udp Sierra Net PC Trader # Chris Hahn nsws 3049/tcp NSWS nsws 3049/udp NSWS # Ray Gwinn # 3050-3079 Unassigned stm_pproc 3080/tcp stm_pproc stm_pproc 3080/udp stm_pproc # Paul McGinnis # 3081-3104 Unassigned cardbox 3105/tcp Cardbox cardbox 3105/udp Cardbox cardbox-http 3106/tcp Cardbox HTTP cardbox-http 3106/udp Cardbox HTTP # Martin Kochanski # 3107-3129 Unassigned icpv2 3130/tcp ICPv2 icpv2 3130/udp ICPv2 # Duane Wessels netbookmark 3131/tcp Net Book Mark netbookmark 3131/udp Net Book Mark # Yiftach Ravid # 3132-3140 Unassigned vmodem 3141/tcp VMODEM vmodem 3141/udp VMODEM # Ray Gwinn rdc-wh-eos 3142/tcp RDC WH EOS rdc-wh-eos 3142/udp RDC WH EOS # Udi Nir seaview 3143/tcp Sea View seaview 3143/udp Sea View # Jim Flaherty tarantella 3144/tcp Tarantella tarantella 3144/udp Tarantella # Roger Binns csi-lfap 3145/tcp CSI-LFAP csi-lfap 3145/udp CSI-LFAP # Paul Amsden # 3146 Unassigned rfio 3147/tcp RFIO rfio 3147/udp RFIO # Frederic Hemmer # 3148-3179 Unassigned mc-brk-srv 3180/tcp Millicent Broker Server mc-brk-srv 3180/udp Millicent Broker Server # Steve Glassman # 3181-3263 Unassigned ccmail 3264/tcp cc:mail/lotus ccmail 3264/udp cc:mail/lotus altav-tunnel 3265/tcp Altav Tunnel altav-tunnel 3265/udp Altav Tunnel # Matt Thomas ns-cfg-server 3266/tcp NS CFG Server ns-cfg-server 3266/udp NS CFG Server # Aivi Lie ibm-dial-out 3267/tcp IBM Dial Out ibm-dial-out 3267/udp IBM Dial Out # Skip Booth msft-gc 3268/tcp Microsoft Global Catalog msft-gc 3268/udp Microsoft Global Catalog msft-gc-ssl 3269/tcp Microsoft Global Catalog with LDAP/SSL msft-gc-ssl 3269/udp Microsoft Global Catalog with LDAP/SSL # Steve Judd verismart 3270/tcp Verismart verismart 3270/udp Verismart # Jay Weber csoft-prev 3271/tcp CSoft Prev Port csoft-prev 3271/udp CSoft Prev Port # Nedelcho Stanev user-manager 3272/tcp Fujitsu User Manager user-manager 3272/udp Fujitsu User Manager # Yukihiko Sakurai sxmp 3273/tcp Simple Extensible Multiplexed Protocol sxmp 3273/udp Simple Extensible Multiplexed Protocol # Jerry Jongerius ordinox-server 3274/tcp Ordinox Server ordinox-server 3274/udp Ordinox Server # Guy Letourneau samd 3275/tcp SAMD samd 3275/udp SAMD # Edgar Circenis maxim-asics 3276/tcp Maxim ASICs maxim-asics 3276/udp Maxim ASICs # Dave Inman awg-proxy 3277/tcp AWG Proxy awg-proxy 3277/udp AWG Proxy # Alex McDonald lkcmserver 3278/tcp LKCM Server lkcmserver 3278/udp LKCM Server # Javier Jimenez admind 3279/tcp admind admind 3279/udp admind # Jeff Haynes vs-server 3280/tcp VS Server vs-server 3280/udp VS Server # Scott Godlew sysopt 3281/tcp SYSOPT sysopt 3281/udp SYSOPT # Tony Hoffman datusorb 3282/tcp Datusorb datusorb 3282/udp Datusorb # Thomas Martin net-assistant 3283/tcp Net Assistant net-assistant 3283/udp Net Assistant # Michael Stein 4talk 3284/tcp 4Talk 4talk 3284/udp 4Talk # Tony Bushnell plato 3285/tcp Plato plato 3285/udp Plato # Jim Battin e-net 3286/tcp E-Net e-net 3286/udp E-Net # Steven Grigsby directvdata 3287/tcp DIRECTVDATA directvdata 3287/udp DIRECTVDATA # Michael Friedman cops 3288/tcp COPS cops 3288/udp COPS # Shai Herzog enpc 3289/tcp ENPC enpc 3289/udp ENPC # SEIKO EPSON caps-lm 3290/tcp CAPS LOGISTICS TOOLKIT - LM caps-lm 3290/udp CAPS LOGISTICS TOOLKIT - LM # Joseph Krebs sah-lm 3291/tcp S A Holditch & Associates - LM sah-lm 3291/udp S A Holditch & Associates - LM # Randy Hudgens cart-o-rama 3292/tcp Cart O Rama cart-o-rama 3292/udp Cart O Rama # Phillip Dillinger fg-fps 3293/tcp fg-fps fg-fps 3293/udp fg-fps fg-gip 3294/tcp fg-gip fg-gip 3294/udp fg-gip # Jean-Marc Frailong dyniplookup 3295/tcp Dynamic IP Lookup dyniplookup 3295/udp Dynamic IP Lookup # Eugene Osovetsky rib-slm 3296/tcp Rib License Manager rib-slm 3296/udp Rib License Manager # Kristean Heisler cytel-lm 3297/tcp Cytel License Manager cytel-lm 3297/udp Cytel License Manager # Yogesh P. Gajjar transview 3298/tcp Transview transview 3298/udp Transview # Richard Obermeier pdrncs 3299/tcp pdrncs pdrncs 3299/udp pdrncs # Paul Wissenbach bmcpatrolagent 3300/tcp BMC Patrol Agent bmcpatrolagent 3300/udp BMC Patrol Agent bmcpatrolrnvu 3301/tcp BMC Patrol Rendezvous bmcpatrolrnvu 3301/udp BMC Patrol Rendezvous # Eric Anderson mcs-fastmail 3302/tcp MCS Fastmail mcs-fastmail 3302/udp MCS Fastmail # Patti Jo Newsom opsession-clnt 3303/tcp OP Session Client opsession-clnt 3303/udp OP Session Client opsession-srvr 3304/tcp OP Session Server opsession-srvr 3304/udp OP Session Server # Amir Blich odette-ftp 3305/tcp ODETTE-FTP odette-ftp 3305/udp ODETTE-FTP # David Nash mysql 3306/tcp MySQL mysql 3306/udp MySQL # Monty opsession-prxy 3307/tcp OP Session Proxy opsession-prxy 3307/udp OP Session Proxy # Amir Blich tns-server 3308/tcp TNS Server tns-server 3308/udp TNS Server tns-adv 3309/tcp TNS ADV tns-adv 3309/udp TND ADV # Jerome Albin dyna-access 3310/tcp Dyna Access dyna-access 3310/udp Dyna Access # Dave Belliveau # mcns-tel-ret 3311/tcp MCNS Tel Ret mcns-tel-ret 3311/udp MCNS Tel Ret # Randall Atkinson appman-server 3312/tcp Application Management Server appman-server 3312/udp Application Management Server uorb 3313/tcp Unify Object Broker uorb 3313/udp Unify Object Broker uohost 3314/tcp Unify Object Host uohost 3314/udp Unify Object Host # Dave Glende cdid 3315/tcp CDID cdid 3315/udp CDID # Andrew Borisov aicc-cmi 3316/tcp AICC/CMI aicc-cmi 3316/udp AICC/CMI # William McDonald vsaiport 3317/tcp VSAI PORT vsaiport 3317/udp VSAI PORT # Rieko Asai ssrip 3318/tcp Swith to Swith Routing Information Protocol ssrip 3318/udp Swith to Swith Routing Information Protocol # Baba Hidekazu sdt-lmd 3319/tcp SDT License Manager sdt-lmd 3319/udp SDT License Manager # Salvo Nassisi officelink2000 3320/tcp Office Link 2000 officelink2000 3320/udp Office Link 2000 # Mike Balch vnsstr 3321/tcp VNSSTR vnsstr 3321/udp VNSSTR # Takeshi Ohmura active-net 3322-3325 Active Networks # Bob Braden sftu 3326/tcp SFTU sftu 3326/udp SFTU # Eduardo Rosenberg de Moura bbars 3327/tcp BBARS bbars 3327/udp BBARS # George Stevens egptlm 3328/tcp Eaglepoint License Manager egptlm 3328/udp Eaglepoint License Manager # Dave Benton hp-device-disc 3329/tcp HP Device Disc hp-device-disc 3329/udp HP Device Disc # Shivaun Albright mcs-calypsoicf 3330/tcp MCS Calypso ICF mcs-calypsoicf 3330/udp MCS Calypso ICF mcs-messaging 3331/tcp MCS Messaging mcs-messaging 3331/udp MCS Messaging mcs-mailsvr 3332/tcp MCS Mail Server mcs-mailsvr 3332/udp MCS Mail Server # Patti Jo Newsom dec-notes 3333/tcp DEC Notes dec-notes 3333/udp DEC Notes # Kim Moraros directv-web 3334/tcp Direct TV Webcasting directv-web 3334/udp Direct TV Webcasting directv-soft 3335/tcp Direct TV Software Updates directv-soft 3335/udp Direct TV Software Updates directv-tick 3336/tcp Direct TV Tickers directv-tick 3336/udp Direct TV Tickers directv-catlg 3337/tcp Direct TV Data Catalog directv-catlg 3337/udp Direct TV Data Catalog # Michael Friedman anet-b 3338/tcp OMF data b anet-b 3338/udp OMF data b anet-l 3339/tcp OMF data l anet-l 3339/udp OMF data l anet-m 3340/tcp OMF data m anet-m 3340/udp OMF data m anet-h 3341/tcp OMF data h anet-h 3341/udp OMF data h # Per Sahlqvist webtie 3342/tcp WebTIE webtie 3342/udp WebTIE # Kevin Frender ms-cluster-net 3343/tcp MS Cluster Net ms-cluster-net 3343/udp MS Cluster Net # Mike Massa bnt-manager 3344/tcp BNT Manager bnt-manager 3344/udp BNT Manager # Brian Ives influence 3345/tcp Influence influence 3345/udp Influence # Russ Ferriday trnsprntproxy 3346/tcp Trnsprnt Proxy trnsprntproxy 3346/udp Trnsprnt Proxy # Grant Kirby phoenix-rpc 3347/tcp Phoenix RPC phoenix-rpc 3347/udp Phoenix RPC # Ian Anderson pangolin-laser 3348/tcp Pangolin Laser pangolin-laser 3348/udp Pangolin Laser # William Benner chevinservices 3349/tcp Chevin Services chevinservices 3349/tcp Chevin Services # Gus McNaughton findviatv 3350/tcp FINDVIATV findviatv 3350/udp FINDVIATV # Oran Davis btrieve 3351/tcp BTRIEVE btrieve 3351/udp BTRIEVE ssql 3352/tcp SSQL ssql 3352/udp SSQL # John McDowell fatpipe 3353/tcp FATPIPE fatpipe 3353/udp FATPIPE # Sanchaita Datta suitjd 3354/tcp SUITJD suitjd 3354/udp SUITJD # Todd Moyer ordinox-dbase 3355/tcp Ordinox Dbase ordinox-dbase 3355/udp Ordinox Dbase # Guy Litourneau upnotifyps 3356/tcp UPNOTIFYPS upnotifyps 3356/udp UPNOTIFYPS # Mark Fox adtech-test 3357/tcp Adtech Test IP adtech-test 3357/udp Adtech Test IP # Robin Uyeshiro mpsysrmsvr 3358/tcp Mp Sys Rmsvr mpsysrmsvr 3358/udp Mp Sys Rmsvr # Hiroyuki Kawabuchi wg-netforce 3359/tcp WG NetForce wg-netforce 3359/udp WG NetForce # Lee Wheat kv-server 3360 dj-ilm 3362/tcp DJ ILM dj-ilm 3362/udp DJ ILM # Don Tyson nati-vi-server 3363/tcp NATI Vi Server nati-vi-server 3363/udp NATI Vi Server # Robert Dye creativeserver 3364/tcp Creative Server creativeserver 3364/udp Creative Server contentserver 3365/tcp Content Server contentserver 3365/udp Content Server creativepartnr 3366/tcp Creative Partner creativepartnr 3366/udp Creative Partner # Jesus Ortiz satvid-datalnk 3367-3371 Satellite Video Data Link # Scott Engel tip2 3372/tcp TIP 2 tip2 3372/udp TIP 2 # Keith Evans lavenir-lm 3373/tcp Lavenir License Manager lavenir-lm 3373/udp Lavenir License Manager # Marius Matioc cluster-disc 3374/tcp Cluster Disc cluster-disc 3374/udp Cluster Disc # Jeff Hughes vsnm-agent 3375/tcp VSNM Agent vsnm-agent 3375/udp VSNM Agent # Venkat Rangan cdborker 3376/tcp CD Broker cdbroker 3376/udp CD Broker # Moon Ho Chung cogsys-lm 3377/tcp Cogsys Network License Manager cogsys-lm 3377/udp Cogsys Network License Manager # Simon Chinnick wsicopy 3378/tcp WSICOPY wsicopy 3378/udp WSICOPY # James Overby socorfs 3379/tcp SOCORFS socorfs 3379/udp SOCORFS # Hugo Charbonneau sns-channels 3380/tcp SNS Channels sns-channels 3380/udp SNS Channels # Shekar Pasumarthi geneous 3381/tcp Geneous geneous 3381/udp Geneous # Nick de Smith fujitsu-neat 3382/tcp Fujitsu Network Enhanced Antitheft function fujitsu-neat 3382/udp Fujitsu Network Enhanced Antitheft function # Markku Viima esp-lm 3383/tcp Enterprise Software Products License Manager esp-lm 3383/udp Enterprise Software Products License Manager # George Rudy hp-clic 3384/tcp Cluster Management Services hp-clic 3384/udp Hardware Management # Rajesh Srinivasaraghavan qnxnetman 3385/tcp qnxnetman qnxnetman 3385/udp qnxnetman # Michael Hunter gprs-data 3386/tcp GPRS Data gprs-sig 3386/udp GPRS SIG # Ansgar Bergmann backroomnet 3387/tcp Back Room Net backroomnet 3387/udp Back Room Net # Clayton Wilkinson cbserver 3388/tcp CB Server cbserver 3388/udp CB Server # Allen Wei ms-wbt-server 3389/tcp MS WBT Server ms-wbt-server 3389/udp MS WBT Server # Ritu Bahl dsc 3390/tcp Distributed Service Coordinator dsc 3390/udp Distributed Service Coordinator # Chas Honton savant 3391/tcp SAVANT savant 3391/udp SAVANT # Andy Bruce efi-lm 3392/tcp EFI License Management efi-lm 3392/udp EFI License Management # Ross E. Greinke d2k-tapestry1 3393/tcp D2K Tapestry Client to Server d2k-tapestry1 3393/udp D2K Tapestry Client to Server d2k-tapestry2 3394/tcp D2K Tapestry Server to Server d2k-tapestry2 3394/udp D2K Tapestry Server to Server # Eric Lan dyna-lm 3395/tcp Dyna License Manager (Elam) dyna-lm 3395/udp Dyna License Manager (Elam) # Anjana Iyer printer_agent 3396/tcp Printer Agent printer_agent 3396/udp Printer Agent # Devon Taylor cloanto-lm 3397/tcp Cloanto License Manager cloanto-lm 3397/udp Cloanto License Manager # Takeo Sato mercantile 3398/tcp Mercantile mercantile 3398/udp Mercantile # Erik Kragh Jensen # 3399-3420 Unassigned bmap 3421/tcp Bull Apprise portmapper bmap 3421/udp Bull Apprise portmapper # Jeremy Gilbert mira 3454/tcp Apple Remote Access Protocol # Mike Alexander prsvp 3455/tcp RSVP Port prsvp 3455/udp RSVP Port # Bob Braden vat 3456/tcp VAT default data vat 3456/udp VAT default data # Van Jacobson vat-control 3457/tcp VAT default control vat-control 3457/udp VAT default control # Van Jacobson d3winosfi 3458/tcp D3WinOsfi d3winosfi 3458/udp DsWinOSFI # Brad Hamilton integral 3459/tcp Integral integral 3459/udp Integral # Olivier Mascia edm-manager 3460/tcp EDM Manger edm-manager 3460/udp EDM Manger edm-stager 3461/tcp EDM Stager edm-stager 3461/udp EDM Stager edm-std-notify 3462/tcp EDM STD Notify edm-std-notify 3462/udp EDM STD Notify edm-adm-notify 3463/tcp EDM ADM Notify edm-adm-notify 3463/udp EDM ADM Notify edm-mgr-sync 3464/tcp EDM MGR Sync edm-mgr-sync 3464/udp EDM MGR Sync edm-mgr-cntrl 3465/tcp EDM MGR Cntrl edm-mgr-cntrl 3465/udp EDM MGR Cntrl # Tom Hennessy workflow 3466/tcp WORKFLOW workflow 3466/udp WORKFLOW # Robert Hufsky # 3467-3562 Unassigned watcomdebug 3563/tcp Watcom Debug watcomdebug 3563/udp Watcom Debug # Anthony Scian # 3564-3899 Unassigned udt_os 3900/tcp Unidata UDT OS udt_os 3900/udp Unidata UDT OS # James Powell mapper-nodemgr 3984/tcp MAPPER network node manager mapper-nodemgr 3984/udp MAPPER network node manager mapper-mapethd 3985/tcp MAPPER TCP/IP server mapper-mapethd 3985/udp MAPPER TCP/IP server mapper-ws_ethd 3986/tcp MAPPER workstation server mapper-ws_ethd 3986/udp MAPPER workstation server # John C. Horton centerline 3987/tcp Centerline centerline 3987/udp Centerline # Mark Simpson # 3988-3999 Unassigned terabase 4000/tcp Terabase terabase 4000/udp Terabase # Thor Olson newoak 4001/tcp NewOak newoak 4001/udp NewOak # Jim Philippou netcheque 4008/tcp NetCheque accounting netcheque 4008/udp NetCheque accounting # B. Clifford Neuman chimera-hwm 4009/tcp Chimera HWM chimera-hwm 4009/udp Chimera HWM # Ken Anderson samsung-unidex 4010/tcp Samsung Unidex samsung-unidex 4010/udp Samsung Unidex # Konstantin V. Vyaznikov altserviceboot 4011/tcp Alternate Service Boot altserviceboot 4011/udp Alternate Service Boot # Eric Dittert pda-gate 4012/tcp PDA Gate pda-gate 4012/udp PDA Gate # Masakuni Okada acl-manager 4013/tcp ACL Manager acl-manager 4013/udp ACL Manager # Toru Murai taiclock 4014/tcp TAICLOCK taiclock 4014/udp TAICLOCK # Dan Bernstein # 4015-4095 Unassigned bre 4096/tcp BRE (Bridge Relay Element) bre 4096/udp BRE (Bridge Relay Element) # Stephen Egbert # 4097-4131 Unassigned nuts_dem 4132/tcp NUTS Daemon nuts_dem 4132/udp NUTS Daemon nuts_bootp 4133/tcp NUTS Bootp Server nuts_bootp 4133/udp NUTS Bootp Server # Martin Freiss nifty-hmi 4134/tcp NIFTY-Serve HMI protocol nifty-hmi 4134/udp NIFTY-Serve HMI protocol # Ryuichi Suzuki oirtgsvc 4141/tcp Workflow Server oirtgsvc 4141/udp Workflow Server oidocsvc 4142/tcp Document Server oidocsvc 4142/udp Document Server oidsr 4143/tcp Document Replication oidsr 4143/udp Document Replication # Norman Brie ########## Compuserve (unoffically) is using port 4144 ######### # 4144-4199 Unassigned vrml-multi-use 4200-4299 VRML Multi User Systems # Mitra corelccam 4300/tcp Corel CCam corelccam 4300/udp Corel CCam # Jason Aiken # 4301-4320 Unassigned rwhois 4321/tcp Remote Who Is rwhois 4321/udp Remote Who Is # Mark Kosters unicall 4343/tcp UNICALL unicall 4343/udp UNICALL # James Powell vinainstall 4344/tcp VinaInstall vinainstall 4344/udp VinaInstall # Jay Slupesky m4-network-as 4345/tcp Macro 4 Network AS m4-network-as 4345/udp Macro 4 Network AS # Paul Wren elanlm 4346/tcp ELAN LM elanlm 4346/udp ELAN LM # Paul Ballew lansurveyor 4347/tcp LAN Surveyor lansurveyor 4347/udp LAN Surveyor # Michael Swan itose 4348/tcp ITOSE itose 4348/tcp ITOSE # Michael Haeuptle fsportmap 4349/tcp File System Port Map fsportmap 4349/udp File System Port Map # Ron Minnich net-device 4350/tcp Net Device net-device 4350/udp Net Device # Glenn Peterson plcy-net-svcs 4351/tcp PLCY Net Services plcy-net-svcs 4351/udp PLCY Net Services # J.J. Ekstrom # 4352-4443 Unassigned krb524 4444/tcp KRB524 krb524 4444/udp KRB524 # B. Clifford Neuman # PROBLEM krb524 assigned the port, # PROBLEM nv used it without an assignment nv-video 4444/tcp NV Video default nv-video 4444/udp NV Video default # Ron Frederick upnotifyp 4445/tcp UPNOTIFYP upnotifyp 4445/udp UPNOTIFYP # Mark Fox n1-fwp 4446/tcp N1-FWP n1-fwp 4446/udp N1-FWP n1-rmgmt 4447/tcp N1-RMGMT n1-rmgmt 4447/udp N1-RMGMT # Lori Tassin asc-slmd 4448/tcp ASC Licence Manager asc-slmd 4448/udp ASC Licence Manager # Casper Stoel privatewire 4449/tcp PrivateWire privatewire 4449/udp PrivateWire # Uri Resnitzky camp 4450/tcp Camp camp 4450/udp Camp ctisystemmsg 4451/tcp CTI System Msg ctisystemmsg 4451/udp CTI System Msg ctiprogramload 4452/tcp CTI Program Load ctiprogramload 4452/udp CTI Program Load # Steven Cliff nssalertmgr 4453/tcp NSS Alert Manager nssalertmgr 4453/udp NSS Alert Manager nssagentmgr 4454/tcp NSS Agent Manager nssagentmgr 4454/udp NSS Agent Manager # Jim Hill prchat-user 4455/tcp PR Chat User prchat-user 4455/udp PR Chat User prchat-server 4456/tcp PR Chat Server prchat-server 4456/udp PR Chat Server prRegister 4457/tcp PR Register prRegister 4457/udp PR Register # Donny Gilor # 4458-4499 Unassigned sae-urn 4500/tcp sae-urn sae-urn 4500/udp sae-urn urn-x-cdchoice 4501/tcp urn-x-cdchoice urn-x-cdchoice 4501/udp urn-x-cdchoice # Paul Hoffman highscore 4545/tcp Highscore highscore 4545/udp Highscore # Chris Flynn sf-lm 4546/tcp SF License Manager (Sentinel) sf-lm 4546/udp SF License Manager (Sentinel) # Thomas Koell lanner-lm 4547/tcp Lanner License Manager lanner-lm 4547/udp Lanner License Manager # Les Enstone # 4548-4671 Unassigned rfa 4672/tcp remote file access server rfa 4672/udp remote file access server # 4673-4826 Unassigned htcp 4827/tcp HTCP htcp 4827/udp HTCP # Paul Vixie # 4828-4867 Unassigned phrelay 4868/tcp Photon Relay phrelay 4868/udp Photon Relay phrelaydbg 4869/tcp Photon Relay Debug phrelaydbg 4869/udp Photon Relay Debug # Michael Hunter commplex-main 5000/tcp commplex-main 5000/udp commplex-link 5001/tcp commplex-link 5001/udp rfe 5002/tcp radio free ethernet rfe 5002/udp radio free ethernet fmpro-internal 5003/tcp FileMaker, Inc. - Proprietary transport fmpro-internal 5003/udp FileMaker, Inc. - Proprietary name binding # Clay Maeckel avt-profile-1 5004/tcp avt-profile-1 avt-profile-1 5004/udp avt-profile-1 avt-profile-2 5005/tcp avt-profile-2 avt-profile-2 5005/udp avt-profile-2 # Henning Schulzrinne telelpathstart 5010/tcp TelepathStart telelpathstart 5010/udp TelepathStart telelpathattack 5011/tcp TelepathAttack telelpathattack 5011/udp TelepathAttack # Helmuth Breitenfellner zenginkyo-1 5020/tcp zenginkyo-1 zenginkyo-1 5020/udp zenginkyo-1 zenginkyo-2 5021/tcp zenginkyo-2 zenginkyo-2 5021/udp zenginkyo-2 # Masashi Suzaki mmcc 5050/tcp multimedia conference control tool mmcc 5050/udp multimedia conference control tool # Steve Casner ita-agent 5051/tcp ITA Agent ita-agent 5051/udp ITA Agent ita-manager 5052/tcp ITA Manager ita-manager 5052/udp ITA Manager # Don Merrell sip 5060/tcp SIP sip 5060/udp SIP # Henning Schulzrinne rmonitor_secure 5145/tcp rmonitor_secure 5145/udp atmp 5150/tcp Ascend Tunnel Management Protocol atmp 5150/udp Ascend Tunnel Management Protocol # Kory Hamzeh aol 5190/tcp America-Online aol 5190/udp America-Online # Marty Lyons aol-1 5191/tcp AmericaOnline1 aol-1 5191/udp AmericaOnline1 aol-2 5192/tcp AmericaOnline2 aol-2 5192/udp AmericaOnline2 aol-3 5193/tcp AmericaOnline3 aol-3 5193/udp AmericaOnline3 # Bruce Mackey padl2sim 5236/tcp padl2sim 5236/udp pk 5272/tcp PK pk 5272/udp PK # Patrick Kara hacl-hb 5300/tcp # HA cluster heartbeat hacl-hb 5300/udp # HA cluster heartbeat hacl-gs 5301/tcp # HA cluster general services hacl-gs 5301/udp # HA cluster general services hacl-cfg 5302/tcp # HA cluster configuration hacl-cfg 5302/udp # HA cluster configuration hacl-probe 5303/tcp # HA cluster probing hacl-probe 5303/udp # HA cluster probing hacl-local 5304/tcp # HA Cluster Commands hacl-local 5304/udp hacl-test 5305/tcp # HA Cluster Test hacl-test 5305/udp # Eric Soderberg # Edward Yim sun-mc-grp 5306/tcp Sun MC Group sun-mc-grp 5306/udp Sun MC Group # Michael DeMoney sco-aip 5307/tcp SCO AIP sco-aip 5307/udp SCO AIP # Barrie Cooper cfengine 5308/tcp CFengine cfengine 5308/udp CFengine # Mark Burgess jprinter 5309/tcp J Printer jprinter 5309/udp J Printer # Ken Blackwell outlaws 5310/tcp Outlaws outlaws 5310/udp Outlaws # Richard Fife tmlogin 5311/tcp TM Login tmlogin 5311/udp TM Login # Eric Sharakan # 5312-5399 Unassigned excerpt 5400/tcp Excerpt Search excerpt 5400/udp Excerpt Search excerpts 5401/tcp Excerpt Search Secure excerpts 5401/udp Excerpt Search Secure # John Hinsdale mftp 5402/tcp MFTP mftp 5402/udp MFTP # Alan Rosenberg hpoms-ci-lstn 5403/tcp HPOMS-CI-LSTN hpoms-ci-lstn 5403/udp HPOMS-CI-LSTN hpoms-dps-lstn 5404/tcp HPOMS-DPS-LSTN hpoms-dps-lstn 5404/udp HPOMS-DPS-LSTN # Harold Froehling netsupport 5405/tcp NetSupport netsupport 5405/udp NetSupport # Paul Sanders systemics-sox 5406/tcp Systemics Sox systemics-sox 5406/udp Systemics Sox # Gary Howland foresyte-clear 5407/tcp Foresyte-Clear foresyte-clear 5407/udp Foresyte-Clear foresyte-sec 5408/tcp Foresyte-Sec foresyte-sec 5408/udp Foresyte-Sec # Jorge Aldana salient-dtasrv 5409/tcp Salient Data Server salient-dtasrv 5409/udp Salient Data Server salient-usrmgr 5410/tcp Salient User Manager salient-usrmgr 5410/udp Salient User Manager # Richard Farnham actnet 5411/tcp ActNet actnet 5411/udp ActNet # Simon Robillard continuus 5412/tcp Continuus continuus 5412/udp Continuus # Steven Holtsberg wwiotalk 5413/tcp WWIOTALK wwiotalk 5413/udp WWIOTALK # Roger Knobbe statusd 5414/tcp StatusD statusd 5414/udp StatusD # Stephen Misel ns-server 5415/tcp NS Server ns-server 5415/udp NS Server # Jeffrey Chiao sns-gateway 5416/tcp SNS Gateway sns-gateway 5416/udp SNS Gateway sns-agent 5417/tcp SNS Agent sns-agent 5417/udp SNS Agent # Mary Holstage mcntp 5418/tcp MCNTP mcntp 5418/udp MCNTP # Heiko Rupp dj-ice 5419/tcp DJ-ICE dj-ice 5419/udp DJ-ICE # Don Tyson cylink-c 5420/tcp Cylink-C cylink-c 5420/udp Cylink-C # John Jobe # 5421-5499 Unassigned fcp-addr-srvr1 5500/tcp fcp-addr-srvr1 fcp-addr-srvr1 5500/udp fcp-addr-srvr1 fcp-addr-srvr2 5501/tcp fcp-addr-srvr2 fcp-addr-srvr2 5501/udp fcp-addr-srvr2 fcp-srvr-inst1 5502/tcp fcp-srvr-inst1 fcp-srvr-inst1 5502/udp fcp-srvr-inst1 fcp-srvr-inst2 5503/tcp fcp-srvr-inst2 fcp-srvr-inst2 5503/udp fcp-srvr-inst2 fcp-cics-gw1 5504/tcp fcp-cics-gw1 fcp-cics-gw1 5504/udp fcp-cics-gw1 # Mark Zeiss # 5504-5554 Unassigned ############Port 5555 also used by HP Omniback##################### personal-agent 5555/tcp Personal Agent personal-agent 5555/udp Personal Agent # Jackie Wu ################################################################### # 5556-5598 Unassigned esinstall 5599/tcp Enterprise Security Remote Install esinstall 5599/udp Enterprise Security Remote Install esmmanager 5600/tcp Enterprise Security Manager esmmanager 5600/udp Enterprise Security Manager esmagent 5601/tcp Enterprise Security Agent esmagent 5601/udp Enterprise Security Agent # Kimberly Gibbs a1-msc 5602/tcp A1-MSC a1-msc 5602/udp A1-MSC a1-bs 5603/tcp A1-BS a1-bs 5603/udp A1-BS a3-sdunode 5604/tcp A3-SDUNode a3-sdunode 5604/udp A3-SDUNode a4-sdunode 5605/tcp A4-SDUNode a4-sdunode 5605/udp A4-SDUNode # Mike Dolan pcanywheredata 5631/tcp pcANYWHEREdata pcanywheredata 5631/udp pcANYWHEREdata pcanywherestat 5632/tcp pcANYWHEREstat pcanywherestat 5632/udp pcANYWHEREstat # Jon Rosarky rrac 5678/tcp Remote Replication Agent Connection rrac 5678/udp Remote Replication Agent Connection dccm 5679/tcp Direct Cable Connect Manager dccm 5679/udp Direct Cable Connect Manager # Mark Miller proshareaudio 5713/tcp proshare conf audio proshareaudio 5713/udp proshare conf audio prosharevideo 5714/tcp proshare conf video prosharevideo 5714/udp proshare conf video prosharedata 5715/tcp proshare conf data prosharedata 5715/udp proshare conf data prosharerequest 5716/tcp proshare conf request prosharerequest 5716/udp proshare conf request prosharenotify 5717/tcp proshare conf notify prosharenotify 5717/udp proshare conf notify # openmail 5729/tcp Openmail User Agent Layer openmail 5729/udp Openmail User Agent Layer # OpenMail Encyclopedia # Don Loughry ida-discover1 5741/tcp IDA Discover Port 1 ida-discover1 5741/udp IDA Discover Port 1 ida-discover2 5742/tcp IDA Discover Port 2 ida-discover2 5742/udp IDA Discover Port 2 # Morten Christensen fcopy-server 5745/tcp fcopy-server fcopy-server 5745/udp fcopy-server fcopys-server 5746/tcp fcopys-server fcopys-server 5746/udp fcopys-server # Moshe Leibovitch # Don Loughry x11 6000-6063/tcp X Window System x11 6000-6063/udp X Window System # Stephen Gildea softcm 6110/tcp HP SoftBench CM softcm 6110/udp HP SoftBench CM spc 6111/tcp HP SoftBench Sub-Process Control spc 6111/udp HP SoftBench Sub-Process Control # Scott A. Kramer dtspcd 6112/tcp dtspcd dtspcd 6112/udp dtspcd # Doug Royer backup-express 6123/tcp Backup Express backup-express 6123/udp Backup Express # Chi Shih Chang meta-corp 6141/tcp Meta Corporation License Manager meta-corp 6141/udp Meta Corporation License Manager # Osamu Masuda <--none---> aspentec-lm 6142/tcp Aspen Technology License Manager aspentec-lm 6142/udp Aspen Technology License Manager # Kevin Massey watershed-lm 6143/tcp Watershed License Manager watershed-lm 6143/udp Watershed License Manager # David Ferrero statsci1-lm 6144/tcp StatSci License Manager - 1 statsci1-lm 6144/udp StatSci License Manager - 1 statsci2-lm 6145/tcp StatSci License Manager - 2 statsci2-lm 6145/udp StatSci License Manager - 2 # Scott Blachowicz lonewolf-lm 6146/tcp Lone Wolf Systems License Manager lonewolf-lm 6146/udp Lone Wolf Systems License Manager # Dan Klein montage-lm 6147/tcp Montage License Manager montage-lm 6147/udp Montage License Manager # Michael Ubell ricardo-lm 6148/tcp Ricardo North America License Manager ricardo-lm 6148/udp Ricardo North America License Manager # M Flemming tal-pod 6149/tcp tal-pod tal-pod 6149/udp tal-pod # Steven Loomis crip 6253/tcp CRIP crip 6253/udp CRIP # Mike Rodbell clariion-evr01 6389/tcp clariion-evr01 clariion-evr01 6389/udp clariion-evr01 # Dave DesRoches skip-cert-recv 6455/tcp SKIP Certificate Receive skip-cert-send 6456/tcp SKIP Certificate Send # Tom Markson lvision-lm 6471/tcp LVision License Manager lvision-lm 6471/udp LVision License Manager # Brian McKinnon # 6472-6499 Unassigned boks 6500/tcp BoKS Master boks 6500/udp BoKS Master boks_servc 6501/tcp BoKS Servc boks_servc 6501/udp BoKS Servc boks_servm 6502/tcp BoKS Servm boks_servm 6502/udp BoKS Servm boks_clntd 6503/tcp BoKS Clntd boks_clntd 6503/udp BoKS Clntd # 6504 Unassigned badm_priv 6505/tcp BoKS Admin Private Port badm_priv 6505/udp BoKS Admin Private Port badm_pub 6506/tcp BoKS Admin Public Port badm_pub 6506/udp BoKS Admin Public Port bdir_priv 6507/tcp BoKS Dir Server, Private Port bdir_priv 6507/udp BoKS Dir Server, Private Port bdir_pub 6508/tcp BoKS Dir Server, Public Port bdir_pub 6508/udp BoKS Dir Server, Public Port # Magnus Nystrom # 6509-6557 Unassigned xdsxdm 6558/tcp xdsxdm 6558/udp ircu 6665-6669/tcp IRCU ircu 6665-6669/udp IRCU # Brian Tackett vocaltec-gold 6670/tcp Vocaltec Global Online Directory vocaltec-gold 6670/udp Vocaltec Global Online Directory # Scott Petrack vision_server 6672/tcp vision_server vision_server 6672/udp vision_server vision_elmd 6673/tcp vision_elmd vision_elmd 6673/udp vision_elmd # Chris Kramer ambit-lm 6831/tcp ambit-lm ambit-lm 6831/udp ambit-lm # Don Hejna acmsoda 6969/tcp acmsoda acmsoda 6969/udp acmsoda # Daniel Simms afs3-fileserver 7000/tcp file server itself afs3-fileserver 7000/udp file server itself afs3-callback 7001/tcp callbacks to cache managers afs3-callback 7001/udp callbacks to cache managers afs3-prserver 7002/tcp users & groups database afs3-prserver 7002/udp users & groups database afs3-vlserver 7003/tcp volume location database afs3-vlserver 7003/udp volume location database afs3-kaserver 7004/tcp AFS/Kerberos authentication service afs3-kaserver 7004/udp AFS/Kerberos authentication service afs3-volser 7005/tcp volume managment server afs3-volser 7005/udp volume managment server afs3-errors 7006/tcp error interpretation service afs3-errors 7006/udp error interpretation service afs3-bos 7007/tcp basic overseer process afs3-bos 7007/udp basic overseer process afs3-update 7008/tcp server-to-server updater afs3-update 7008/udp server-to-server updater afs3-rmtsys 7009/tcp remote cache manager service afs3-rmtsys 7009/udp remote cache manager service ups-onlinet 7010/tcp onlinet uninterruptable power supplies ups-onlinet 7010/udp onlinet uninterruptable power supplies # Brian Hammill dpserve 7020/tcp DP Serve dpserve 7020/udp DP Serve dpserveadmin 7021/tcp DP Serve Admin dpserveadmin 7021/udp DP Serve Admin # Allan Stanley lazy-ptop 7099/tcp lazy-ptop lazy-ptop 7099/udp lazy-ptop # Guy Keren font-service 7100/tcp X Font Service font-service 7100/udp X Font Service # Stephen Gildea virprot-lm 7121/tcp Virtual Prototypes License Manager virprot-lm 7121/tcp Virtual Prototypes License Manager # Victor Galis clutild 7174/tcp Clutild clutild 7174/tcp Clutild # Cheryl Stoutenburg fodms 7200/tcp FODMS FLIP fodms 7200/udp FODMS FLIP # David Anthony dlip 7201/tcp DLIP dlip 7201/udp DLIP # Albert Manfredi winqedit 7395/tcp winqedit winqedit 7395/udp winqedit # David Greer pmdmgr 7426/tcp OpenView DM Postmaster Manager pmdmgr 7426/udp OpenView DM Postmaster Manager oveadmgr 7427/tcp OpenView DM Event Agent Manager oveadmgr 7427/udp OpenView DM Event Agent Manager ovladmgr 7428/tcp OpenView DM Log Agent Manager ovladmgr 7428/udp OpenView DM Log Agent Manager opi-sock 7429/tcp OpenView DM rqt communication opi-sock 7429/udp OpenView DM rqt communication xmpv7 7430/tcp OpenView DM xmpv7 api pipe xmpv7 7430/udp OpenView DM xmpv7 api pipe pmd 7431/tcp OpenView DM ovc/xmpv3 api pipe pmd 7431/udp OpenView DM ovc/xmpv3 api pipe # Dave Lamb telops-lmd 7491/tcp telops-lmd telops-lmd 7491/udp telops-lmd # David Spencer pafec-lm 7511/tcp pafec-lm pafec-lm 7511/udp pafec-lm # Billy Dhillon nta-ds 7544/tcp FlowAnalyzer DisplayServer nta-ds 7544/udp FlowAnalyzer DisplayServer nta-us 7545/tcp FlowAnalyzer UtilityServer nta-us 7545/udp FlowAnalyzer UtilityServer # Fred Messinger aries-kfinder 7570/tcp Aries Kfinder aries-kfinder 7570/udp Aries Kfinder # James King, III cbt 7777/tcp cbt cbt 7777/udp cbt # Tony Ballardie accu-lmgr 7781/tcp accu-lmgr accu-lmgr 7781/udp accu-lmgr # Moises E. Hernandez t2-drm 7932/tcp Tier 2 Data Resource Manager t2-drm 7932/udp Tier 2 Data Resource Manager t2-brm 7933/tcp Tier 2 Business Rules Manager t2-brm 7933/udp Tier 2 Business Rules Manager # Peter Carlson quest-vista 7980/tcp Quest Vista quest-vista 7980/udp Quest Vista # Preston Bannister irdmi2 7999/tcp iRDMI2 irdmi2 7999/udp iRDMI2 irdmi 8000/tcp iRDMI irdmi 8000/udp iRDMI # Gil Shafriri vcom-tunnel 8001/tcp VCOM Tunnel vcom-tunnel 8001/udp VCOM Tunnel # Mark Lewandowski http-alt 8008/tcp HTTP Alternate http-alt 8008/udp HTTP Alternate # James Gettys pro-ed 8032/tcp ProEd pro-ed 8032/udp ProEd mindprint 8033/tcp MindPrint mindprint 8033/udp MindPrint # Larry Tusoni http-alt 8080/tcp HTTP Alternate (see port 80) http-alt 8080/udp HTTP Alternate (see port 80) # Stephen Casner cruise-enum 8376/tcp Cruise ENUM cruise-enum 8376/udp Cruise ENUM cruise-swroute 8377/tcp Cruise SWROUTE cruise-swroute 8377/udp Cruise SWROUTE cruise-config 8378/tcp Cruise CONFIG cruise-config 8378/udp Cruise CONFIG cruise-diags 8379/tcp Cruise DIAGS cruise-diags 8379/udp Cruise DIAGS cruise-update 8380/tcp Cruise UPDATE cruise-update 8380/udp Cruise UPDATE # Steve Husak cvd 8400/tcp cvd cvd 8400/udp cvd sabarsd 8401/tcp sabarsd sabarsd 8401/udp sabarsd abarsd 8402/tcp abarsd abarsd 8402/udp abarsd admind 8403/tcp admind admind 8403/udp admind # Aaron Bilbrey npmp 8450/tcp npmp npmp 8450/udp npmp # Ian Chard vp2p 8473/tcp Vitual Point to Point vp2p 8473/udp itual Point to Point # Jerome Grimbert rtsp-alt 8554/tcp RTSP Alternate (see port 554) rtsp-alt 8554/udp RTSP Alternate (see port 554) # Stephen Casner ultraseek-http 8765/tcp Ultraseek HTTP ultraseek-http 8765/udp Ultraseek HTTP # Walter Underwood cddbp-alt 8880/tcp CDDBP cddbp-alt 8880/udp CDDBP # Steve Scherf ddi-tcp-1 8888/tcp NewsEDGE server TCP (TCP 1) ddi-udp-1 8888/udp NewsEDGE server UDP (UDP 1) ddi-tcp-2 8889/tcp Desktop Data TCP 1 ddi-udp-2 8889/udp NewsEDGE server broadcast ddi-tcp-3 8890/tcp Desktop Data TCP 2 ddi-udp-3 8890/udp NewsEDGE client broadcast ddi-tcp-4 8891/tcp Desktop Data TCP 3: NESS application ddi-udp-4 8891/udp Desktop Data UDP 3: NESS application ddi-tcp-5 8892/tcp Desktop Data TCP 4: FARM product ddi-udp-5 8892/udp Desktop Data UDP 4: FARM product ddi-tcp-6 8893/tcp Desktop Data TCP 5: NewsEDGE/Web application ddi-udp-6 8893/udp Desktop Data UDP 5: NewsEDGE/Web application ddi-tcp-7 8894/tcp Desktop Data TCP 6: COAL application ddi-udp-7 8894/udp Desktop Data UDP 6: COAL application # Fred Yao cslistener 9000/tcp CSlistener cslistener 9000/udp CSlistener # David Jones sctp 9006/tcp SCTP sctp 9006/udp SCTP # Gary Regan websm 9090/tcp WebSM websm 9090/udp WebSM # I-Hsing Tsao man 9535/tcp man 9535/udp msgsys 9594/tcp Message System msgsys 9594/udp Message System pds 9595/tcp Ping Discovery Service pds 9595/udp Ping Discovery Service # Kai Ming Chan sd 9876/tcp Session Director sd 9876/udp Session Director # Van Jacobson monkeycom 9898/tcp MonkeyCom monkeycom 9898/udp MonkeyCom # Yuji Kuwabara # 9899-9991 Unassigned palace 9992/tcp Palace palace 9992/udp Palace palace 9993/tcp Palace palace 9993/udp Palace palace 9994/tcp Palace palace 9994/udp Palace palace 9995/tcp Palace palace 9995/udp Palace palace 9996/tcp Palace palace 9996/udp Palace palace 9997/tcp Palace palace 9997/udp Palace # Charles Kawasaki distinct32 9998/tcp Distinct32 distinct32 9998/udp Distinct32 distinct 9999/tcp distinct distinct 9999/udp distinct # Anoop Tewari ndmp 10000/tcp Network Data Management Protocol ndmp 10000/udp Network Data Management Protocol # Brian Ehrmantraut # 10001-10006 Unassigned mvs-capacity 10007/tcp MVS Capacity mvs-capacity 10007/udp MVS Capacity # Donna Dillenberger # 10008-11000 Unassigned metasys 11001/tcp Metasys metasys 11001/udp Metasys # Tobin Schuster atm-uhas 11367/tcp ATM UHAS atm-uhas 11367/udp ATM UHAS # Todd Barker entextxid 12000/tcp IBM Enterprise Extender SNA XID Exchange entextxid 12000/udp IBM Enterprise Extender SNA XID Exchange entextnetwk 12001/tcp IBM Enterprise Extender SNA COS Network Priority entextnetwk 12001/udp IBM Enterprise Extender SNA COS Network Priority entexthigh 12002/tcp IBM Enterprise Extender SNA COS High Priority entexthigh 12002/udp IBM Enterprise Extender SNA COS High Priority entextmed 12003/tcp IBM Enterprise Extender SNA COS Medium Priority entextmed 12003/udp IBM Enterprise Extender SNA COS Medium Priority entextlow 12004/tcp IBM Enterprise Extender SNA COS Low Priority entextlow 12004/udp IBM Enterprise Extender SNA COS Low Priority # Eugene Cox tsaf 12753/tcp tsaf port tsaf 12753/udp tsaf port # Andreas Fehr <100042.2070@CompuServe.COM> i-zipqd 13160/tcp I-ZIPQD i-zipqd 13160/udp I-ZIPQD # Chuck Runquist bprd 13720/tcp BPRD Protocol (VERITAS NetBackup) bprd 13720/udp BPRD Protocol (VERITAS NetBackup) bpbrm 13721/tcp BPBRM Protocol (VERITAS NetBackup) bpbrm 13721/udp BPBRM Protocol (VERITAS NetBackup) bpcd 13782/tcp VERITAS NetBackup bpcd 13782/udp VERITAS NetBackup # Jeff Holmbeck dsmcc-config 13818/tcp DSMCC Config dsmcc-config 13818/udp DSMCC Config dsmcc-session 13819/tcp DSMCC Session Messages dsmcc-session 13819/udp DSMCC Session Messages dsmcc-passthru 13820/tcp DSMCC Pass-Thru Messages dsmcc-passthru 13820/udp DSMCC Pass-Thru Messages dsmcc-download 13821/tcp DSMCC Download Protocol dsmcc-download 13821/udp DSMCC Download Protocol dsmcc-ccp 13822/tcp DSMCC Channel Change Protocol dsmcc-ccp 13822/udp DSMCC Channel Change Protocol # Tim Addington # ISO/IEC 13818-6 MPEG-2 DSM-CC isode-dua 17007/tcp isode-dua 17007/udp biimenu 18000/tcp Beckman Instruments, Inc. biimenu 18000/udp Beckman Instruments, Inc. # R. L. Meyering jcp 19541/tcp JCP Client jcp 19541/udp JCP Client # Yuji Sasaki webphone 21845/tcp webphone webphone 21845/udp webphone netspeak-is 21846/tcp NetSpeak Corp. Directory Services netspeak-is 21846/udp NetSpeak Corp. Directory Services netspeak-cs 21847/tcp NetSpeak Corp. Connection Services netspeak-cs 21847/udp NetSpeak Corp. Connection Services netspeak-acd 21848/tcp NetSpeak Corp. Automatic Call Distribution netspeak-acd 21848/udp NetSpeak Corp. Automatic Call Distribution netspeak-cps 21849/tcp NetSpeak Corp. Credit Processing System netspeak-cps 21849/udp NetSpeak Corp. Credit Processing System # Shane D. Mattaway wnn6 22273/tcp wnn6 wnn6 22273/udp wnn6 # Yasunari Gon Yamasita aws-brf 22800/tcp Telerate Information Platform LAN aws-brf 22800/udp Telerate Information Platform LAN # Timo Sivonen brf-gw 22951/tcp Telerate Information Platform WAN brf-gw 22951/udp Telerate Information Platform WAN # Timo Sivonen med-ltp 24000/tcp med-ltp med-ltp 24000/udp med-ltp med-fsp-rx 24001/tcp med-fsp-rx med-fsp-rx 24001/udp med-fsp-rx med-fsp-tx 24002/tcp med-fsp-tx med-fsp-tx 24002/udp med-fsp-tx med-supp 24003/tcp med-supp med-supp 24003/udp med-supp med-ovw 24004/tcp med-ovw med-ovw 24004/udp med-ovw med-ci 24005/tcp med-ci med-ci 24005/udp med-ci med-net-svc 24006/tcp med-net-svc med-net-svc 24006/udp med-net-svc # Juergen Fischbach icl-twobase1 25000/tcp icl-twobase1 icl-twobase1 25000/udp icl-twobase1 icl-twobase2 25001/tcp icl-twobase2 icl-twobase2 25001/udp icl-twobase2 icl-twobase3 25002/tcp icl-twobase3 icl-twobase3 25002/udp icl-twobase3 icl-twobase4 25003/tcp icl-twobase4 icl-twobase4 25003/udp icl-twobase4 icl-twobase5 25004/tcp icl-twobase5 icl-twobase5 25004/udp icl-twobase5 icl-twobase6 25005/tcp icl-twobase6 icl-twobase6 25005/udp icl-twobase6 icl-twobase7 25006/tcp icl-twobase7 icl-twobase7 25006/udp icl-twobase7 icl-twobase8 25007/tcp icl-twobase8 icl-twobase8 25007/udp icl-twobase8 icl-twobase9 25008/tcp icl-twobase9 icl-twobase9 25008/udp icl-twobase9 icl-twobase10 25009/tcp icl-twobase10 icl-twobase10 25009/udp icl-twobase10 # J. A. (Tony) Sever vocaltec-hos 25793/tcp Vocaltec Address Server vocaltec-hos 25793/udp Vocaltec Address Server # Scott Petrack quake 26000/tcp quake quake 26000/tcp quake wnn6-ds 26208/tcp wnn6-ds wnn6-ds 26208/udp wnn6-ds # Yasunari Gon Yamasita flex-lm 27000-27009 FLEX LM (1-10) # Daniel Birns tw-auth-key 27999/tcp TW Authentication/Key Distribution and tw-auth-key 27999/udp Attribute Certificate Services # Alex Duncan rockwell-encap 44818/tcp Rockwell Encapsulation rockwell-encap 44818/udp Rockwell Encapsulation # Brian Batke eba 45678/tcp EBA PRISE eba 45678/udp EBA PRISE # Patrick dbbrowse 47557/tcp Databeam Corporation dbbrowse 47557/udp Databeam Corporation # Cindy Martin directplaysrvr 47624/tcp Direct Play Server directplaysrvr 47624/udp Direct Play Server # Ajay Jindal ap 47806/tcp ALC Protocol ap 47806/udp ALC Protocol # Andrew Newton bacnet 47808/tcp Building Automation and Control Networks bacnet 47808/udp Building Automation and Control Networks # H. Michael Newman DYNAMIC AND/OR PRIVATE PORTS The Dynamic and/or Private Ports are those from 49152 through 65535 REFERENCES [RFC768] Postel, J., "User Datagram Protocol", STD 6, RFC 768, USC/Information Sciences Institute, August 1980. [RFC793] Postel, J., ed., "Transmission Control Protocol - DARPA Internet Program Protocol Specification", STD 7, RFC 793, USC/Information Sciences Institute, September 1981. Happy Hacking! [ Kurruppt2k ]