zoukankan      html  css  js  c++  java
  • SQL 2000和SQL 2005服务端口查看或修改

    1、SQL Server:入站端口为TCP 1433,出站端口为TCP任意端口(10245000之间的端口号);

    2、SQL Browser :入站端口为UDP 1434,出站端口为UDP任意端口(10245000之间的端口号);

    3、查看或修改SQL2005实例的端口号,如果系统中同时安装SQL 2000SQL 2005SQL 2005的连接端口可能不是1433,我们需要更改SQL 2005实例的TCP端口。“开始”——“程序”——“Microsoft SQL Server 2005”——“配置工具”——“SQL Server Configuration Manager”——“SQL Server 2005 网络配置”,点击需要的命名实例,在右边的窗口中可以看到协议名称和状态列表,鼠标右键单击“TCP/IP”选择“属性”,单击“IP地址”选项卡,在“IPALL”列表中,“TCP动态端口”留空,“TCP端口”可以修改成需要的端口号。如下图所示:

     

    3、  查看或修改SQL 2000实例的端口号,如果操作系统中,同时存在SQL 2000SQL 2005,部分SQL实例的服务端口可能不是1433,这个时候就需要我们手动修改。“开始”——“程序”——“Microsoft SQL Server”——“服务器网络实用工具”——“常规选项卡”——“启用的协议”——选中“TCP/IP”,单击“属性”,在弹出的对话框中,修改默认的端口即可。如下图所示:

     

    4、知名端口即众所周知的端口号,范围从01023,这些端口号一般固定分配给一些服务。比如21端口分配给FTP(文件传输协议)服务,25端口分配给SMTP(简单邮件传输协议)服务,80端口分配给HTTP服务,135端口分配给RPC(远程过程调用)服务等等。

    5、动态端口的范围从102465535,这些端口号一般不固定分配给某个服务,也就是说许多服务都可以使用这些端口。只要运行的程序向系统提出访问网络的申请,那么系统就可以从这些端口号中分配一个供该程序使用。比如1024端口就是分配给第一个向系统发出申请的程序。在关闭程序进程后,就会释放所占用的端口号。

    6知名端口号

      //: 由于一些应用软件占用了部分端口, 因此此文件中的部分端口被注释掉了(注释字符为: //)

      TCP 1=TCP Port Service Multiplexer

      TCP 2=Death

      TCP 5=Remote Job Entry,yoyo

      TCP 7=Echo

      TCP 11=Skun

      TCP 12=Bomber

      TCP 16=Skun

      TCP 17=Skun

      TCP 18=消息传输协议,skun

      TCP 19=Skun

      TCP 20=FTP Data,Amanda

      TCP 21=文件传输,Back Construction,Blade Runner,Doly Trojan,Fore,FTP trojan,Invisible FTP,Larva, WebEx,WinCrash

      TCP 22=远程登录协议

      TCP 23=远程登录(Telnet),Tiny Telnet Server (= TTS)

      TCP 25=电子邮件(SMTP),Ajan,Antigen,Email Password Sender,Happy 99,Kuang2,ProMail trojan,Shtrilitz,Stealth,Tapiras,Terminator,WinPC,WinSpy,Haebu Coceda

      TCP 27=Assasin

      TCP 28=Amanda

      TCP 29=MSG ICP

      TCP 30=Agent 40421

      TCP 31=Agent 31,Hackers Paradise,Masters Paradise,Agent 40421

      TCP 37=Time,ADM worm

      TCP 39=SubSARI

      TCP 41=DeepThroat,Foreplay

      TCP 42=Host Name Server

      TCP 43=WHOIS

      TCP 44=Arctic

      TCP 48=DRAT

      TCP 49=主机登录协议

      TCP 50=DRAT

      TCP 51=IMP Logical Address Maintenance,Fuck Lamers Backdoor

      TCP 52=MuSka52,Skun

      TCP 53=DNS,Bonk (DOS Exploit)

      TCP 54=MuSka52

      TCP 58=DMSetup

      TCP 59=DMSetup

      TCP 63=whois++

      TCP 64=Communications Integrator

      TCP 65=TACACS-Database Service

      TCP 66=Oracle SQL*NET,AL-Bareki

      TCP 67=Bootstrap Protocol Server

      TCP 68=Bootstrap Protocol Client

      TCP 69=W32.Evala.Worm,BackGate Kit,Nimda,Pasana,Storm,Storm worm,Theef,Worm.Cycle.a

      TCP 70=Gopher服务,ADM worm

      TCP 79=用户查询(Finger),Firehotcker,ADM worm

      TCP 80=超文本服务器(Http),Executor,RingZero

      TCP 81=Chubo,Worm.Bbeagle.q

      TCP 82=Netsky-Z

      TCP 88=Kerberos krb5服务

      TCP 99=Hidden Port

      TCP 102=消息传输代理

      TCP 108=SNA网关访问服务器

      TCP 109=Pop2

      TCP 110=电子邮件(Pop3),ProMail

      TCP 113=Kazimas, Auther Idnet

      TCP 115=简单文件传输协议

      TCP 118=SQL Services, Infector 1.4.2

      TCP 119=新闻组传输协议(Newsgroup(Nntp)), Happy 99

      TCP 121=JammerKiller, Bo jammerkillah

      TCP 123=网络时间协议(NTP),Net Controller

      TCP 129=Password Generator Protocol

      TCP 133=Infector 1.x

      TCP 135=微软DCE RPC end-point mapper服务

      TCP 137=微软Netbios Name服务(网上邻居传输文件使用)

      TCP 138=微软Netbios Name服务(网上邻居传输文件使用)

      TCP 139=微软Netbios Name服务(用于文件及打印机共享)

      TCP 142=NetTaxi

      TCP 143=IMAP

      TCP 146=FC Infector,Infector

      TCP 150=NetBIOS Session Service

      TCP 156=SQL服务器

      TCP 161=Snmp

      TCP 162=Snmp-Trap

      TCP 170=A-Trojan

      TCP 177=X Display管理控制协议

      TCP 179=Border网关协议(BGP)

      TCP 190=网关访问控制协议(GACP)

      TCP 194=Irc

      TCP 197=目录定位服务(DLS)

      TCP 256=Nirvana

      TCP 315=The Invasor

      TCP 371=ClearCase版本管理软件

      TCP 389=Lightweight Directory Access Protocol (LDAP)

      TCP 396=Novell Netware over IP

      TCP 420=Breach

      TCP 421=TCP Wrappers

      TCP 443=安全服务

      TCP 444=Simple Network Paging Protocol(SNPP)

      TCP 445=Microsoft-DS

      TCP 455=Fatal Connections

      TCP 456=Hackers paradise,FuseSpark

      TCP 458=苹果公司QuickTime

      TCP 513=Grlogin

      TCP 514=RPC Backdoor

      TCP 520=Rip

      TCP 531=Rasmin,Net666

      TCP 544=kerberos kshell

      TCP 546=DHCP Client

      TCP 547=DHCP Server

      TCP 548=Macintosh文件服务

      TCP 555=Ini-Killer,Phase Zero,Stealth Spy

      TCP 569=MSN

      TCP 605=SecretService

      TCP 606=Noknok8

      TCP 660=DeepThroat

      TCP 661=Noknok8

      TCP 666=Attack FTP,Satanz Backdoor,Back Construction,Dark Connection Inside 1.2

      TCP 667=Noknok7.2

      TCP 668=Noknok6

      TCP 669=DP trojan

      TCP 692=GayOL

      TCP 707=Welchia,nachi

      TCP 777=AIM Spy

      TCP 808=RemoteControl,WinHole

      TCP 815=Everyone Darling

      TCP 901=Backdoor.Devil

      TCP 911=Dark Shadow

      TCP 993=IMAP

      TCP 999=DeepThroat

      TCP 1000=Der Spaeher

      TCP 1001=Silencer,WebEx,Der Spaeher

      TCP 1003=BackDoor

      TCP 1010=Doly

      TCP 1011=Doly

      TCP 1012=Doly

      TCP 1015=Doly

      TCP 1016=Doly

      TCP 1020=Vampire

      TCP 1023=Worm.Sasser.e

      TCP 1024=NetSpy.698(YAI)

      TCP 1059=nimreg

      //TCP 1025=NetSpy.698,Unused Windows Services Block

      //TCP 1026=Unused Windows Services Block

      //TCP 1027=Unused Windows Services Block

      TCP 1028=应用层网关服务

      //TCP 1029=Unused Windows Services Block

      //TCP 1030=Unused Windows Services Block

      //TCP 1033=Netspy

      //TCP 1035=Multidropper

      //TCP 1042=Bla

      //TCP 1045=Rasmin

      //TCP 1047=GateCrasher

      //TCP 1050=MiniCommand

      TCP 1058=nim

      TCP 1069=Backdoor.TheefServer.202

      TCP 1070=Voice,Psyber Stream Server,Streaming Audio Trojan

      TCP 1079=ASPROVATalk

      TCP 1080=Wingate,Worm.BugBear.B,Worm.Novarg.B

      //TCP 1090=Xtreme, VDOLive

      //TCP 1092=LoveGate

      //TCP 1095=Rat

      //TCP 1097=Rat

      //TCP 1098=Rat

      //TCP 1099=Rat

      TCP 1109=Pop with Kerberos

      TCP 1110=nfsd-keepalive

      TCP 1111=Backdoor.AIMVision

      TCP 1155=Network File Access

      //TCP 1170=Psyber Stream Server,Streaming Audio trojan,Voice

      //TCP 1200=NoBackO

      //TCP 1201=NoBackO

      //TCP 1207=Softwar

      //TCP 1212=Nirvana,Visul Killer

      //TCP 1234=Ultors

      //TCP 1243=BackDoor-G, SubSeven, SubSeven Apocalypse

      //TCP 1245=VooDoo Doll

      //TCP 1269=Mavericks Matrix

      TCP 1270=Microsoft Operations Manager

      //TCP 1313=Nirvana

      //TCP 1349=BioNet

      TCP 1352=Lotus Notes

      TCP 1433=Microsoft SQL Server

      TCP 1434=Microsoft SQL Monitor

      //TCP 1441=Remote Storm

      //TCP 1492=FTP99CMP(BackOriffice.FTP)

      TCP 1503=NetMeeting T.120

      TCP 1512=Microsoft Windows Internet Name Service

      //TCP 1509=Psyber Streaming Server

      TCP 1570=Orbix Daemon

      //TCP 1600=Shivka-Burka

      //TCP 1703=Exloiter 1.1

      TCP 1720=NetMeeting H.233 call Setup

      TCP 1731=NetMeeting音频调用控制

      TCP 1745=ISA Server proxy autoconfig, Remote Winsock

      TCP 1801=Microsoft Message Queue

      //TCP 1807=SpySender

      TCP 1906=Backdoor/Verify.b

      TCP 1907=Backdoor/Verify.b

      //TCP 1966=Fake FTP 2000

      //TCP 1976=Custom port

      //TCP 1981=Shockrave

      TCP 1990=stun-p1 cisco STUN Priority 1 port

      TCP 1990=stun-p1 cisco STUN Priority 1 port

      TCP 1991=stun-p2 cisco STUN Priority 2 port

      TCP 1992=stun-p3 cisco STUN Priority 3 port,ipsendmsg IPsendmsg

      TCP 1993=snmp-tcp-port cisco SNMP TCP port

      TCP 1994=stun-port cisco serial tunnel port

      TCP 1995=perf-port cisco perf port

      TCP 1996=tr-rsrb-port cisco Remote SRB port

      TCP 1997=gdp-port cisco Gateway Discovery Protocol

      TCP 1998=x25-svc-port cisco X.25 service (XOT)

      //TCP 1999=BackDoor, TransScout

      //TCP 2000=Der Spaeher,INsane Network

      TCP 2002=W32.Beagle.AX @mm

      //TCP 2001=Transmisson scout

      //TCP 2002=Transmisson scout

      //TCP 2003=Transmisson scout

      //TCP 2004=Transmisson scout

      //TCP 2005=TTransmisson scout

      TCP 2011=cypress

      TCP 2015=raid-cs

      //TCP 2023=Ripper,Pass Ripper,Hack City Ripper Pro

      TCP 2049=NFS

      //TCP 2115=Bugs

      //TCP 2121=Nirvana

      //TCP 2140=Deep Throat, The Invasor

      //TCP 2155=Nirvana

      //TCP 2208=RuX

      TCP 2234=DirectPlay

      //TCP 2255=Illusion Mailer

      //TCP 2283=HVL Rat5

      //TCP 2300=PC Explorer

      //TCP 2311=Studio54

      TCP 2556=Worm.Bbeagle.q

      //TCP 2565=Striker

      //TCP 2583=WinCrash

      //TCP 2600=Digital RootBeer

      //TCP 2716=Prayer Trojan

      TCP 2745=Worm.BBeagle.k

      //TCP 2773=Backdoor,SubSeven

      //TCP 2774=SubSeven2.1&2.2

      //TCP 2801=Phineas Phucker

      TCP 2967=SSC Agent

      //TCP 2989=Rat

      //TCP 3024=WinCrash trojan

      TCP 3074=Microsoft Xbox game port

      TCP 3127=Worm.Novarg

      TCP 3128=RingZero,Worm.Novarg.B

      //TCP 3129=Masters Paradise

      TCP 3132=Microsoft Business Rule Engine Update Service

      //TCP 3150=Deep Throat, The Invasor

      TCP 3198=Worm.Novarg

      //TCP 3210=SchoolBus

      TCP 3268=Microsoft Global Catalog

      TCP 3269=Microsoft Global Catalog with LDAP/SSL

      TCP 3332=Worm.Cycle.a

      TCP 3333=Prosiak

      TCP 3535=Microsoft Class Server

      TCP 3389=超级终端

      //TCP 3456=Terror

      //TCP 3459=Eclipse 2000

      //TCP 3700=Portal of Doom

      //TCP 3791=Eclypse

      //TCP 3801=Eclypse

      TCP 3847=Microsoft Firewall Control

      TCP 3996=Portal of Doom,RemoteAnything

      TCP 4000=腾讯QQ客户端

      TCP 4060=Portal of Doom,RemoteAnything

      TCP 4092=WinCrash

      TCP 4242=VHM

      TCP 4267=SubSeven2.1&2.2

      TCP 4321=BoBo

      TCP 4350=Net Device

      TCP 4444=Prosiak,Swift remote

      TCP 4500=Microsoft IPsec NAT-T, W32.HLLW.Tufas

      TCP 4567=File Nail

      TCP 4661=Backdoor/Surila.f

      TCP 4590=ICQTrojan

      TCP 4899=Remote Administrator服务器

      TCP 4950=ICQTrojan

      TCP 5000=WindowsXP服务器,Blazer 5,Bubbel,Back Door Setup,Sockets de Troie

      TCP 5001=Back Door Setup, Sockets de Troie

      TCP 5002=cd00r,Shaft

      TCP 5011=One of the Last Trojans (OOTLT)

      TCP 5025=WM Remote KeyLogger

      TCP 5031=Firehotcker,Metropolitan,NetMetro

      TCP 5032=Metropolitan

      TCP 5190=ICQ Query

      TCP 5321=Firehotcker

      TCP 5333=Backage Trojan Box 3

      TCP 5343=WCrat

      TCP 5400=Blade Runner, BackConstruction1.2

      TCP 5401=Blade Runner,Back Construction

      TCP 5402=Blade Runner,Back Construction

      TCP 5471=WinCrash

      TCP 5512=Illusion Mailer

      TCP 5521=Illusion Mailer

      TCP 5550=Xtcp,INsane Network

      TCP 5554=Worm.Sasser

      TCP 5555=ServeMe

      TCP 5556=BO Facil

      TCP 5557=BO Facil

      TCP 5569=Robo-Hack

      TCP 5598=BackDoor 2.03

      TCP 5631=PCAnyWhere data

      TCP 5632=PCAnyWhere

      TCP 5637=PC Crasher

      TCP 5638=PC Crasher

      TCP 5678=Remote Replication Agent Connection

      TCP 5679=Direct Cable Connect Manager

      TCP 5698=BackDoor

      TCP 5714=Wincrash3

      TCP 5720=Microsoft Licensing

      TCP 5741=WinCrash3

      TCP 5742=WinCrash

      TCP 5760=Portmap Remote Root Linux Exploit

      TCP 5880=Y3K RAT

      TCP 5881=Y3K RAT

      TCP 5882=Y3K RAT

      TCP 5888=Y3K RAT

      TCP 5889=Y3K RAT

      TCP 5900=WinVnc

      TCP 6000=Backdoor.AB

      TCP 6006=Noknok8

      TCP 6073=DirectPlay8

      TCP 6129=Dameware Nt Utilities服务器

      TCP 6272=SecretService

      TCP 6267=广外女生

      TCP 6400=Backdoor.AB,The Thing

      TCP 6500=Devil 1.03

      TCP 6661=Teman

      TCP 6666=TCPshell.c

      TCP 6667=NT Remote Control,Wise 播放器接收端口

      TCP 6668=Wise Video广播端口

      TCP 6669=Vampyre

      TCP 6670=DeepThroat,iPhone

      TCP 6671=Deep Throat 3.0

      TCP 6711=SubSeven

      TCP 6712=SubSeven1.x

      TCP 6713=SubSeven

      TCP 6723=Mstream

      TCP 6767=NT Remote Control

      TCP 6771=DeepThroat

      TCP 6776=BackDoor-G,SubSeven,2000 Cracks

      TCP 6777=Worm.BBeagle

      TCP 6789=Doly Trojan

      TCP 6838=Mstream

      TCP 6883=DeltaSource

      TCP 6912=Shit Heep

      TCP 6939=Indoctrination

      TCP 6969=GateCrasher, Priority, IRC 3

      TCP 6970=RealAudio,GateCrasher

      TCP 7000=Remote Grab,NetMonitor,SubSeven1.x

      TCP 7001=Freak88

      TCP 7201=NetMonitor

      TCP 7215=BackDoor-G, SubSeven

      TCP 7001=Freak88,Freak2k

      TCP 7300=NetMonitor

      TCP 7301=NetMonitor

      TCP 7306=NetMonitor,NetSpy 1.0

      TCP 7307=NetMonitor, ProcSpy

      TCP 7308=NetMonitor, X Spy

      TCP 7323=Sygate服务器端

      TCP 7424=Host Control

      TCP 7511=聪明基因

      TCP 7597=Qaz

      TCP 7609=Snid X2

      TCP 7626=冰河

      TCP 7777=The Thing

      TCP 7789=Back Door Setup, ICQKiller

      TCP 7983=Mstream

      TCP 8000=腾讯OICQ服务器端,XDMA

      TCP 8010=Wingate,Logfile

      TCP 8011=WAY2.4

      TCP 8080=WWW 代理,Ring Zero,Chubo,Worm.Novarg.B

      TCP 8102=网络神偷

      TCP 8181=W32.Erkez.D@mm

      TCP 8520=W32.Socay.Worm

      TCP 8594=I-Worm/Bozori.a

      TCP 8787=BackOfrice 2000

      TCP 8888=Winvnc

      TCP 8897=Hack Office,Armageddon

      TCP 8989=Recon

      TCP 9000=Netministrator

      TCP 9325=Mstream

      TCP 9400=InCommand 1.0

      TCP 9401=InCommand 1.0

      TCP 9402=InCommand 1.0

      TCP 9535=Remote Man Server

      TCP 9872=Portal of Doom

      TCP 9873=Portal of Doom

      TCP 9874=Portal of Doom

      TCP 9875=Portal of Doom

      TCP 9876=Cyber Attacker

      TCP 9878=TransScout

      TCP 9989=Ini-Killer

      TCP 9898=Worm.Win32.Dabber.a

      TCP 9999=Prayer Trojan

      TCP 10067=Portal of Doom

      TCP 10080=Worm.Novarg.B

      TCP 10084=Syphillis

      TCP 10085=Syphillis

      TCP 10086=Syphillis

      TCP 10101=BrainSpy

      TCP 10167=Portal Of Doom

      TCP 10168=Worm.Supnot.78858.c,Worm.LovGate.T

      TCP 10520=Acid Shivers

      TCP 10607=Coma trojan

      TCP 10666=Ambush

      TCP 11000=Senna Spy

      TCP 11050=Host Control

      TCP 11051=Host Control

      TCP 11223=Progenic,Hack '99KeyLogger

      TCP 11320=IMIP Channels Port

      TCP 11831=TROJ_LATINUS.SVR

      TCP 12076=Gjamer, MSH.104b

      TCP 12223=Hack'99 KeyLogger

      TCP 12345=GabanBus, NetBus 1.6/1.7, Pie Bill Gates, X-bill

      TCP 12346=GabanBus, NetBus 1.6/1.7, X-bill

      TCP 12349=BioNet

      TCP 12361=Whack-a-mole

      TCP 12362=Whack-a-mole

      TCP 12363=Whack-a-mole

      TCP 12378=W32/Gibe@MM

      TCP 12456=NetBus

      TCP 12623=DUN Control

      TCP 12624=Buttman

      TCP 12631=WhackJob, WhackJob.NB1.7

      TCP 12701=Eclipse2000

      TCP 12754=Mstream

      TCP 13000=Senna Spy

      TCP 13010=Hacker Brazil

      TCP 13013=Psychward

      TCP 13223=Tribal Voice的聊天程序PowWow

      TCP 13700=Kuang2 The Virus

      TCP 14456=Solero

      TCP 14500=PC Invader

      TCP 14501=PC Invader

      TCP 14502=PC Invader

      TCP 14503=PC Invader

      TCP 15000=NetDaemon 1.0

      TCP 15092=Host Control

      TCP 15104=Mstream

      TCP 16484=Mosucker

      TCP 16660=Stacheldraht (DDoS)

      TCP 16772=ICQ Revenge

      TCP 16959=Priority

      TCP 16969=Priority

      TCP 17027=提供广告服务的Conducent"adbot"共享软件

      TCP 17166=Mosaic

      TCP 17300=Kuang2 The Virus

      TCP 17490=CrazyNet

      TCP 17500=CrazyNet

      TCP 17569=Infector 1.4.x + 1.6.x

      TCP 17777=Nephron

      TCP 18753=Shaft (DDoS)

      TCP 19191=蓝色火焰

      TCP 19864=ICQ Revenge

      TCP 20000=Millennium II (GrilFriend)

      TCP 20001=Millennium II (GrilFriend)

      TCP 20002=AcidkoR

      TCP 20034=NetBus 2 Pro

      TCP 20168=Lovgate

      TCP 20203=Logged,Chupacabra

      TCP 20331=Bla

      TCP 20432=Shaft (DDoS)

      TCP 20808=Worm.LovGate.v.QQ

      TCP 21335=Tribal Flood Network,Trinoo

      TCP 21544=Schwindler 1.82,GirlFriend

      TCP 21554=Schwindler 1.82,GirlFriend,Exloiter 1.0.1.2

      TCP 22222=Prosiak,RuX Uploader 2.0

      TCP 22784=Backdoor.Intruzzo

      TCP 23432=Asylum 0.1.3

      TCP 23444=网络公牛

      TCP 23456=Evil FTP, Ugly FTP, WhackJob

      TCP 23476=Donald Dick

      TCP 23477=Donald Dick

      TCP 23777=INet Spy

      TCP 26274=Delta

      TCP 26681=Spy Voice

      TCP 27374=Sub Seven 2.0+, Backdoor.Baste

      TCP 27444=Tribal Flood Network,Trinoo

      TCP 27665=Tribal Flood Network,Trinoo

      TCP 29431=Hack Attack

      TCP 29432=Hack Attack

      TCP 29104=Host Control

      TCP 29559=TROJ_LATINUS.SVR

      TCP 29891=The Unexplained

      TCP 30001=Terr0r32

      TCP 30003=Death,Lamers Death

      TCP 30029=AOL trojan

      TCP 30100=NetSphere 1.27a,NetSphere 1.31

      TCP 30101=NetSphere 1.31,NetSphere 1.27a

      TCP 30102=NetSphere 1.27a,NetSphere 1.31

      TCP 30103=NetSphere 1.31

      TCP 30303=Sockets de Troie

      TCP 30722=W32.Esbot.A

      TCP 30947=Intruse

      TCP 30999=Kuang2

      TCP 31336=Bo Whack

      TCP 31337=Baron Night,BO client,BO2,Bo Facil,BackFire,Back Orifice,DeepBO,Freak2k,NetSpy

      TCP 31338=NetSpy,Back Orifice,DeepBO

      TCP 31339=NetSpy DK

      TCP 31554=Schwindler

      TCP 31666=BOWhack

      TCP 31778=Hack Attack

      TCP 31785=Hack Attack

      TCP 31787=Hack Attack

      TCP 31789=Hack Attack

      更新时间: 200786

      TCP 31791=Hack Attack

      TCP 31792=Hack Attack

      TCP 32100=PeanutBrittle

      TCP 32418=Acid Battery

      TCP 33333=Prosiak,Blakharaz 1.0

      TCP 33577=Son Of Psychward

      TCP 33777=Son Of Psychward

      TCP 33911=Spirit 2001a

      TCP 34324=BigGluck,TN,Tiny Telnet Server

      TCP 34555=Trin00 (Windows) (DDoS)

      TCP 35555=Trin00 (Windows) (DDoS)

      TCP 36794=Worm.Bugbear-A

      TCP 37651=YAT

      TCP 40412=The Spy

      TCP 40421=Agent 40421,Masters Paradise.96

      TCP 40422=Masters Paradise

      TCP 40423=Masters Paradise.97

      TCP 40425=Masters Paradise

      TCP 40426=Masters Paradise 3.x

      TCP 41666=Remote Boot

      TCP 43210=Schoolbus 1.6/2.0

      TCP 44444=Delta Source

      TCP 44445=Happypig

      TCP 45576=未知代理

      TCP 47252=Prosiak

      TCP 47262=Delta

      TCP 47624=Direct Play Server

      TCP 47878=BirdSpy2

      TCP 49301=Online Keylogger

      TCP 50505=Sockets de Troie

      TCP 50766=Fore, Schwindler

      TCP 51966=CafeIni

      TCP 53001=Remote Windows Shutdown

      TCP 53217=Acid Battery 2000

      TCP 54283=Back Door-G, Sub7

      TCP 54320=Back Orifice 2000,Sheep

      TCP 54321=School Bus .69-1.11,Sheep, BO2K

      TCP 57341=NetRaider

      TCP 58008=BackDoor.Tron

      TCP 58009=BackDoor.Tron

      TCP 58339=ButtFunnel

      TCP 59211=BackDoor.DuckToy

      TCP 60000=Deep Throat

      TCP 60068=Xzip 6000068

      TCP 60411=Connection

      TCP 60606=TROJ_BCKDOR.G2.A

      TCP 61466=Telecommando

      TCP 61603=Bunker-kill

      TCP 63485=Bunker-kill

      TCP 65000=Devil, DDoS

      TCP 65432=Th3tr41t0r, The Traitor

      TCP 65530=TROJ_WINMITE.10

      TCP 65535=RC,Adore Worm/Linux

      TCP 69123=ShitHeep

      TCP 88798=Armageddon,Hack Office

      UDP 1=Sockets des Troie

      UDP 9=Chargen

      UDP 19=Chargen

      UDP 69=Pasana

      UDP 80=Penrox

      UDP 371=ClearCase版本管理软件

      UDP 445=公共Internet文件系统(CIFS)

      UDP 500=Internet密钥交换

      UDP 1025=Maverick's Matrix 1.2 - 2.0

      UDP 1026=Remote Explorer 2000

      UDP 1027=HP服务,UC聊天软件,Trojan.Huigezi.e

      UDP 1028=应用层网关服务,KiLo,SubSARI

      UDP 1029=SubSARI

      UDP 1031=Xot

      UDP 1032=Akosch4

      UDP 1104=RexxRave

      UDP 1111=Daodan

      UDP 1116=Lurker

      UDP 1122=Last 2000,Singularity

      UDP 1183=Cyn,SweetHeart

      UDP 1200=NoBackO

      UDP 1201=NoBackO

      UDP 1342=BLA trojan

      UDP 1344=Ptakks

      UDP 1349=BO dll

      UDP 1512=Microsoft Windows Internet Name Service

      UDP 1561=MuSka52

      UDP 1772=NetControle

      UDP 1801=Microsoft Message Queue

      UDP 1978=Slapper

      UDP 1985=Black Diver

      UDP 2000=A-trojan,Fear,Force,GOTHIC Intruder,Last 2000,Real 2000

      UDP 2001=Scalper

      UDP 2002=Slapper

      UDP 2015=raid-cs

      UDP 2018=rellpack

      UDP 2130=Mini BackLash

      UDP 2140=Deep Throat,Foreplay,The Invasor

      UDP 2222=SweetHeart,Way,Backdoor/Mifeng.t

      UDP 2234=DirectPlay

      UDP 2339=Voice Spy

      UDP 2702=Black Diver

      UDP 2989=RAT

      UDP 3074=Microsoft Xbox game port

      UDP 3132=Microsoft Business Rule Engine Update Service

      UDP 3150=Deep Throat

      UDP 3215=XHX

      UDP 3268=Microsoft Global Catalog

      UDP 3269=Microsoft Global Catalog with LDAP/SSL

      UDP 3333=Daodan

      UDP 3535=Microsoft Class Server

      UDP 3801=Eclypse

      UDP 3996=Remote Anything

      UDP 4128=RedShad

      UDP 4156=Slapper

      UDP 4350=Net Device

      UDP 4500=Microsoft IPsec NAT-T, sae-urn

      UDP 5419=DarkSky

      UDP 5503=Remote Shell Trojan

      UDP 5555=Daodan

      UDP 5678=Remote Replication Agent Connection

      UDP 5679=Direct Cable Connect Manager

      UDP 5720=Microsoft Licensing

      UDP 5882=Y3K RAT

      UDP 5888=Y3K RAT

      UDP 6073=DirectPlay8

      UDP 6112=Battle.net Game

      UDP 6666=KiLo

      UDP 6667=KiLo

      UDP 6766=KiLo

      UDP 6767=KiLo,UandMe

      UDP 6838=Mstream Agent-handler

      UDP 7028=未知木马

      UDP 7424=Host Control

      UDP 7788=Singularity

      UDP 7983=MStream handler-agent

      UDP 8012=Ptakks

      UDP 8090=Aphex's Remote Packet Sniffer

      UDP 8127=9_119,Chonker

      UDP 8488=KiLo

      UDP 8489=KiLo

      UDP 8787=BackOrifice 2000

      UDP 8879=BackOrifice 2000

      UDP 9325=MStream Agent-handler

      UDP 10000=XHX

      UDP 10067=Portal of Doom

      UDP 10084=Syphillis

      UDP 10100=Slapper

      UDP 10167=Portal of Doom

      UDP 10498=Mstream

      UDP 10666=Ambush

      UDP 11225=Cyn

      UDP 12321=Protoss

      UDP 12345=BlueIce 2000

      UDP 12378=W32/Gibe@MM

      UDP 12623=ButtMan,DUN Control

      UDP 11320=IMIP Channels Port

      UDP 15210=UDP remote shell backdoor server

      UDP 15486=KiLo

      UDP 16514=KiLo

      UDP 16515=KiLo

      UDP 18753=Shaft handler to Agent

      UDP 20433=Shaft

      UDP 21554=GirlFriend

      UDP 22784=Backdoor.Intruzzo

      UDP 23476=Donald Dick

      UDP 25123=MOTD

      UDP 26274=Delta Source

      UDP 26374=Sub-7 2.1

      UDP 26444=Trin00/TFN2K

      UDP 26573=Sub-7 2.1

      UDP 27184=Alvgus trojan 2000

      UDP 27444=Trinoo

      UDP 29589=KiLo

      UDP 29891=The Unexplained

      UDP 30103=NetSphere

      UDP 31320=Little Witch

      UDP 31335=Trin00 DoS Attack

      UDP 31337=Baron Night, BO client, BO2, Bo Facil, BackFire, Back Orifice, DeepBO

      UDP 31338=Back Orifice, NetSpy DK, DeepBO

      UDP 31339=Little Witch

      UDP 31340=Little Witch

      UDP 31416=Lithium

      UDP 31787=Hack aTack

      UDP 31789=Hack aTack

      UDP 31790=Hack aTack

      UDP 31791=Hack aTack

      UDP 33390=未知木马

      UDP 34555=Trinoo

      UDP 35555=Trinoo

      UDP 43720=KiLo

      UDP 44014=Iani

      UDP 44767=School Bus

      UDP 46666=Taskman

      UDP 47262=Delta Source

      UDP 47624=Direct Play Server

      UDP 47785=KiLo

      UDP 49301=OnLine keyLogger

      UDP 49683=Fenster

      UDP 49698=KiLo

      UDP 52901=Omega

      UDP 54320=Back Orifice

      UDP 54321=Back Orifice 2000

      UDP 54341=NetRaider Trojan

      UDP 61746=KiLO

      UDP 61747=KiLO

      UDP 61748=KiLO

      UDP 65432=The Traitor

    [编辑本段]

    怎样查看端口

      一台服务器有大量的端口在使用,怎么来查看端口呢?有两种方式:一种是利用系统内置的命令,一种是利用第三方端口扫描软件。

      1.“netstat an”查看端口状态

      在Windows 2000/XP中,可以在命令提示符下使用“netstat -an”看系统端口状态,可以列出系统正在开放的端口号及其状态.

      2.用第三方端口扫描软件

      第三方端口扫描软件有许多,界面虽然千差万别,但是功能却是类似的。这里以“Fport” (可到http://www.ccert.edu.cn/tools/index.php?type_t=7http://www.cci dnet.com/soft/cce下载)为例讲解。“Fport”在命令提示符下使用,运行结果“netstat -an”相似,但是它不仅能够列出正在使用的端口号及类型,还可以列出端口被哪个应用程序使用。

      3.“netstat -n”命令,以数字格式显示地址和端口信息。

    [编辑本段]

    端口号很多是奇数的原因

    6、    如果仔细检查这些标准的简单服务以及其他标准的TCP/IP服务(如TelnetFTP SMTP等)的端口号时,我们发现它们都是奇数。这是有历史原因的,因为这些端口号都是从NCP端口号派生出来的(NCP,即网络控制协议,是ARPANET的运输层协议,是TCP的前身)。NCP是半双工的,不是全双工的,因此每个应用程序需要两个连接,需预留一对奇数和偶数端口号。当TCPUDP成为标准的运输层协议时,每个应用程序只需要一个端口号,因此就使用了NCP中的奇数。

    7、   

  • 相关阅读:
    关于Combobox的多选和单选情况
    Struts2的method{1}用法
    ${sessionScope.user}的使用方法
    jQuery 遍历
    jQuery的Event对象(实例)。
    度熊全是由1构成的字符串
    Prime Ring Problem
    八皇后问题
    Hanoi
    全排列
  • 原文地址:https://www.cnblogs.com/lihuanhuan/p/10612223.html
Copyright © 2011-2022 走看看