![]() ![]() HTTP/3 uses QUIC, a transport protocol on top of UDP. Hypertext Transfer Protocol Secure (HTTPS) uses TCP in versions 1.x and 2. Trojan horses and computer viruses have used UDP port 201.ĭirect Connect Client-to-Client, Trap Convention Port Simple network management protocol listens for asynchronous trapsĪppleTalk Routing Maintenance. Simple network management protocol agents communicate on this port Internet Message Access Protocol (IMAP), management of electronic mail messages on a server NetBIOS Datagram Service, used for providing access to shared resources ![]() NetBIOS Name Service, used for name registration and resolution ![]() Microsoft Remote Procedure Call (RPC) Endpoint Mapper (EPMAP) service, for remote system access and management Identification Protocol, for identifying the user of a particular TCP connection Microsoft Exchange ISO Transport Service Access Point (TSAP) Class 0 protocol ![]() Hypertext Transfer Protocol (HTTP) uses TCP in versions 1.x and 2. HTTP/3 uses QUIC, a transport protocol on top of UDP Name/Finger protocol and Finger user information protocol, for retrieving and manipulating user information Gopher is a communication protocol for distributing, searching, and retrieving documents in Internet Protocol (IP) networks Terminal Access Controller Access-Control System, provides remote authentication and related services for network accessĭynamic Host Configuration Protocol and its predecessor Bootstrap Protocol Server server portĭynamic Host Configuration Protocol and its predecessor Bootstrap Protocol Server client port UDP can also use TCP but not necessarily on port 49 Whois service, provides domain-level information Microsoft Windows Internet Name Service, vulnerable to attacks on a local network Simple Mail Transfer Protocol, used for email routing between mail servers Telnet protocol, for unencrypted text communications Secure Shell, secure logins, file transfers ( scp, sftp), and port forwarding Well-known/System Ports: 0 – 1023 Port numberĬharacter Generator Protocol, has severe vulnerabilities and thus is rarely used nowadays The following tables cover services (and malware) that use common TCP ports and some UDP or SCTP ports. Frequently Asked Questions Common Ports and Protocols Cheat Sheet. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |