Port 1026 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
1026 |
tcp,udp |
cap |
Microsoft DCOM services often uses ports 1026/tcp and 1029/tcp
CAP - Calendar Access Protocol (IANA official) |
SG
|
1026 |
tcp |
|
Often utilized by Microsoft DCOM services (unofficial) |
Wikipedia
|
1026 |
tcp |
trojan |
BDDT, Dark IRC, DataSpy Network X, Delta Remote Access , Dosh, Duddie, IRC Contact, Remote Explorer 2000, RUX The TIc.K |
Trojans
|
1026 |
udp |
trojan |
Remote Explorer 2000 |
Trojans
|
1026 |
udp |
win-rpc |
Windows RPC |
SANS
|
1026 |
tcp |
LSA-or-nterm |
nterm remote_login network_terminal |
Nmap
|
1026 |
udp |
win-rpc |
Commonly used to send MS Messenger spam |
Nmap
|
1026 |
tcp |
nterm |
remote_login network_terminal |
Neophasis
|
1026 |
tcp,udp |
cap |
Calendar Access Protocol, registered 2010-12-09 |
IANA
|
1025-1029 |
tcp,udp |
nfc-iis |
Ports > 1024 are designated for dynamic allocation by Windows. When programs ask for the "next available" socket, they usually get sequential ports starting at 1025.
Ports 1026-1027/udp were historically used for Windows Messenger popup spam |
SG
|
|
10 records found
Related ports: 1025 1029
|