Port 1027 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
1027 |
tcp |
trojans |
Infostealer.ABCHlp [Symantec-2003-060511-5140-99] (2003.06.05) - a password-stealing, Backdoor trojan horse. The program attempts to send password information from a compromised computer to an address in China. By default it makes use of port 1027.
ICKiller trojan uses this port
Microsoft operating systems tend to allocate one or more publicly exposed services (DCOM, etc.) among the first few ports immediately above the end of the system ports (1024+). |
SG
|
1027 |
udp |
6a44 |
IPv6 behind IPv4-to-IPv4 NAT Customer Premises Equipment CPEs [IESG] (IANA official) [RFC 6751] |
SG
|
1027 |
tcp |
trojan |
Clandestine, DataSpy Network X, KiLo, UandMe |
Trojans
|
1027 |
tcp |
icq |
icq instant messanger |
SANS
|
1027 |
tcp |
IIS |
IIS |
Nmap
|
1027 |
tcp |
ICKiller |
[trojan] ICKiller |
Neophasis
|
1027 |
tcp,udp |
threat |
ABCHlp |
Bekkoame
|
1027 |
udp |
6a44 |
IPv6 Behind NAT44 CPEs [RFC6751] , registered 2012-08-02 |
IANA
|
1027 |
tcp |
|
Reserved |
IANA
|
1025-1029 |
tcp,udp |
nfc-iis |
Ports > 1024 are designated for dynamic allocation by Windows. When programs ask for the "next available" socket, they usually get sequential ports starting at 1025.
Ports 1026-1027/udp were historically used for Windows Messenger popup spam |
SG
|
|
10 records found
Related ports: 1024 1025 1026
|