speedguide.net  

Port 3030 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
3030 tcp trojans NetPanzer uses port 3030 (TCP/UDP).

W32.Mytob.ET@mm [Symantec-2005-061516-3312-99] (2005.06.15) - mass-mailing worm with backdoor capabilities. Uses its own SMTP engine to spread. Connects to an IRC server and listens for remote commands on port 3030/tcp.

Backdoor.Slao [Symantec-2003-052610-2111-99] (2003.05.26) - a backdoor trojan horse that allows unauthorized access to an infected computer.

Port also used by the W32.Mytob.EQ, W32.Mytob.cz@mm [Symantec-2005-060214-2034-99] variants of the worm.

IANA registered for: Arepa Cas (TCP/UDP)
SG
3030 tcp,udp NetPanzer (unofficial) Wikipedia
2000-2001, 2038, 2050, 2051, 2069, 2085, 3010, 3030 tcp applications ICUII Portforward
3030 tcp threat W32.Mytob Bekkoame
3030 tcp,udp arepa-cas Arepa Cas IANA
5 records found

Related ports: 3131  3232  3333  3434  

News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About