1、 SQL Server:入站端口为TCP 1433,出站端口为TCP任意端口(10245000之间的端口号);

2、 SQL Browser :入站端口为UDP 1434,出站端口为UDP任意端口(10245000之间的端口号);

3、查看或修改SQL2005实例的端口号,如果系统中同时安装SQL 2000SQL 2005SQL 2005的连接端口可能不是1433,我们需要更改SQL 2005实例的TCP端口。“开始”——“程序”——“Microsoft SQL Server 2005”——“配置工具”——“SQL Server Configuration Manager”——“SQL Server 2005 网络配置”,点击需要的命名实例,在右边的窗口中可以看到协议名称和状态列表,鼠标右键单击“TCP/IP”选择“属性”,单击“IP地址”选项卡,在“IPALL”列表中,“TCP动态端口”留空,“TCP端口”可以修改成需要的端口号。如下图所示:

3、  查看或修改SQL 2000实例的端口号,如果操作系统中,同时存在SQL 2000SQL 2005,部分SQL实例的服务端口可能不是1433,这个时候就需要我们手动修改。“开始”——“程序”——“Microsoft SQL Server”——“服务器网络实用工具”——“常规选项卡”——“启用的协议”——选中“TCP/IP”,单击“属性”,在弹出的对话框中,修改默认的端口即可。如下图所示:

4、 知名端口即众所周知的端口号,范围从01023,这些端口号一般固定分配给一些服务。比如21端口分配给FTP(文件传输协议)服务,25端口分配给SMTP(简单邮件传输协议)服务,80端口分配给HTTP服务,135端口分配给RPC(远程过程调用)服务等等。

5、 动态端口的范围从102465535,这些端口号一般不固定分配给某个服务,也就是说许多服务都可以使用这些端口。只要运行的程序向系统提出访问网络的申请,那么系统就可以从这些端口号中分配一个供该程序使用。比如1024端口就是分配给第一个向系统发出申请的程序。在关闭程序进程后,就会释放所占用的端口号。

6知名端口号

  //: 由于一些应用软件占用了部分端口, 因此此文件中的部分端口被注释掉了(注释字符为: //)

  TCP 1=TCP Port Service Multiplexer

  TCP 2=Death

  TCP 5=Remote Job Entry,yoyo

  TCP 7=Echo

  TCP 11=Skun

  TCP 12=Bomber

  TCP 16=Skun

  TCP 17=Skun

  TCP 18=消息传输协议,skun

  TCP 19=Skun

  TCP 20=FTP Data,Amanda

  TCP 21=文件传输,Back Construction,Blade Runner,Doly Trojan,Fore,FTP trojan,Invisible FTP,Larva, WebEx,WinCrash

  TCP 22=远程登录协议

  TCP 23=远程登录(Telnet),Tiny Telnet Server (= TTS)

  TCP 25=电子邮件(SMTP),Ajan,Antigen,Email Password Sender,Happy 99,Kuang2,ProMail trojan,Shtrilitz,Stealth,Tapiras,Terminator,WinPC,WinSpy,Haebu Coceda

  TCP 27=Assasin

  TCP 28=Amanda

  TCP 29=MSG ICP

  TCP 30=Agent 40421

  TCP 31=Agent 31,Hackers Paradise,Masters Paradise,Agent 40421

  TCP 37=Time,ADM worm

  TCP 39=SubSARI

  TCP 41=DeepThroat,Foreplay

  TCP 42=Host Name Server

  TCP 43=WHOIS

  TCP 44=Arctic

  TCP 48=DRAT

  TCP 49=主机登录协议

  TCP 50=DRAT

  TCP 51=IMP Logical Address Maintenance,Fuck Lamers Backdoor

  TCP 52=MuSka52,Skun

  TCP 53=DNS,Bonk (DOS Exploit)

  TCP 54=MuSka52

  TCP 58=DMSetup

  TCP 59=DMSetup

  TCP 63=whois++

  TCP 64=Communications Integrator

  TCP 65=TACACS-Database Service

  TCP 66=Oracle SQL*NET,AL-Bareki

  TCP 67=Bootstrap Protocol Server

  TCP 68=Bootstrap Protocol Client

  TCP 69=W32.Evala.Worm,BackGate Kit,Nimda,Pasana,Storm,Storm worm,Theef,Worm.Cycle.a

  TCP 70=Gopher服务,ADM worm

  TCP 79=用户查询(Finger),Firehotcker,ADM worm

  TCP 80=超文本服务器(Http),Executor,RingZero

  TCP 81=Chubo,Worm.Bbeagle.q

  TCP 82=Netsky-Z

  TCP 88=Kerberos krb5服务

  TCP 99=Hidden Port

  TCP 102=消息传输代理

  TCP 108=SNA网关访问服务器

  TCP 109=Pop2

  TCP 110=电子邮件(Pop3),ProMail

  TCP 113=Kazimas, Auther Idnet

  TCP 115=简单文件传输协议

  TCP 118=SQL Services, Infector 1.4.2

  TCP 119=新闻组传输协议(Newsgroup(Nntp)), Happy 99

  TCP 121=JammerKiller, Bo jammerkillah

  TCP 123=网络时间协议(NTP),Net Controller

  TCP 129=Password Generator Protocol

  TCP 133=Infector 1.x

  TCP 135=微软DCE RPC end-point mapper服务

  TCP 137=微软Netbios Name服务(网上邻居传输文件使用)

  TCP 138=微软Netbios Name服务(网上邻居传输文件使用)

  TCP 139=微软Netbios Name服务(用于文件及打印机共享)

  TCP 142=NetTaxi

  TCP 143=IMAP

  TCP 146=FC Infector,Infector

  TCP 150=NetBIOS Session Service

  TCP 156=SQL服务器

  TCP 161=Snmp

  TCP 162=Snmp-Trap

  TCP 170=A-Trojan

  TCP 177=X Display管理控制协议

  TCP 179=Border网关协议(BGP)

  TCP 190=网关访问控制协议(GACP)

  TCP 194=Irc

  TCP 197=目录定位服务(DLS)

  TCP 256=Nirvana

  TCP 315=The Invasor

  TCP 371=ClearCase版本管理软件

  TCP 389=Lightweight Directory Access Protocol (LDAP)

  TCP 396=Novell Netware over IP

  TCP 420=Breach

  TCP 421=TCP Wrappers

  TCP 443=安全服务

  TCP 444=Simple Network Paging Protocol(SNPP)

  TCP 445=Microsoft-DS

  TCP 455=Fatal Connections

  TCP 456=Hackers paradise,FuseSpark

  TCP 458=苹果公司QuickTime

  TCP 513=Grlogin

  TCP 514=RPC Backdoor

  TCP 520=Rip

  TCP 531=Rasmin,Net666

  TCP 544=kerberos kshell

  TCP 546=DHCP Client

  TCP 547=DHCP Server

  TCP 548=Macintosh文件服务

  TCP 555=Ini-Killer,Phase Zero,Stealth Spy

  TCP 569=MSN

  TCP 605=SecretService

  TCP 606=Noknok8

  TCP 660=DeepThroat

  TCP 661=Noknok8

  TCP 666=Attack FTP,Satanz Backdoor,Back Construction,Dark Connection Inside 1.2

  TCP 667=Noknok7.2

  TCP 668=Noknok6

  TCP 669=DP trojan

  TCP 692=GayOL

  TCP 707=Welchia,nachi

  TCP 777=AIM Spy

  TCP 808=RemoteControl,WinHole

  TCP 815=Everyone Darling

  TCP 901=Backdoor.Devil

  TCP 911=Dark Shadow

  TCP 993=IMAP

  TCP 999=DeepThroat

  TCP 1000=Der Spaeher

  TCP 1001=Silencer,WebEx,Der Spaeher

  TCP 1003=BackDoor

  TCP 1010=Doly

  TCP 1011=Doly

  TCP 1012=Doly

  TCP 1015=Doly

  TCP 1016=Doly

  TCP 1020=Vampire

  TCP 1023=Worm.Sasser.e

  TCP 1024=NetSpy.698(YAI)

  TCP 1059=nimreg

  //TCP 1025=NetSpy.698,Unused Windows Services Block

  //TCP 1026=Unused Windows Services Block

  //TCP 1027=Unused Windows Services Block

  TCP 1028=应用层网关服务

  //TCP 1029=Unused Windows Services Block

  //TCP 1030=Unused Windows Services Block

  //TCP 1033=Netspy

  //TCP 1035=Multidropper

  //TCP 1042=Bla

  //TCP 1045=Rasmin

  //TCP 1047=GateCrasher

  //TCP 1050=MiniCommand

  TCP 1058=nim

  TCP 1069=Backdoor.TheefServer.202

  TCP 1070=Voice,Psyber Stream Server,Streaming Audio Trojan

  TCP 1079=ASPROVATalk

  TCP 1080=Wingate,Worm.BugBear.B,Worm.Novarg.B

  //TCP 1090=Xtreme, VDOLive

  //TCP 1092=LoveGate

  //TCP 1095=Rat

  //TCP 1097=Rat

  //TCP 1098=Rat

  //TCP 1099=Rat

  TCP 1109=Pop with Kerberos

  TCP 1110=nfsd-keepalive

  TCP 1111=Backdoor.AIMVision

  TCP 1155=Network File Access

  //TCP 1170=Psyber Stream Server,Streaming Audio trojan,Voice

  //TCP 1200=NoBackO

  //TCP 1201=NoBackO

  //TCP 1207=Softwar

  //TCP 1212=Nirvana,Visul Killer

  //TCP 1234=Ultors

  //TCP 1243=BackDoor-G, SubSeven, SubSeven Apocalypse

  //TCP 1245=VooDoo Doll

  //TCP 1269=Mavericks Matrix

  TCP 1270=Microsoft Operations Manager

  //TCP 1313=Nirvana

  //TCP 1349=BioNet

  TCP 1352=Lotus Notes

  TCP 1433=Microsoft SQL Server

  TCP 1434=Microsoft SQL Monitor

  //TCP 1441=Remote Storm

  //TCP 1492=FTP99CMP(BackOriffice.FTP)

  TCP 1503=NetMeeting T.120

  TCP 1512=Microsoft Windows Internet Name Service

  //TCP 1509=Psyber Streaming Server

  TCP 1570=Orbix Daemon

  //TCP 1600=Shivka-Burka

  //TCP 1703=Exloiter 1.1

  TCP 1720=NetMeeting H.233 call Setup

  TCP 1731=NetMeeting音频调用控制

  TCP 1745=ISA Server proxy autoconfig, Remote Winsock

  TCP 1801=Microsoft Message Queue

  //TCP 1807=SpySender

  TCP 1906=Backdoor/Verify.b

  TCP 1907=Backdoor/Verify.b

  //TCP 1966=Fake FTP 2000

  //TCP 1976=Custom port

  //TCP 1981=Shockrave

  TCP 1990=stun-p1 cisco STUN Priority 1 port

  TCP 1990=stun-p1 cisco STUN Priority 1 port

  TCP 1991=stun-p2 cisco STUN Priority 2 port

  TCP 1992=stun-p3 cisco STUN Priority 3 port,ipsendmsg IPsendmsg

  TCP 1993=snmp-tcp-port cisco SNMP TCP port

  TCP 1994=stun-port cisco serial tunnel port

  TCP 1995=perf-port cisco perf port

  TCP 1996=tr-rsrb-port cisco Remote SRB port

  TCP 1997=gdp-port cisco Gateway Discovery Protocol

  TCP 1998=x25-svc-port cisco X.25 service (XOT)

  //TCP 1999=BackDoor, TransScout

  //TCP 2000=Der Spaeher,INsane Network

  TCP 2002=W32.Beagle.AX @mm

  //TCP 2001=Transmisson scout

  //TCP 2002=Transmisson scout

  //TCP 2003=Transmisson scout

  //TCP 2004=Transmisson scout

  //TCP 2005=TTransmisson scout

  TCP 2011=cypress

  TCP 2015=raid-cs

  //TCP 2023=Ripper,Pass Ripper,Hack City Ripper Pro

  TCP 2049=NFS

  //TCP 2115=Bugs

  //TCP 2121=Nirvana

  //TCP 2140=Deep Throat, The Invasor

  //TCP 2155=Nirvana

  //TCP 2208=RuX

  TCP 2234=DirectPlay

  //TCP 2255=Illusion Mailer

  //TCP 2283=HVL Rat5

  //TCP 2300=PC Explorer

  //TCP 2311=Studio54

  TCP 2556=Worm.Bbeagle.q

  //TCP 2565=Striker

  //TCP 2583=WinCrash

  //TCP 2600=Digital RootBeer

  //TCP 2716=Prayer Trojan

  TCP 2745=Worm.BBeagle.k

  //TCP 2773=Backdoor,SubSeven

  //TCP 2774=SubSeven2.1&2.2

  //TCP 2801=Phineas Phucker

  TCP 2967=SSC Agent

  //TCP 2989=Rat

  //TCP 3024=WinCrash trojan

  TCP 3074=Microsoft Xbox game port

  TCP 3127=Worm.Novarg

  TCP 3128=RingZero,Worm.Novarg.B

  //TCP 3129=Masters Paradise

  TCP 3132=Microsoft Business Rule Engine Update Service

  //TCP 3150=Deep Throat, The Invasor

  TCP 3198=Worm.Novarg

  //TCP 3210=SchoolBus

  TCP 3268=Microsoft Global Catalog

  TCP 3269=Microsoft Global Catalog with LDAP/SSL

  TCP 3332=Worm.Cycle.a

  TCP 3333=Prosiak

  TCP 3535=Microsoft Class Server

  TCP 3389=超级终端

  //TCP 3456=Terror

  //TCP 3459=Eclipse 2000

  //TCP 3700=Portal of Doom

  //TCP 3791=Eclypse

  //TCP 3801=Eclypse

  TCP 3847=Microsoft Firewall Control

  TCP 3996=Portal of Doom,RemoteAnything

  TCP 4000=腾讯QQ客户端

  TCP 4060=Portal of Doom,RemoteAnything

  TCP 4092=WinCrash

  TCP 4242=VHM

  TCP 4267=SubSeven2.1&2.2

  TCP 4321=BoBo

  TCP 4350=Net Device

  TCP 4444=Prosiak,Swift remote

  TCP 4500=Microsoft IPsec NAT-T, W32.HLLW.Tufas

  TCP 4567=File Nail

  TCP 4661=Backdoor/Surila.f

  TCP 4590=ICQTrojan

  TCP 4899=Remote Administrator服务器

  TCP 4950=ICQTrojan

  TCP 5000=WindowsXP服务器,Blazer 5,Bubbel,Back Door Setup,Sockets de Troie

  TCP 5001=Back Door Setup, Sockets de Troie

  TCP 5002=cd00r,Shaft

  TCP 5011=One of the Last Trojans (OOTLT)

  TCP 5025=WM Remote KeyLogger

  TCP 5031=Firehotcker,Metropolitan,NetMetro

  TCP 5032=Metropolitan

  TCP 5190=ICQ Query

  TCP 5321=Firehotcker

  TCP 5333=Backage Trojan Box 3

  TCP 5343=WCrat

  TCP 5400=Blade Runner, BackConstruction1.2

  TCP 5401=Blade Runner,Back Construction

  TCP 5402=Blade Runner,Back Construction

  TCP 5471=WinCrash

  TCP 5512=Illusion Mailer

  TCP 5521=Illusion Mailer

  TCP 5550=Xtcp,INsane Network

  TCP 5554=Worm.Sasser

  TCP 5555=ServeMe

  TCP 5556=BO Facil

  TCP 5557=BO Facil

  TCP 5569=Robo-Hack

  TCP 5598=BackDoor 2.03

  TCP 5631=PCAnyWhere data

  TCP 5632=PCAnyWhere

  TCP 5637=PC Crasher

  TCP 5638=PC Crasher

  TCP 5678=Remote Replication Agent Connection

  TCP 5679=Direct Cable Connect Manager

  TCP 5698=BackDoor

  TCP 5714=Wincrash3

  TCP 5720=Microsoft Licensing

  TCP 5741=WinCrash3

  TCP 5742=WinCrash

  TCP 5760=Portmap Remote Root Linux Exploit

  TCP 5880=Y3K RAT

  TCP 5881=Y3K RAT

  TCP 5882=Y3K RAT

  TCP 5888=Y3K RAT

  TCP 5889=Y3K RAT

  TCP 5900=WinVnc

  TCP 6000=Backdoor.AB

  TCP 6006=Noknok8

  TCP 6073=DirectPlay8

  TCP 6129=Dameware Nt Utilities服务器

  TCP 6272=SecretService

  TCP 6267=广外女生

  TCP 6400=Backdoor.AB,The Thing

  TCP 6500=Devil 1.03

  TCP 6661=Teman

  TCP 6666=TCPshell.c

  TCP 6667=NT Remote Control,Wise 播放器接收端口

  TCP 6668=Wise Video广播端口

  TCP 6669=Vampyre

  TCP 6670=DeepThroat,iPhone

  TCP 6671=Deep Throat 3.0

  TCP 6711=SubSeven

  TCP 6712=SubSeven1.x

  TCP 6713=SubSeven

  TCP 6723=Mstream

  TCP 6767=NT Remote Control

  TCP 6771=DeepThroat

  TCP 6776=BackDoor-G,SubSeven,2000 Cracks

  TCP 6777=Worm.BBeagle

  TCP 6789=Doly Trojan

  TCP 6838=Mstream

  TCP 6883=DeltaSource

  TCP 6912=Shit Heep

  TCP 6939=Indoctrination

  TCP 6969=GateCrasher, Priority, IRC 3

  TCP 6970=RealAudio,GateCrasher

  TCP 7000=Remote Grab,NetMonitor,SubSeven1.x

  TCP 7001=Freak88

  TCP 7201=NetMonitor

  TCP 7215=BackDoor-G, SubSeven

  TCP 7001=Freak88,Freak2k

  TCP 7300=NetMonitor

  TCP 7301=NetMonitor

  TCP 7306=NetMonitor,NetSpy 1.0

  TCP 7307=NetMonitor, ProcSpy

  TCP 7308=NetMonitor, X Spy

  TCP 7323=Sygate服务器端

  TCP 7424=Host Control

  TCP 7511=聪明基因

  TCP 7597=Qaz

  TCP 7609=Snid X2

  TCP 7626=冰河

  TCP 7777=The Thing

  TCP 7789=Back Door Setup, ICQKiller

  TCP 7983=Mstream

  TCP 8000=腾讯OICQ服务器端,XDMA

  TCP 8010=Wingate,Logfile

  TCP 8011=WAY2.4

  TCP 8080=WWW 代理,Ring Zero,Chubo,Worm.Novarg.B

  TCP 8102=网络神偷

  TCP 8181=W32.Erkez.D@mm

  TCP 8520=W32.Socay.Worm

  TCP 8594=I-Worm/Bozori.a

  TCP 8787=BackOfrice 2000

  TCP 8888=Winvnc

  TCP 8897=Hack Office,Armageddon

  TCP 8989=Recon

  TCP 9000=Netministrator

  TCP 9325=Mstream

  TCP 9400=InCommand 1.0

  TCP 9401=InCommand 1.0

  TCP 9402=InCommand 1.0

  TCP 9535=Remote Man Server

  TCP 9872=Portal of Doom

  TCP 9873=Portal of Doom

  TCP 9874=Portal of Doom

  TCP 9875=Portal of Doom

  TCP 9876=Cyber Attacker

  TCP 9878=TransScout

  TCP 9989=Ini-Killer

  TCP 9898=Worm.Win32.Dabber.a

  TCP 9999=Prayer Trojan

  TCP 10067=Portal of Doom

  TCP 10080=Worm.Novarg.B

  TCP 10084=Syphillis

  TCP 10085=Syphillis

  TCP 10086=Syphillis

  TCP 10101=BrainSpy

  TCP 10167=Portal Of Doom

  TCP 10168=Worm.Supnot.78858.c,Worm.LovGate.T

  TCP 10520=Acid Shivers

  TCP 10607=Coma trojan

  TCP 10666=Ambush

  TCP 11000=Senna Spy

  TCP 11050=Host Control

  TCP 11051=Host Control

  TCP 11223=Progenic,Hack '99KeyLogger

  TCP 11320=IMIP Channels Port

  TCP 11831=TROJ_LATINUS.SVR

  TCP 12076=Gjamer, MSH.104b

  TCP 12223=Hack'99 KeyLogger

  TCP 12345=GabanBus, NetBus 1.6/1.7, Pie Bill Gates, X-bill

  TCP 12346=GabanBus, NetBus 1.6/1.7, X-bill

  TCP 12349=BioNet

  TCP 12361=Whack-a-mole

  TCP 12362=Whack-a-mole

  TCP 12363=Whack-a-mole

  TCP 12378=W32/Gibe@MM

  TCP 12456=NetBus

  TCP 12623=DUN Control

  TCP 12624=Buttman

  TCP 12631=WhackJob, WhackJob.NB1.7

  TCP 12701=Eclipse2000

  TCP 12754=Mstream

  TCP 13000=Senna Spy

  TCP 13010=Hacker Brazil

  TCP 13013=Psychward

  TCP 13223=Tribal Voice的聊天程序PowWow

  TCP 13700=Kuang2 The Virus

  TCP 14456=Solero

  TCP 14500=PC Invader

  TCP 14501=PC Invader

  TCP 14502=PC Invader

  TCP 14503=PC Invader

  TCP 15000=NetDaemon 1.0

  TCP 15092=Host Control

  TCP 15104=Mstream

  TCP 16484=Mosucker

  TCP 16660=Stacheldraht (DDoS)

  TCP 16772=ICQ Revenge

  TCP 16959=Priority

  TCP 16969=Priority

  TCP 17027=提供广告服务的Conducent"adbot"共享软件

  TCP 17166=Mosaic

  TCP 17300=Kuang2 The Virus

  TCP 17490=CrazyNet

  TCP 17500=CrazyNet

  TCP 17569=Infector 1.4.x + 1.6.x

  TCP 17777=Nephron

  TCP 18753=Shaft (DDoS)

  TCP 19191=蓝色火焰

  TCP 19864=ICQ Revenge

  TCP 20000=Millennium II (GrilFriend)

  TCP 20001=Millennium II (GrilFriend)

  TCP 20002=AcidkoR

  TCP 20034=NetBus 2 Pro

  TCP 20168=Lovgate

  TCP 20203=Logged,Chupacabra

  TCP 20331=Bla

  TCP 20432=Shaft (DDoS)

  TCP 20808=Worm.LovGate.v.QQ

  TCP 21335=Tribal Flood Network,Trinoo

  TCP 21544=Schwindler 1.82,GirlFriend

  TCP 21554=Schwindler 1.82,GirlFriend,Exloiter 1.0.1.2

  TCP 22222=Prosiak,RuX Uploader 2.0

  TCP 22784=Backdoor.Intruzzo

  TCP 23432=Asylum 0.1.3

  TCP 23444=网络公牛

  TCP 23456=Evil FTP, Ugly FTP, WhackJob

  TCP 23476=Donald Dick

  TCP 23477=Donald Dick

  TCP 23777=INet Spy

  TCP 26274=Delta

  TCP 26681=Spy Voice

  TCP 27374=Sub Seven 2.0+, Backdoor.Baste

  TCP 27444=Tribal Flood Network,Trinoo

  TCP 27665=Tribal Flood Network,Trinoo

  TCP 29431=Hack Attack

  TCP 29432=Hack Attack

  TCP 29104=Host Control

  TCP 29559=TROJ_LATINUS.SVR

  TCP 29891=The Unexplained

  TCP 30001=Terr0r32

  TCP 30003=Death,Lamers Death

  TCP 30029=AOL trojan

  TCP 30100=NetSphere 1.27a,NetSphere 1.31

  TCP 30101=NetSphere 1.31,NetSphere 1.27a

  TCP 30102=NetSphere 1.27a,NetSphere 1.31

  TCP 30103=NetSphere 1.31

  TCP 30303=Sockets de Troie

  TCP 30722=W32.Esbot.A

  TCP 30947=Intruse

  TCP 30999=Kuang2

  TCP 31336=Bo Whack

  TCP 31337=Baron Night,BO client,BO2,Bo Facil,BackFire,Back Orifice,DeepBO,Freak2k,NetSpy

  TCP 31338=NetSpy,Back Orifice,DeepBO

  TCP 31339=NetSpy DK

  TCP 31554=Schwindler

  TCP 31666=BOWhack

  TCP 31778=Hack Attack

  TCP 31785=Hack Attack

  TCP 31787=Hack Attack

  TCP 31789=Hack Attack

  更新时间: 200786

  TCP 31791=Hack Attack

  TCP 31792=Hack Attack

  TCP 32100=PeanutBrittle

  TCP 32418=Acid Battery

  TCP 33333=Prosiak,Blakharaz 1.0

  TCP 33577=Son Of Psychward

  TCP 33777=Son Of Psychward

  TCP 33911=Spirit 2001a

  TCP 34324=BigGluck,TN,Tiny Telnet Server

  TCP 34555=Trin00 (Windows) (DDoS)

  TCP 35555=Trin00 (Windows) (DDoS)

  TCP 36794=Worm.Bugbear-A

  TCP 37651=YAT

  TCP 40412=The Spy

  TCP 40421=Agent 40421,Masters Paradise.96

  TCP 40422=Masters Paradise

  TCP 40423=Masters Paradise.97

  TCP 40425=Masters Paradise

  TCP 40426=Masters Paradise 3.x

  TCP 41666=Remote Boot

  TCP 43210=Schoolbus 1.6/2.0

  TCP 44444=Delta Source

  TCP 44445=Happypig

  TCP 45576=未知代理

  TCP 47252=Prosiak

  TCP 47262=Delta

  TCP 47624=Direct Play Server

  TCP 47878=BirdSpy2

  TCP 49301=Online Keylogger

  TCP 50505=Sockets de Troie

  TCP 50766=Fore, Schwindler

  TCP 51966=CafeIni

  TCP 53001=Remote Windows Shutdown

  TCP 53217=Acid Battery 2000

  TCP 54283=Back Door-G, Sub7

  TCP 54320=Back Orifice 2000,Sheep

  TCP 54321=School Bus .69-1.11,Sheep, BO2K

  TCP 57341=NetRaider

  TCP 58008=BackDoor.Tron

  TCP 58009=BackDoor.Tron

  TCP 58339=ButtFunnel

  TCP 59211=BackDoor.DuckToy

  TCP 60000=Deep Throat

  TCP 60068=Xzip 6000068

  TCP 60411=Connection

  TCP 60606=TROJ_BCKDOR.G2.A

  TCP 61466=Telecommando

  TCP 61603=Bunker-kill

  TCP 63485=Bunker-kill

  TCP 65000=Devil, DDoS

  TCP 65432=Th3tr41t0r, The Traitor

  TCP 65530=TROJ_WINMITE.10

  TCP 65535=RC,Adore Worm/Linux

  TCP 69123=ShitHeep

  TCP 88798=Armageddon,Hack Office

  UDP 1=Sockets des Troie

  UDP 9=Chargen

  UDP 19=Chargen

  UDP 69=Pasana

  UDP 80=Penrox

  UDP 371=ClearCase版本管理软件

  UDP 445=公共Internet文件系统(CIFS)

  UDP 500=Internet密钥交换

  UDP 1025=Maverick's Matrix 1.2 - 2.0

  UDP 1026=Remote Explorer 2000

  UDP 1027=HP服务,UC聊天软件,Trojan.Huigezi.e

  UDP 1028=应用层网关服务,KiLo,SubSARI

  UDP 1029=SubSARI

  UDP 1031=Xot

  UDP 1032=Akosch4

  UDP 1104=RexxRave

  UDP 1111=Daodan

  UDP 1116=Lurker

  UDP 1122=Last 2000,Singularity

  UDP 1183=Cyn,SweetHeart

  UDP 1200=NoBackO

  UDP 1201=NoBackO

  UDP 1342=BLA trojan

  UDP 1344=Ptakks

  UDP 1349=BO dll

  UDP 1512=Microsoft Windows Internet Name Service

  UDP 1561=MuSka52

  UDP 1772=NetControle

  UDP 1801=Microsoft Message Queue

  UDP 1978=Slapper

  UDP 1985=Black Diver

  UDP 2000=A-trojan,Fear,Force,GOTHIC Intruder,Last 2000,Real 2000

  UDP 2001=Scalper

  UDP 2002=Slapper

  UDP 2015=raid-cs

  UDP 2018=rellpack

  UDP 2130=Mini BackLash

  UDP 2140=Deep Throat,Foreplay,The Invasor

  UDP 2222=SweetHeart,Way,Backdoor/Mifeng.t

  UDP 2234=DirectPlay

  UDP 2339=Voice Spy

  UDP 2702=Black Diver

  UDP 2989=RAT

  UDP 3074=Microsoft Xbox game port

  UDP 3132=Microsoft Business Rule Engine Update Service

  UDP 3150=Deep Throat

  UDP 3215=XHX

  UDP 3268=Microsoft Global Catalog

  UDP 3269=Microsoft Global Catalog with LDAP/SSL

  UDP 3333=Daodan

  UDP 3535=Microsoft Class Server

  UDP 3801=Eclypse

  UDP 3996=Remote Anything

  UDP 4128=RedShad

  UDP 4156=Slapper

  UDP 4350=Net Device

  UDP 4500=Microsoft IPsec NAT-T, sae-urn

  UDP 5419=DarkSky

  UDP 5503=Remote Shell Trojan

  UDP 5555=Daodan

  UDP 5678=Remote Replication Agent Connection

  UDP 5679=Direct Cable Connect Manager

  UDP 5720=Microsoft Licensing

  UDP 5882=Y3K RAT

  UDP 5888=Y3K RAT

  UDP 6073=DirectPlay8

  UDP 6112=Battle.net Game

  UDP 6666=KiLo

  UDP 6667=KiLo

  UDP 6766=KiLo

  UDP 6767=KiLo,UandMe

  UDP 6838=Mstream Agent-handler

  UDP 7028=未知木马

  UDP 7424=Host Control

  UDP 7788=Singularity

  UDP 7983=MStream handler-agent

  UDP 8012=Ptakks

  UDP 8090=Aphex's Remote Packet Sniffer

  UDP 8127=9_119,Chonker

  UDP 8488=KiLo

  UDP 8489=KiLo

  UDP 8787=BackOrifice 2000

  UDP 8879=BackOrifice 2000

  UDP 9325=MStream Agent-handler

  UDP 10000=XHX

  UDP 10067=Portal of Doom

  UDP 10084=Syphillis

  UDP 10100=Slapper

  UDP 10167=Portal of Doom

  UDP 10498=Mstream

  UDP 10666=Ambush

  UDP 11225=Cyn

  UDP 12321=Protoss

  UDP 12345=BlueIce 2000

  UDP 12378=W32/Gibe@MM

  UDP 12623=ButtMan,DUN Control

  UDP 11320=IMIP Channels Port

  UDP 15210=UDP remote shell backdoor server

  UDP 15486=KiLo

  UDP 16514=KiLo

  UDP 16515=KiLo

  UDP 18753=Shaft handler to Agent

  UDP 20433=Shaft

  UDP 21554=GirlFriend

  UDP 22784=Backdoor.Intruzzo

  UDP 23476=Donald Dick

  UDP 25123=MOTD

  UDP 26274=Delta Source

  UDP 26374=Sub-7 2.1

  UDP 26444=Trin00/TFN2K

  UDP 26573=Sub-7 2.1

  UDP 27184=Alvgus trojan 2000

  UDP 27444=Trinoo

  UDP 29589=KiLo

  UDP 29891=The Unexplained

  UDP 30103=NetSphere

  UDP 31320=Little Witch

  UDP 31335=Trin00 DoS Attack

  UDP 31337=Baron Night, BO client, BO2, Bo Facil, BackFire, Back Orifice, DeepBO

  UDP 31338=Back Orifice, NetSpy DK, DeepBO

  UDP 31339=Little Witch

  UDP 31340=Little Witch

  UDP 31416=Lithium

  UDP 31787=Hack aTack

  UDP 31789=Hack aTack

  UDP 31790=Hack aTack

  UDP 31791=Hack aTack

  UDP 33390=未知木马

  UDP 34555=Trinoo

  UDP 35555=Trinoo

  UDP 43720=KiLo

  UDP 44014=Iani

  UDP 44767=School Bus

  UDP 46666=Taskman

  UDP 47262=Delta Source

  UDP 47624=Direct Play Server

  UDP 47785=KiLo

  UDP 49301=OnLine keyLogger

  UDP 49683=Fenster

  UDP 49698=KiLo

  UDP 52901=Omega

  UDP 54320=Back Orifice

  UDP 54321=Back Orifice 2000

  UDP 54341=NetRaider Trojan

  UDP 61746=KiLO

  UDP 61747=KiLO

  UDP 61748=KiLO

  UDP 65432=The Traitor

[编辑本段]

怎样查看端口

  一台服务器有大量的端口在使用,怎么来查看端口呢?有两种方式: 一种是利用系统内置的命令,一种是利用第三方端口扫描软件。

  1.“netstat an”查看端口状态

  在Windows 2000/XP中,可以在命令提示符下使用“netstat -an” 看系统端口状态,可以列出系统正在开放的端口号及其状态.

  2.用第三方端口扫描软件

  第三方端口扫描软件有许多,界面虽然千差万别,但是功能却是类似 的。这里以“Fport” (可到http://www.ccert.edu.cn/tools/index.php?type_t=7http://www.cci dnet.com/soft/cce下载)为例讲解。“Fport”在命令提示符下使用,运行结果 “netstat -an”相似,但是它不仅能够列出正在使用的端口号及类型,还可 以列出端口被哪个应用程序使用。

  3.“netstat -n”命令,以数字格式显示地址和端口信息。

[编辑本段]

端口号很多是奇数的原因

6、    如果仔细检查这些标准的简单服务以及其他标准的TCP/IP服务(如TelnetFTP SMTP等)的端口号时,我们发现它们都是奇数。这是有历史原因的,因为这些端口号都是从NCP端口号派生出来的(NCP,即网络控制协议,是ARPANET的运输层协议,是TCP的前身)。NCP是半双工的,不是全双工的,因此每个应用程序需要两个连接,需预留一对奇数和偶数端口号。当TCPUDP成为标准的运输层协议时,每个应用程序只需要一个端口号,因此就使用了NCP中的奇数。

7、