Loading...
[get complete service list]
Port Information
Protocol Service Name
udp ftp File Transfer [Control]
tcp ftp File Transfer [Control]
tcp NetAdministrator [trojan] Net Administrator
tcp Ramen [trojan] Ramen
tcp RTB666 [trojan] RTB 666
tcp SennaSpyFTPserver [trojan] Senna Spy FTP server
tcp Traitor21 [trojan] Traitor 21
tcp [trojan]TheFlu [trojan] The Flu
tcp WebEx [trojan] WebEx
tcp WinCrash [trojan] WinCrash
tcp AudioGalaxy AudioGalaxy file sharing app
tcp MotIvFTP [trojan] MotIv FTP
tcp Larva [trojan] Larva
tcp BladeRunner [trojan] BladeRunner
tcp CattivikFTPServer [trojan] Cattivik FTP Server
tcp CCInvader [trojan] CC Invader
tcp DarkFTP [trojan] Dark FTP
tcp DolyTrojan [trojan] Doly Trojan
tcp Fore [trojan] Fore
tcp FreddyK [trojan] FreddyK
tcp InvisibleFTP [trojan] Invisible FTP
tcp Juggernaut42 [trojan] Juggernaut 42
tcp BackConstruction [trojan] Back Construction
Top IPs Scanning
Today Yesterday
Port diary mentions
URL
Distributed FTPPort 21 scan follow-up; Port 23 scan increases;
FTP Vulnerability & Accompanying Activity
FTP-Brute Force Attacks and Password Management
User Comments
Submitted By Date
Comment
Johannes Ullrich 2007-02-12 12:31:02
A new very trivial exploit for telnet on Solaris 10/11 was made public Feb. 11th 2007.
CVE Links
CVE # Description
CVE-2014-7169