Threat Level: green Handler on Duty: Guy Bruneau

SANS ISC: Port 4444 (tcp/udp) Attack Activity - Internet Security | DShield Port 4444 (tcp/udp) Attack Activity


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
[get complete service list]
Port Information
Protocol Service Name
tcp metasploit Metasploit default listener
tcp CrackDown [trojan] CrackDown
tcp krb524 KRB524
tcp nv-video NV Video default
tcp Prosiak [trojan] Prosiak
tcp SwiftRemote [trojan] Swift Remote
udp krb524 krb524
udp nv-video NV Video default
tcp sophosfw Admin port for some Sophos Firewalls
Top IPs Scanning
TodayYesterday
103.228.110.55 (1422)89.248.168.176 (4447)
185.156.177.252 (576)51.91.212.81 (201)
179.43.143.149 (379)212.60.5.8 (192)
23.247.118.11 (191)82.102.173.67 (190)
185.153.196.143 (64)92.119.160.6 (190)
66.240.205.34 (50)66.240.205.34 (168)
81.22.45.39 (43)185.153.196.143 (154)
82.102.173.67 (36)81.22.45.10 (149)
198.108.67.48 (30)106.75.7.109 (138)
92.119.160.6 (28)185.153.196.191 (122)
User Comments
Submitted By Date
Comment
2007-08-11 14:29:19
ktorrent (UDP) (default)
Joel Esler 2003-12-17 17:39:44
This is port is a common return port for the rpc dcom.c buffer overflow. Also the return port in the msblast rpc worm.
2003-08-13 04:37:38
used by the msblast worm to bind a shell
Add a comment
CVE Links
CVE # Description