Threats to your Security on the Internet in particular the Current list of Trojans provides an excellent description of various trojan programsĪndrew Daviel's Internet ports, services and trojans has lots of good linksĪdvICE:Exploits:Ports a nice hyperlinked port list ONCTek List of possible Trojan/Backdoor port activity Trojan list database with many different sorting optionsĭenial of Service Help: Trojan Ports to Block hyperlinked port list See below if you have Questions.įirewalls: What am I seeing? is an excellent must-read FAQ on what kind of probes you may be seeing on different ports. Please contact me with any suggestions, corrections, or comments. I have placed a particular emphasis on home broadband network security. I have found many much better resources for trojan and insecure ports, so instead of trying to list every port here, I am just going to provide links to some sites with good lists, as well as a variety of other security resources. Please note that unfortunately, trojans can use the same port number as legitimate services therefore, just because a port shows up, it doesn't necessarily mean that it has been trojanized. These are ports that you definitely want closed, possibly with firewall alarms set on them to detect any external probes or internal compromise. This page documents DANGEROUS TCP/IP ports, that are used by trojan horse and backdoor programs or that expose system vulnerabilities, that hackers use to break into your network.
That page lists ports that you might want to open or be aware of in order to use various Internet services. This page is a companion to my main TCP/IP Ports table. Internet Service Providers - Free Software