Loading...
[get complete service list]
Port Information
Protocol Service Name
udp globe globe
udp slapper Slaper Worm P2P Backdoor
tcp globe globe
tcp TransScout [trojan] TransScout
udp p2p Apache/mod_ssl Worm
Top IPs Scanning
Today Yesterday
45.227.253.130 (42)185.161.248.120 (263)
143.42.1.189 (40)45.227.253.130 (104)
143.42.227.223 (18)54.175.125.226 (50)
139.144.239.185 (16)96.9.212.203 (25)
143.198.215.154 (13)64.39.106.64 (16)
115.231.78.5 (12)118.123.105.85 (13)
162.216.18.241 (11)115.231.78.3 (13)
167.94.146.58 (10)185.114.175.11 (11)
38.110.46.254 (9)104.156.155.10 (11)
97.107.139.247 (9)198.235.24.8 (10)
User Comments
Submitted By Date
Comment
Roy Erez 2008-04-29 18:21:59
logmein https server, allows remote control of windows machines
Roy Erez 2007-12-07 16:01:30
logmein https server, allows remote control of windows machines
Johannes Ullrich 2002-10-10 17:21:20
udp traffic on port 2002 is used to control the 'Slapper Worm' P2P network. Characteristic for this traffic is that port 2002 is used as source and target port. Even after a slapper infected host is cleaned up, you will see port 2002 traffic for quite a while. The P2P network will still try to connect to the host for a long time after it has been cleaned up, similar to the 'afterglow' seen with other P2P networks.
CVE Links
CVE # Description