Loading...
[get complete service list]
Port Information
Protocol Service Name
tcp auth ident tap Authentication Service
udp auth ident tap Authentication Service
tcp ident ,,,,,,,,
tcp InvisibleIdentdDaemon [trojan] Invisible Identd Daemon
tcp InvisibleIdentdDeamon [trojan] Invisible Identd Deamon
tcp Kazimas [trojan] Kazimas
tcp korgo [trojan] W32.Korgo.A and B
tcp BackDoor-AUZ [trojan] BackDoor-AUZ
Top IPs Scanning
Today Yesterday
45.84.89.2 (286)45.84.89.2 (472)
3.144.120.14 (42)195.230.103.243 (69)
3.141.153.201 (28)195.230.103.242 (69)
3.144.120.21 (21)195.230.103.244 (63)
3.14.73.254 (14)195.230.103.246 (57)
18.221.214.151 (14)195.230.103.249 (52)
3.17.206.73 (14)195.230.103.247 (48)
3.23.59.18 (14)195.230.103.250 (47)
18.218.94.172 (14)195.230.103.245 (47)
167.94.138.48 (9)195.230.103.248 (43)
User Comments
Submitted By Date
Comment
mik 2006-03-04 03:03:14
Sendmail will, by default, use an ident probe to gather additional information on any incoming message connection. While sendmail can be configured to not do this, the combination of this default behavior and many (erroneous) reports of port 113 probes from known mailservers suggests that perhaps the utility of this check is too low, leading to too many false positives (IMHO).
2004-05-13 05:50:34
It's apparently one of 3 p2p clients: http://www.slyck.com/mp2p.php I'm trying to figuring out what's going on. During the day I have up to 20 different machines trying to connect every few seconds on port 41170. Everything is getting blocked and I'm wondering if someone could be running one of these clients from the inside. I haven't seen anything going out on this port, but they could be tunnelling through port 80. It's buggin' me.
George Assai 2004-01-30 19:54:22
BKDR_GRASKET.A http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_GRASKET.A The backdoor malware has a server component and a client component. Its server component listens to a port 113 or a random port for connections from the client component. The server also notifies the hacker at a port 6667 and continues to do this until a connection is established. The server component allows the user of the client component, which is usually a hacker, to send commands for it to execute on the target system. This backdoor malware also enables the client component to access local Server databases and launch scanning for all open ports on a range of IP addresses.
A friend :) 2003-12-18 03:09:28
We found a Trojan identified by McAfee as IRC/Flood.cd.dr listening on this port recently. Pid Process Port Proto Path 1352 h00d -> 113 TCP C:\winnt\system32\have\h00d.exe It was also on; 1352 h00d -> 1076 TCP C:\winnt\system32\have\h00d.exe 1352 h00d -> 7683 TCP C:\winnt\system32\have\h00d.exe There were other files hidden within the same folder.
Joshua Hudson 2003-03-21 00:43:55
As scanning on this port is very unlikely to turn up volunerable identd services, it is more likely that scans on this port are used to identify other vulnerable services that have been configured to run as root.
Johannes Ullrich 2003-01-29 22:14:15
identd is a simple service to authenticate remote users. It can query which user on a remote system attempts to establish a connection. This service is clear text and no longer in wide use. However, many mail servers will still query it. Some IRC servers use it to verify the userid.
CVE Links
CVE # Description