Loading...
[get complete service list]
Port Information
Protocol Service Name
tcp https HTTP protocol over TLS SSL
udp https HTTP protocol over TLS/SSL
TCP [ICS] OPC UA XML [ICS] OPC UA XML
Top IPs Scanning
TodayYesterday
5.9.28.205 (526)5.9.28.205 (43557)
45.190.200.0 (287)97.85.120.211 (3595)
51.158.185.213 (145)90.216.246.231 (2371)
51.15.100.18 (141)183.136.225.35 (2019)
51.158.173.147 (105)135.148.132.40 (1892)
66.29.129.200 (91)52.215.249.75 (1887)
185.7.214.117 (83)34.246.4.96 (1486)
149.3.170.246 (74)45.95.147.52 (1447)
178.73.215.171 (73)194.103.3.251 (1423)
51.178.47.191 (65)66.29.129.200 (1374)
Port diary mentions
URL
LSASS exploit, SSL PCT exploits, port 559 (tcp) proxy hunter, Bagle.Z
Increased SSL Activity; Exploits for MS04-022; Mailbag
Quiet Day;TCP443; Firefox GIF image handling heap overflow exploit; MS javaprxy.dll update
port 443 https increase
User Comments
Submitted By Date
Comment
Sunny Dhbahai 2013-03-05 13:43:50
Redis Server Port which client can run queries. Default Port Exposed to Internet Could Face Brute Force Attacks. Nmap Brute Force Script For Radis: http://nmap.org/nsedoc/scripts/redis-brute.html
Alexander Dupuy 2010-11-23 14:17:15
UDP/443 is typically Skype traffic. From http://download.skype.com/share/business/guides/skype-it-administrators-guide.pdf (p.10 section 2.1.2 Operations): "It also uses UDP 443 to test network connectivity." These network probes typically have 18 byte payloads from the client (dst port UDP/443) and 26 byte payloads from the server (src port UDP/443)
Add a comment
CVE Links
CVE # Description
CVE-2014-0160
CVE-2014-0224 OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
CVE-2014-6321
CVE-2016-8610