Port 31337 Information

Share on:

Information about Port 31337

  • This is a collection of basic information about port 31337 gathered from various sources, including TCP and UDP services as well as the number of source and target IPs attacked on these ports. This information is up to date as of 2020-12-08.

tcp

  • cred0Back
  • Orifice
  • -
  • remote
  • administration
  • tool
  • (often
  • Trojan
  • horse)
  • (Unofficial)
  • cred0[threat]
  • BO
  • Facil
  • cred0[threat]
  • BO
  • client
  • cred0[threat]
  • BO
  • spy
  • cred0[threat]
  • BO2
  • cred0[threat]
  • Back
  • Fire
  • cred0[threat]
  • Back
  • Orifice
  • cred0[threat]
  • Back
  • Orifice
  • 1.20
  • patches
  • cred0[threat]
  • Back
  • Orifice
  • russian
  • cred0[threat]
  • Baron
  • Night
  • cred0[threat]
  • Beeone
  • cred0[threat]
  • Emcommander
  • cred0[threat]
  • Freak2k
  • cred0[threat]
  • Freak88
  • cred0[threat]
  • Sockdmini
  • cred0[threat]
  • W32.HLLW.Gool
  • cred0[threat]
  • cron
  • /
  • crontab
  • cred0[threat]
  • icmp_pipe.c
  • cred0[trojan]
  • ADM
  • worm
  • cred0[trojan]
  • ADM
  • worm.
  • Worm
  • /
  • Rootkit
  • /
  • Backdoor.
  • Works
  • on
  • Unix
  • (Linux).
  • Affects
  • Linux
  • RedHat
  • 4.0
  • to
  • 5.2.
  • Aliases:
  • ADM
  • Inet
  • w0rm,
  • Linux.ADM.Worm
  • cred0[trojan]
  • BO
  • Facil
  • cred0[trojan]
  • BO
  • Facil.
  • Works
  • on
  • Windows
  • 95
  • and
  • 98.
  • Aliases:
  • Back
  • Orifice
  • Facil
  • cred0[trojan]
  • BO
  • client
  • cred0[trojan]
  • BO
  • client.
  • Works
  • on
  • Windows
  • 95
  • and
  • 98.
  • BO
  • client
  • is
  • using
  • the
  • ordinary
  • BO
  • server.
  • cred0[trojan]
  • BO
  • spy
  • cred0[trojan]
  • BO2
  • cred0[trojan]
  • BO2.
  • Remote
  • Access.
  • Works
  • on
  • Windows
  • 95
  • and
  • 98.
  • Bo2
  • is
  • a
  • Back
  • Orifice
  • client
  • application.
  • cred0[trojan]
  • Back
  • Fire
  • cred0[trojan]
  • Back
  • Fire.
  • Remote
  • Access.
  • Works
  • on
  • Windows
  • 95
  • and
  • 98.
  • cred0[trojan]
  • Back
  • Orifice
  • (Lm)
  • cred0[trojan]
  • Back
  • Orifice
  • (Lm).
  • Remote
  • Access.
  • Works
  • on
  • Windows
  • 95
  • and
  • 98.
  • cred0[trojan]
  • Back
  • Orifice
  • 1.20
  • patches
  • cred0[trojan]
  • Back
  • Orifice
  • russian
  • cred0[trojan]
  • Back
  • Orifice
  • russian.
  • Remote
  • Access.
  • Works
  • on
  • Windows
  • 95
  • and
  • 98.
  • cred0[trojan]
  • Baron
  • Night
  • cred0[trojan]
  • Beeone
  • cred0[trojan]
  • BlitzNet.
  • IRC
  • trojan
  • /
  • DoS
  • tool.
  • Works
  • on
  • Unix
  • (Linux).
  • cred0[trojan]
  • Deep
  • BO
  • cred0[trojan]
  • Freak2k
  • cred0[trojan]
  • Freak2k.
  • Distributed
  • DoS
  • tool.
  • Works
  • on
  • Windows
  • 95,
  • 98
  • and
  • NT.
  • Aliases:
  • Freak
  • 2000
  • cred0[trojan]
  • Freak88
  • cred0[trojan]
  • Freak88.
  • Distributed
  • DoS
  • tool.
  • Works
  • on
  • Windows
  • 95,
  • 98
  • and
  • NT.
  • Aliases:
  • Freak
  • 2000
  • cred0[trojan]
  • Gummo
  • cred0[trojan]
  • Linux
  • Rootkit
  • IV
  • cred0[trojan]
  • NoBackO.
  • Remote
  • Access
  • /
  • Sniffer.
  • Works
  • on
  • Windows.
  • cred0[trojan]
  • bindshell
  • cred0[trojan]
  • cron
  • /
  • crontab
  • cred0[trojan]
  • icmp_pipe.c
  • ADMworm
  • BO2
  • BOFacil
  • BOclient
  • BOspy
  • BackFire
  • BackOrifice(Lm)
  • BackOrifice1.20patches
  • BackOrificerussian
  • BaronNight
  • Beeone
  • DeepBO
  • Elite
  • Freak2k
  • Freak88
  • Gummo
  • LinuxRootkitIV
  • Sometimes
  • interesting
  • stuff
  • can
  • be
  • found
  • here
  • here
  • Unassigned
  • bindshell
  • cron/crontab
  • icmp_pipe.c

udp

  • cred0[threat]
  • Back
  • Orifice
  • cred0[threat]
  • Back
  • Orifice
  • 1.20
  • patches
  • cred0[threat]
  • Back
  • Orifice
  • russian
  • cred0[threat]
  • Baron
  • Night
  • BackOrifice
  • Sometimes
  • interesting
  • stuff
  • can
  • be
  • found
  • here
  • here
  • Unassigned

sources

  • 26

targets

  • 3

etopensource

  • ET_EXPLOIT_malformed_Sack_-_Snort_DoS-by-$um$id

    Known applications

  • Dangerous Driving
  • Epic Games Launcher