Port 443 Information

Share on:

Information about Port 443

  • This is a collection of basic information about port 443 gathered from various sources, including TCP and UDP services as well as the number of source and target IPs attacked on these ports. This information is up to date as of 2020-12-16.

Description

  • http protocol over TLS/SSL

RFC

tcp

  • Bubba_Server
  • GoFlex_Home_Server
  • LaCiE_HipServ
  • PokerStars
  • QNAP
  • https

udp

  • https

trojans

  • Slappertd
  • trojantd

sources

  • 1608

targets

  • 627

etopensource

  • ET_ADWARE_PUP_Carder_Card_Checking_Tool_try2check.me_SSL_Certificate
  • ET_EXPLOIT_KIT_CottonCastle/Niteris_EK_Landing_Aug_17_2015
  • ET_EXPLOIT_KIT_CottonCastle/Niteris_EK_Secondary_Landing_Aug_17_2015
  • ET_EXPLOIT_KIT_SSL_Cert_Used_In_Unknown_Exploit_Kit_(ashburn)
  • ET_EXPLOIT_KIT_Self-Signed_SSL_Cert_Used_in_Conjunction_with_Neosploit
  • ET_HUNTING_SUSPICIOUS_OVH_Shared_Host_SSL_Certificate_(Observed_In_Use_by_Some_Trojans)
  • ET_HUNTING_Suspicious_Self_Signed_SSL_Certificate_CN_of_common_Possible_SSL_CnC
  • ET_HUNTING_Suspicious_Self_Signed_SSL_Certificate_with_admin@common_Possible_SSL_CnC
  • ET_INFO_BrowseTor_.onion_Proxy_Service_SSL_Cert
  • ET_INFO_Possible_TURKTRUST_Spoofed_Google_Cert
  • ET_INFO_Suspicious_Self_Signed_SSL_Certificate_to_‘My_Company_Ltd’
  • ET_INFO_Tor2Web_.onion_Proxy_Service_SSL_Cert_(1)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_Certificate_Detected_(Shifu)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Bancos/DarkTequila_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(BlackEnergy_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Chthonic_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(CryptoLocker_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Downloader.Pony_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Downloader_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Dridex_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Dyre_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(FindPOS_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Flokibot_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Gozi)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Gozi_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Gozi_MITM)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(KINS_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Kasidet_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Malware_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(ProxyChanger)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Qadars_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Qadars_MITM)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Quakbot_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Ransomware_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Redyms_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Retefe_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(RockLoader_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Rovnix_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Shifu)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Shifu_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Spy.Shiz_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(TeslaCrypt_MITM)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(TorrentLocker_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Ursnif_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Ursnif_Injects)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Vawtrak_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Yakes_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(ZeuS_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Blacklist_Malicious_SSL_certificate_detected_(Zeus_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Fingerprint_Blacklist_Malicious_SSL_Certificate_Detected_(Adwind)
  • ET_MALWARE_ABUSE.CH_SSL_Fingerprint_Blacklist_Malicious_SSL_Certificate_Detected_(Android_Marcher_C2)
  • ET_MALWARE_ABUSE.CH_SSL_Fingerprint_Blacklist_Malicious_SSL_Certificate_Detected_(Chthonic_MITM)
  • ET_MALWARE_ABUSE.CH_SSL_Fingerprint_Blacklist_Malicious_SSL_Certificate_Detected_(Gootkit_C2)
  • ET_MALWARE_ABUSE.CH_SSL_Fingerprint_Blacklist_Malicious_SSL_Certificate_Detected_(Gozi_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Fingerprint_Blacklist_Malicious_SSL_Certificate_Detected_(Gozi_MITM)
  • ET_MALWARE_ABUSE.CH_SSL_Fingerprint_Blacklist_Malicious_SSL_Certificate_Detected_(Malware_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Fingerprint_Blacklist_Malicious_SSL_Certificate_Detected_(Quakbot_CnC)
  • ET_MALWARE_ABUSE.CH_SSL_Fingerprint_Blacklist_Malicious_SSL_Certificate_Detected_(Tuhkit_C2)
  • ET_MALWARE_ABUSE.CH_SSL_Fingerprint_Blacklist_Malicious_SSL_Certificate_Detected_(URLzone)
  • ET_MALWARE_ABUSE.CH_SSL_Fingerprint_Blacklist_Malicious_SSL_Certificate_Detected_(ZeusPanda_MITM)
  • ET_MALWARE_APT29_Cache_DLL_SSL_Cert
  • ET_MALWARE_AnubisNetworks_Sinkhole_SSL_Cert_lolcat_-_specific_IPs
  • ET_MALWARE_Aurora_Backdoor_(C&C)_connection_CnC_response
  • ET_MALWARE_Bedep_SSL_Cert
  • ET_MALWARE_BitCrypt_site_accessed_via_.onion_SSL_Proxy
  • ET_MALWARE_CozyDuke_APT_Possible_SSL_Cert_1
  • ET_MALWARE_CozyDuke_APT_Possible_SSL_Cert_2
  • ET_MALWARE_CozyDuke_APT_Possible_SSL_Cert_3
  • ET_MALWARE_CozyDuke_APT_Possible_SSL_Cert_4
  • ET_MALWARE_CozyDuke_APT_Possible_SSL_Cert_5
  • ET_MALWARE_CozyDuke_APT_Possible_SSL_Cert_6
  • ET_MALWARE_Downloader.Win32.Tesch.A_Bot_Command_(Proxy_command)
  • ET_MALWARE_Downloader.Win32.Tesch.A_Server_CnC_Checkin_Reply
  • ET_MALWARE_Downloader.Win32.Tesch.A_Server_CnC_Sending_Executable
  • ET_MALWARE_Downloader.Win32.Tesch.A_Server_Command_(Confirm_C2_IP_and_port)
  • ET_MALWARE_Downloader.Win32.Tesch.A_Server_Command_(Confirm_C2_IP_and_port)_2
  • ET_MALWARE_Downloader.Win32.Tesch.A_Server_Command_(bot_is_ready_to_start_receiving_commands)
  • ET_MALWARE_EMAIL_SSL_Cert_APT1
  • ET_MALWARE_FAKE_AOL_SSL_Cert_APT1
  • ET_MALWARE_FAKE_YAHOO_SSL_Cert_APT1
  • ET_MALWARE_Fake_IBM_SSL_Cert_APT1
  • ET_MALWARE_Fake_Virtually_SSL_Cert_APT1
  • ET_MALWARE_Greencat_SSL_Certificate
  • ET_MALWARE_LAME_SSL_Cert_APT1
  • ET_MALWARE_MAGICHOUND.FETCH_SSL_Cert
  • ET_MALWARE_MSIL/May_Ransomware_SSL_Cert_Observed
  • ET_MALWARE_Malicious_SSL_Cert_(KINS_C2)
  • ET_MALWARE_Malicious_SSL_certificate_detected_(FindPOS)
  • ET_MALWARE_Malicious_SSL_certificate_detected_(Geodo_MITM)
  • ET_MALWARE_Malicious_SSL_certificate_detected_(OSX/Keydnap_CnC)
  • ET_MALWARE_Malicious_SSL_certificate_detected_(Possible_Sinkhole)
  • ET_MALWARE_Malicious_SSL_certificate_detected_(Spy.Shiz_CnC)
  • ET_MALWARE_Malicious_SSL_certificate_detected_(Ursnif_Injects)
  • ET_MALWARE_NS_SSL_Cert_APT1
  • ET_MALWARE_Observed_Malicious_SSL_Cert_(FlokiBot_CnC)
  • ET_MALWARE_Observed_Malicious_SSL_cert_(pyteHole_Ransomware)
  • ET_MALWARE_Possible_Dyre_SSL_Cert_Sept_26_2014
  • ET_MALWARE_Possible_OceanLotus_CnC_Heartbeat
  • ET_MALWARE_Possible_Upatre_Downloader_SSL_certificate
  • ET_MALWARE_Possible_Upatre_Downloader_SSL_certificate_(fake_loc)
  • ET_MALWARE_Possible_Upatre_SSL_Cert
  • ET_MALWARE_Possible_Upatre_SSL_Cert_999servers.com
  • ET_MALWARE_Possible_Upatre_SSL_Cert_July_14_2014
  • ET_MALWARE_Possible_Upatre_SSL_Cert_acesecureshop.com
  • ET_MALWARE_Possible_Upatre_SSL_Cert_deslematin.ca
  • ET_MALWARE_Possible_Upatre_SSL_Cert_faithmentoringandmore.com
  • ET_MALWARE_Possible_Upatre_SSL_Cert_karinejoncas.com
  • ET_MALWARE_Possible_Upatre_SSL_Cert_new-install.privatedns.com
  • ET_MALWARE_Possible_Upatre_SSL_Cert_webhostingpad.com
  • ET_MALWARE_Possible_Upatre_SSL_Compromised_site_dfsdirect.ca
  • ET_MALWARE_Possible_Upatre_SSL_Compromised_site_iclasshd.net
  • ET_MALWARE_Possible_Upatre_SSL_Compromised_site_sabzevarsez.com
  • ET_MALWARE_Possible_Updatre_SSL_Certificate_cardiffpower
  • ET_MALWARE_Potential_Sefnit_C2traffic(from_server)
  • ET_MALWARE_Qadars_WebInject_SSL_Cert
  • ET_MALWARE_SERVER_SSL_Cert_APT1
  • ET_MALWARE_SSL_Cert_Associated_with_Lazarus_Downloader_(JEUSD)
  • ET_MALWARE_SSL_Cert_Observed_with_Unkown_Trojan_(statswas)
  • ET_MALWARE_SSL_Cert_Used_In_Unknown_Exploit_Kit
  • ET_MALWARE_STARSYPOUND_Client_Checkin
  • ET_MALWARE_SUR_SSL_Cert_APT1
  • ET_MALWARE_Saturn_Proxy_C&C_Activity
  • ET_MALWARE_Self-Signed_Cert_Observed_in_Various_Zbot_Strains
  • ET_MALWARE_Self_Signed_SSL_Certificate_(John_Doe)
  • ET_MALWARE_Self_Signed_SSL_Certificate_(Reaserch)
  • ET_MALWARE_Sykipot_SSL_Certificate_serial_number_detected
  • ET_MALWARE_Sykipot_SSL_Certificate_subject_emailAddress_detected
  • ET_MALWARE_TDLv4_SSL_Cert
  • ET_MALWARE_Torrentlocker_C2_SSL_cert
  • ET_MALWARE_Upatre_Compromised_Site_hot-buys
  • ET_MALWARE_Upatre_SSL_Cert_July_7_2014
  • ET_MALWARE_Upatre_SSL_Cert_May_20_2014
  • ET_MALWARE_Upatre_SSL_Compromised_site_appsredeeem
  • ET_MALWARE_Upatre_SSL_Compromised_site_kionic
  • ET_MALWARE_Upatre_SSL_Compromised_site_potpourriflowers
  • ET_MALWARE_Upatre_SSL_Compromised_site_trudeausociety
  • ET_MALWARE_Win32.Onlinegames.ajok_CnC_Packet_from_Server
  • ET_MALWARE_Winlock.6870_SSL_Cert
  • ET_MALWARE_Winlock/Torrentlocker_SSL_Cert
  • ET_MALWARE_Zbot_Variant_SSL_cert_for_anlogtewron.ru
  • ET_MALWARE_Zbot_Variant_SSL_cert_for_dewart.ru
  • ET_MALWARE_Zbot_Variant_SSL_cert_for_erjentronem.ru
  • ET_MALWARE_Zbot_Variant_SSL_cert_for_whoismama.ru
  • ET_MALWARE_Zeus_OPENSSL_Banker_Malicious_SSL_Certificate_Detected
  • ET_MALWARE_[PTsecurity]Malicious_SSL_connection(Upatre_Downloader_CnC)_2
  • ET_MALWARE_[PTsecurity]Malicious_SSL_connection(Upatre_Downloader_CnC)_3
  • ET_MALWARE_[PTsecurity]Malicious_SSL_connection(Upatre_Downloader_CnC)_4
  • ET_MALWARE_[PTsecurity]Malicious_SSL_connection(Upatre_Downloader_CnC)_5
  • ET_MALWARE_[PTsecurity]Malicious_SSL_connection(Upatre_Downloader_CnC)_cert
  • ET_P2P_MS_Foldershare_Login_Detected
  • ET_POLICY_DivX_Client_SSL_Connection_via_Self-Signed_SSL_Cert
  • ET_POLICY_DropBox_User_Content_Access_over_SSL
  • ET_POLICY_Dropbox.com_Offsite_File_Backup_in_Use
  • ET_POLICY_Free_SSL_Certificate_(StartCom_Free_Certificate_Member)
  • ET_POLICY_Free_SSL_Certificate_Provider_(StartCom_Class_1_Primary_Intermediate_Server_CA)
  • ET_POLICY_Lets_Encrypt_Free_SSL_Cert_Observed
  • ET_POLICY_Logmein.com/Join.me_SSL_Remote_Control_Access
  • ET_POLICY_Microsoft_Online_Storage_Client_Hello_TLSv1Possible_OneDrive(storage.live_.com)
  • ET_POLICY_Microsoft_Online_Storage_Client_Hello_TLSv1Possible_OneDrive(storage.msn_.com)
  • ET_POLICY_Nessus_Vulnerability_Scanner_Plugins_Update
  • ET_POLICY_OpenSSL_Demo_CA_-Cryptsoft_Pty(CN)
  • ET_POLICY_OpenSSL_Demo_CA_-Cryptsoft_Pty(O)
  • ET_POLICY_OpenSSL_Demo_CA_-Internet_Widgits_Pty(CN)
  • ET_POLICY_OpenSSL_Demo_Cert_Exchange
  • ET_POLICY_PTsecurity_Remote_Desktop_AeroAdmin_Server_Hello
  • ET_POLICY_Remote_Access_-RView-_SSL_Certificate_Seen
  • ET_POLICY_SSH_banner_detected_on_TCP_443_likely_proxy_evasion
  • ET_POLICY_Self_Signed_SSL_Certificate_(Persona_Not_Validated)
  • ET_POLICY_Self_Signed_SSL_Certificate_(Snake_Oil_CA)
  • ET_POLICY_route1.com_SSL_certificate_for_remote_access_detected

CVEs Associated with Port 443

CVE-2017-6869 CVE-2017-6873 CVE-2018-13807 CVE-2018-13814 CVE-2019-10931 CVE-2019-13925 CVE-2019-13926 cves.sh CVE-2008-0401 CVE-2008-2058 CVE-2011-3305 CVE-2016-3963 CVE-2016-8673 CVE-2018-11447 CVE-2018-11448 CVE-2018-19074 CVE-2018-4841 CVE-2019-10930 CVE-2001-0939 CVE-2006-6472 CVE-2011-0382 CVE-2012-3075 CVE-2013-1080 CVE-2013-5530 CVE-2013-5531