Posted 27 September 2009 - 07:37 PM
Was looking around here today and ran across nestat tutorial and started looking around in my computer. I found two entries port 5152. Listening and closed-wait. I keep my anti-virus updated, AVG 8.5. Ran scan this morning and also ran Malwarebytes scan. Both showed no problems. I Googled port 5152 and it doesn't look good. Am I infected?
BC AdBot (Login to Remove)
Posted 28 September 2009 - 08:33 AM
A port is an address associated with a particular process on a computer. Ports have a unique number in the header of a data packet that is used to map this data to that process. Port numbers are divided into three ranges: Well Known Ports, Registered Ports, and Dynamic/Private Ports. Default port values for commonly used TCP/IP services have values lower than 255 and Well Known Ports have numbers that range from 0 to 1023. Registered Ports range from 1024 to 49151 and Dynamic/Private Ports range from 49152 to 65535. An "open port" is a TCP/IP port number that is configured to accept packets while a "closed port" is one that is set to deny all packets with that port number.port scanning" to search for vulnerable computers with open ports using IP addresses or a group of random IP address ranges so they can break in and install malicious programs (viruses, Trojans). Botnets and Zombie computers scour the net and will randomly scan a block of IP addresses. These infected computers are searching for "vulnerable ports" and make repeated attempts to access them. If your PC is sending out large amounts of data, this usually indicates that your system may have a virus or a Trojan horse.
You can use netstat, a command-line tool that displays incoming and outgoing network connections, from a command prompt to obtain Local/Foreign Addresses, PID and listening state.
- netstat /? lists all available parameters that can be used.
- netstat -a lists all active TCP connections and the TCP and UDP ports on which the computer is listening.
- netstat -b lists all active TCP connections, Foreign Address, State and process ID (PID) for each connection.
- netstat -n lists active TCP connections. Addresses and port numbers are expressed numerically and no attempt is made to determine names.
- netstat -o lists active TCP connections and includes the process ID (PID) for each connection. You can find the application based on the PID on the Processes tab in Windows Task Manager. This parameter can be combined with -a, -n, and -p (example: netstat -ano).
There are third party utilities that will allow you to manage, block, and view detailed listings of all TCP and UDP endpoints on your system, including local/remote addresses, state of TCP connections and the process that opened the port:Caution: If you're going to start blocking ports, be careful which ones you block or you may lose Internet connectivity. For a list of TCP/UDP ports and notes about them, please refer to:
- Ports for Internet Services
- List of TCP and UDP port numbers
- IANA.org Registry of Port Numbers
- Well Known Ports List
- SamSpade.org Whois
- DNS Stuff WHOIS
- All Net Tools SmartWhois
- Domain Tools
- Network-Tools.com whois?
- hpHosts Online Search
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Posted 28 September 2009 - 05:59 PM
Thanks again, Doug
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users