TCP 9998 - Port Protocol Information and Warning! (2024)

Looking for information on Protocol TCP 9998? This page will attempt to provide you with as much port information as possible on TCP Port 9998.

TCP Port 9998 may use a defined protocol to communicate depending on the application. A protocol is a set of formalized rules that explains how data is communicated over a network. Think of it as the language spoken between computers to help them communicate more efficiently.

Protocol HTTP for example defines the format for communication between internet browsers and web sites. Another example is the IMAP protocol that defines the communication between IMAP email servers and clients or finally, the SSL protocol which states the format to use for encrypted communications.

TCP Port 9998

Here is what we know about protocol TCP Port 9998. If you have information on TCP port 9998 that is not reflected on this page, simply leave a comment and we’ll update our information.

PORT 9998 – Information

  • Port Number: 9998
  • TCP / UDP: TCP
  • Delivery: Yes
  • Protocol / Name: cpalace,distinct32,pirc
  • Port Description: Possible for IRCD
  • Virus / Trojan: No

    Tip! Use our free Digital Footprint and Firewall Test to help verify you are not infected.

Side note: TCP port 9998 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered on port 9998 in the same order in which they were sent. Guaranteed communication over port 9998 is the key difference between TCP and UDP. UDP port 9998 would not have guaranteed communication in the same way as TCP.

Because protocol TCP port 9998 was flagged as a virus (colored red) does not mean that a virus is using port 9998, but that a Trojan or Virus has used this port in the past to communicate.

TCP 9998 – Disclaimer

We do our best to provide you with accurate information on PORT 9998 and work hard to keep our database up to date. This is a free service and accuracy is not guaranteed. We do our best to correct any errors and welcome feedback!

Reader Interactions

Leave a Reply

TCP 9998 - Port Protocol Information and Warning! (2024)

FAQs

What is the port 9998 used for? ›

Port 9998 Details

Totalbill (billing and provisioning system for ISPs by Aptis Software) listens on port 9998/tcp (by default) and allows full control over the software. An exploit script for this software has been published in 2000. Common Palace chat environment, Football Manager Live also use port 9998 (TCP/UDP).

What is the 9996 port used for? ›

9996: to allow connections from ODBC clients of Virtual DataPort. 9090: to allow connections from client applications/browsers to the web applications and web services.

What is port 8889 used for? ›

Port 8889 is open by default and provides access to the VxWorks WDB debug service (wdbrpc). An attacker could connect to this port to obtain sensitive information. Google Chrome OS could allow a local attacker to execute arbitrary commands on the system, caused by improper access control in the garcon service control.

What is the TCP port 8888 vulnerability? ›

0.1 port 8888 can send a malicious payload causing a buffer overflow condition. This will result in code execution, as demonstrated by a TCP reverse shell, or a crash.

What uses port 999? ›

Port 999 Details
Port(s)ProtocolDetails
999udpApplix ac (IANA official)
999tcpScimoreDB Database System (unofficial)
999tcpDeep Throat , Foreplay
999tcpgarcon
10 more rows

What ports does Splunk use? ›

Splunk SOAR Default Ports for Clustered Deployments – On-Prem
PortTypeDescription
443DefaultREST API port
8443DefaultHTTPS default when using AMI-based deployment
4369DefaultRabbitMQ port mapper
5100 – 5120DefaultDaemon inter-process ports
10 more rows
Jan 20, 2023

What uses port 990? ›

FTPS typically uses port 990 for control connections and port 989 for data connections under implicit security. However, FTPS can also use port 21 when operating under explicit security. Learn more about the difference between FTPS vs HTTPS for secure file transfers.

What runs on port 9200? ›

Port 9200 is used for all API calls over HTTP. This includes search and aggregations, monitoring and anything else that uses a HTTP request. All client libraries will use this port to talk to Elasticsearch.

What application uses port 995? ›

The POP3S protocol uses port 995 and encrypts the connection between the email client and mail server. Email clients usually don't use the name POP3S, but if you use port 995 then your login credentials are transmitted securely.

What ports are unencrypted? ›

Non-secure ports are typically used for unencrypted protocols such as HTTP (port 80) or Telnet (port 23), while secure ports, such as HTTPS (port 443) or SSH (port 22), use encryption to protect the confidentiality and integrity of the data being transmitted.

What are the three types of port numbers? ›

The port numbers are divided into three ranges: the well-known ports, the registered ports, and the dynamic or private ports.

What are the uncommon ports? ›

An uncommon port can be any TCP/UDP port that is not included in the common service ports category, i.e. other than the commonly used ports such as 80 (HTTP), 443 (HTTPS), 20/21 (FTP), 22 (SSH), 23 (Telnet), 53 (DNS), 3389 (RDP), 25/465/587 (SMTP), 3306 (MySQL), 5432 (PostgreSQL), 1521 (Oracle Database), 1433 (SQL ...

What are the top TCP ports that are attacked? ›

Ports 80, 443, 8080 and 8443 (HTTP and HTTPS)

As the most popular internet protocols, HTTP and HTTPS tend to be targeted by malicious actors. Their actions often involve SQL injections, cross-site scripting, DDoS attacks, and request forgery.

What is TCP IP hijacking in cyber security? ›

A form of cyber attack in which an authorized user gains access to a legitimate connection of another client in the network. Having hijacked the TCP/IP session, the attacker can read and modify transmitted data packets, as well as send their own requests to the addressee.

What are the attacks on the TCP protocol? ›

  • 1 SYN Flood. A SYN flood is a type of denial-of-service (DoS) attack that exploits the TCP handshake process. ...
  • 2 IP Spoofing. ...
  • 3 ARP Spoofing. ...
  • 4 TCP Hijacking. ...
  • 5 DNS Spoofing. ...
  • 6 Ping of Death. ...
  • 7 Here's what else to consider.
Oct 26, 2023

What is the port 39999 used for? ›

This port is used for authentication of clients by the Enforcer.

What applications use port 8888? ›

TCP port 8888 is commonly used by Cassandra, a distributed NoSQL database management system. Unrestricted inbound access to TCP port 8888 on a server running Apache Cassandra database can allow unauthorized access to the database, leading to potential data breaches and other security incidents.

What uses port 8989? ›

Port 8989 (TCP) is the default port used by vxrserver. Port 2148 (TCP/UDP) is the VEA server port.

What ports are used for lt2p VPN? ›

By default, L2TP uses IPSec, which requires UDP ports 500 and 4500, and ESP IP Protocol 50. If you disable IPSec, Mobile VPN with L2TP requires only UDP port 1701.

Top Articles
Latest Posts
Article information

Author: Edmund Hettinger DC

Last Updated:

Views: 5927

Rating: 4.8 / 5 (78 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Edmund Hettinger DC

Birthday: 1994-08-17

Address: 2033 Gerhold Pine, Port Jocelyn, VA 12101-5654

Phone: +8524399971620

Job: Central Manufacturing Supervisor

Hobby: Jogging, Metalworking, Tai chi, Shopping, Puzzles, Rock climbing, Crocheting

Introduction: My name is Edmund Hettinger DC, I am a adventurous, colorful, gifted, determined, precious, open, colorful person who loves writing and wants to share my knowledge and understanding with you.