Loading...
[get complete service list]
Port Information
Protocol Service Name
tcp domain Domain Name Server
udp domain Domain Name Server
tcp ADMworm [trojan] ADM worm
tcp Lion [trojan] Lion
Top IPs Scanning
Today Yesterday
194.54.148.8 (3046)194.54.148.8 (8650)
49.12.47.50 (2952)188.154.193.26 (5178)
216.113.109.91 (2561)49.12.47.50 (3699)
116.203.86.130 (2305)116.203.86.130 (3176)
188.154.193.26 (1701)122.228.23.224 (2419)
142.166.151.133 (1547)59.144.144.22 (2202)
175.149.102.199 (1521)194.54.148.137 (2015)
122.228.23.224 (1453)173.36.225.38 (1971)
47.207.4.228 (1419)173.38.213.70 (1686)
142.166.151.49 (1343)194.54.148.136 (1496)
Port diary mentions
URL
Odd DNS Traffic. Large scale name server finger printing?
Recent spike in port 53 activity
Bounced emails with viral attachments
SCANS, Babel (not BagelBagleBeagle) & Halloween
Port 41523; Linux Exploit; Phishing Name server; New Feature: tcp %; ssh attacks; MSRC blog
Analyzing evidence of DNS attacks in PIX firewall logs; Trojans for industrial espionage; openrbl.org offline?
Port 53 Back on the Radar
What's up with TCP 853 (DNS over TLS)?
User Comments
Submitted By Date
Comment
2015-09-14 16:31:21
Too bad to see there is only old stuff in the CVE reference list...
Joe 2012-12-18 14:01:20
Am I the only one that has noticed a huge increase in DNS (UDP Port 53) traffic, particularly on DNS Sources, that began on Friday, December 14, 2012. I've been dealing with the same problem, and need to know if there is something that can be done to mitigate this DDOS Attack?
Alexander Dupuy 2009-12-10 18:41:48
Dell RACADM remote access controller command line interface uses TCP port 5869 to contact some (older) DRAC 3 & 4 management cards. See pages 30 & 32 of http://support.dell.com/support/edocs/software/smsom/6.0.1/en/ug/pdf/ug.pdf
Clarke Morledge 2005-10-14 00:44:13
If an America Online's Instant Messenger (AIM) client attempts to connect to port 5190 to reach a server and can not, it will go ahead and try to reach an AIM server on TCP port 53. Sometimes 5190/tcp is blocked by firewalls so the attempt to communicate on port 53, which is normally open for DNS, works to get around the firewall restriction (IMHO, this defeats the whole purpose of trying to associate an application protocol to a particular transport layer port).
2004-06-15 02:01:42
What does this mean ? User Comment - Port 53 back to port details Speedera's latency checking service is known to send port 53 UDP packets. See: http://archives.neohapsis.com/archives/snort/2002-07/0626.html ----- Submitted by: Tom Liston. Last update: Feb 10th 2004
Tom Liston 2004-02-10 21:24:25
Speedera's latency checking service is known to send port 53 UDP packets. See: http://archives.neohapsis.com/archives/snort/2002-07/0626.html
Marcus H. Sachs, SANS Institute 2003-10-10 00:35:36
SANS Top-20 Entry: U1 BIND Domain Name System http://isc.sans.org/top20.html#u1 The Berkeley Internet Name Domain (BIND) package is the most widely used implementation of the Domain Name Service (DNS), a critical system that allows the conversion of hostnames (e.g. www.sans.org) into the registered IP address. The ubiquity and critical nature of BIND has made it a frequent target, especially in Denial of Service (DoS) attacks, which can result in a complete loss of accessibility to the Internet for services and hosts. Whilst BIND developers have historically been quick to repair vulnerabilities, an inordinate number of outdated, misconfigured and/or vulnerable servers remain in place.
Johannes Ullrich 2002-10-11 16:40:56
Port 53 is used by DNS (Domain Name System). DNS takes care of recolving human readable 'host names' into numeric IP addresses. A commonly used DNS server called BIND has had a rich history of security problems. As a result, BIND and port 53 are frequent targets and a couple worms used BIND exploits to propagate.
CVE Links
CVE # Description
CVE-2016-2776
CVE-2016-2848