Solved

tcp port 11010?

Posted on 2004-04-21
3
919 Views
Last Modified: 2013-12-23
what is port 11010 port used for in Win. XP and how can i connect to it??
0
Comment
Question by:every1isevil
3 Comments
 
LVL 16

Expert Comment

by:JammyPak
ID: 10888919
11010 is not an officially-assigned port...although some apps may be written to use it.

one generic way to connect to a given port is with telnet

"telnet <host> 11010"

will attempt to open a connection to tcp port 11010 on the host...whether something will answer or not, I don't know.
0
 
LVL 11

Accepted Solution

by:
nazirahmed earned 300 total points
ID: 10904862
Hi
Telnet uses TCP port 23, but I will agree with JammyPak, its an unassigned port number, could be used in a custom build application

goto the following page will give you results
http://lists.gpick.com/portlist/lookup.asp
and can also download the Port Reference from the above link.

anohter link for port information
http://www.chebucto.ns.ca/~rakerman/port-table.html#Table

TCP and UDP Port Assignments
http://www.microsoft.com/resources/documentation/windows/2000/server/reskit/en-us/tcpip/part4/tcpappc.mspx
0
 
LVL 37

Expert Comment

by:Bing CISM / CISSP
ID: 10905194
i think you are looking for who is using port 11010 on your XP box, because you could not get this information from NETSTAT command. if so, just try TCPVIEW to get your answer.

http://www.sysinternals.com/ntw2k/source/tcpview.shtml

TCPView is a Windows program that will show you detailed listings of all TCP and UDP endpoints on your system, including the local and remote addresses and state of TCP connections. On Windows NT, 2000 and XP TCPView also reports the name of the process that owns the endpoint. TCPView provides a more informative and conveniently presented subset of the Netstat program that ships with Windows.

hope it helps,
bbao
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Have you ever set up your wireless router at home or in the office to find that you little pop-up bubble in the bottom right-hand corner of Windows read "IP Conflict - One of more computers on the network have been assigned the following IP address"…
We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now