?
Solved

EMERGENCY Port 3113 1150

Posted on 2004-08-26
2
Medium Priority
?
217 Views
Last Modified: 2008-03-10
Hello, I have a crisis.. anyone know what software/mal might spam from port 3113 to port 1150???  Im googling as fast as i can.. please help asap

0
Comment
Question by:Brent92663
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 36

Accepted Solution

by:
grblades earned 1500 total points
ID: 11910876
Hi Brent92663,
Port 1150 is used by the Orion trojan. It could be someone probing your servers to see if one of them has the trojan.
0
 

Author Comment

by:Brent92663
ID: 11914262
Yeah I saw the orion trojan on google.  Weird stuff..  had a workstation across a vpn spamming out on that port and flooding the network... ran spyware removal and it went away..  hmm
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question