Table of Contents
![]() |
Note: This document is also available in other formats |
---|---|
A PDF version of this document along with all current and older documentation in PDF format can be found at https://my.clavister.com. It is also available in a framed HTML version. |
This document lists all the available application control signatures that are used by the cOS Core Application Control feature.
A full explanation of how the feature is used can be found in the separate cOS Core Administration Guide. This document is designed to be used as additional reference material for administrators.
Individual signatures are categorized by the type of application being targeted. For example, the Peer to Peer section lists applications similar to BitTorrent.
Naming Conventions
The naming used with application control, for example for applications and tags, can have two different forms. One form is that used as the description in this signature reference guide that includes uppercase and spaces. The second form is all lowercase and spaces are replaced by underscore characters. This second form is used with management interfaces such as the CLI. For example, BitTorrent becomes bittorrent. In some isolated cases, the names can have different lengths. For example, the tag Software Update becomes updater in the CLI. The best approach to naming in the CLI is to use the tab completion feature to identify the correct name.ZoneAlarm is a personal firewall for Windows. This protocol plug-in classifies security updates of the software.
Family: | Antivirus |
Over: | zonealarm |
Revision: | 21 |
Risk level: | 1 |
Tag: | Software Update |
Tag: | Antivirus Updater |
Automatic Certificate Management Environment (ACME) automatically provision TLS certificate from a Certificate Authority. This plugin classifies REST servers from major providers; and the HTTP/DNS challenge.
Family: | Application Service |
Over: | amazon_aws |
Over: | cloudflare |
Over: | dns |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Exchange ActiveSync (EAS) is a mobile data synchronization technology and protocol developed by Microsoft, originally released in 1996. This protocol is designed for the synchronization of email, contacts, calendar, tasks and notes.
Family: | |
Over: | rpc |
Revision: | 20 |
Risk level: | 3 |
Tag: | Network Utilities |
Tag: | Information Leaking |
Tag: | Mobile Applications |
Airtable is a no-code SaaS platform featuring spreadsheets with database functionalities. This plugin classifies Airtable Spreadsheet.
Android connectivity manager is used by an android device to periodically check and manage internet connection.
Apple Push Notification Service is an Apple service which forwards notifications from the servers of third party applications to iOS devices.
Apple Pay is a mobile payment and digital wallet service by Apple Inc. This plugin classifies traffic between merchant sites and Apple Pay services.
AppSheet is a no-code application development platform from Google.
Family: | Application Service |
Over: | gcp |
Over: | google_gen |
Over: | http |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Web Applications |
The Apple App Store is a digital application distribution platform for iOS developed and maintained by Apple Inc.
This plug-in used to classify Amazon AppStream, a remote desktop uses to manage applications running in virtual machines on Amazon platform.
Family: | Application Service |
Over: | amazon |
Over: | amazon_aws |
Over: | http |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Allows Remote Control |
Tag: | Server Applications |
Aptoide is the largest independent Android app store allowing users to setup and manage their own Android stores.
Azure Right Management Service is a Microsoft right management service for files and Office documents which acts like a DRM license server. It is part of Azure Information Protection and is the on-line version of MS AD RMS. Support of this protocols covers client-to-server requests.
Bosch Conettix is a security alarm product line. This plugin classifies the D6600 when no encryption is configured.
Family: | Application Service |
Over: | udp |
Revision: | 1 |
Risk level: | 3 |
Tag: | Industrial Protocols |
QMessage Monitor, by Helpsystems, sends alerts to IT administrators based on filters on AS/400 Message Queues. This protocol is between the AS/400 application and a Windows client.
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
This plugin classifies the protocol of CUCAM (Cisco Unified Communications Alert Manager and Collector). This service is used by CUC (Cisco Unified Communications) or the RTMT (Real-Time Monitoring Tool) to provide performance monitoring, data collection, logging, and alerting.
Family: | Application Service |
Over: | cisco_ucm |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
Citrix PVS provides an infrastructure to stream shared Xen Virtual Machine images (vDisk) to hosts. This protocol plug-in classifies the Soap to Stream Process Manager communication protocol used by Citrix PVS.
Family: | Application Service |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Server Applications |
Tag: | Application Layer Protocols |
Wibu Codemeter is a license server (Software Asset Management). This plugins classifies this product as used in FactoryTalk Activation Manager.
Control-M is an orchestration software form BMC. This plugin classifies communication between the server and the agent when TLS is disabled and persistent connections is disabled.
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
The DICT protocol is a TCP transaction based query/response protocol that enables a client to access dictionary definitions from a set of natural language dictionary databases.
Family: | Application Service |
Over: | tcp |
Revision: | 18 |
Risk level: | 1 |
Tag: | Server Applications |
Elasticsearch is a search engine. It provides a distributed, multitenant-capable full-text search engine
Engage Digital is a digital customer engagement platform. It was previously Dimelo acquired by Ring Central.
Family: | Application Service |
Over: | http |
Over: | ring_central |
Over: | ssl |
Revision: | 1 |
Risk level: | 3 |
Tag: | Web Applications |
Exacqvision is a software used for video surveillance.
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Streaming Video |
Electronic communications protocol for international real-time transactions and markets information exchange. This signature classifies all the FIX protocol versions, from FIX 4.0 (13 jan 1996) to FIX 5.0 SP2 (1st mar 2008) and FIXT 1.1.
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
The Generic Attribute Registration Protocol (GARP) provides a generic framework whereby devices in a bridged LAN can register or delete attribute values between each other.
GDB Remote is a serial protocol used connect gdb to a remote running target program and debug it.
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Desktop Applications |
Tag: | Application Layer Protocols |
Google Play Store (formerly Android Market) is an online software store developed by Google for Android OS devices.
Family: | Application Service |
Over: | gcp |
Over: | google_api |
Over: | google_gen |
Over: | gstatic |
Over: | gsuite |
Over: | http2 |
Over: | http |
Over: | https |
Over: | quic |
Over: | spdy |
Over: | ssl |
Revision: | 16 |
Risk level: | 1 |
Tag: | Bundles Software |
Tag: | Download Manager |
Tag: | Software Update |
Tag: | Mobile Applications |
Tag: | Non-business Related |
Sentinel is a license manager from Thales. This plugin classifies the version delivered with MasterCam, a CNC software, version 2019.
Family: | Application Service |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
HPE Operation Agent is a standalone system management software, collecting metrics and applying configurations. It may be connected to HPE Operation Bridge
This plugin classifies traffic related to the IBM i Access server mapper service.
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
iCloud is a cloud computing service developed by Apple Inc. which allows to store and share data, from an iOS mobile (iPhone, iPad, iPod Touch or a Macintosh). Note: the classification of this service is maximized if non encrypted traffic is injected.
Jenkins is a software development build automation infrastructure for continuous integration and delivery. This plugin classify the website and on-site instances using the default HTTP web interface.
JNLP is the protocol used to control Jenkins agents remotely. The JNLP protocol is available as a standalone library.
High throughput distributed messaging system
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Network Layer Protocols |
Keyence is a manufacturer of industrial imaging devices. This plugin classifies the protocol used for image retrieval from KV-X cameras.
LDAP (Lightweight Directory Access Protocol) is a protocol used for accessing directory services. Windows environments use this protocol to send queries to Active Directory.
Secure LDAP is the Secure version of the LDAP protocol.
Family: | Application Service |
Over: | ssl |
Revision: | 18 |
Risk level: | 4 |
Tag: | Network Utilities |
Tag: | Server Applications |
Micro Focus Configuration Management System, previously known as HP Enterprise CMS, does the discovery and inventory of an IT infrastructure and its hosted services. The discovery is both agent less by using each service own protocol and agent based. This plugin classifies, provided the default certificates are not changed, the custom protocols used between this product components (UD Agent, DF Probe, UCMDB Server, UCMDB UI); and between the UI and a web browser.
Mobile Market is an online Android and iOS software store developed by China Mobile. This plugin classifies traffic from Mobile Market Android application.
Mq (IBM Websphere MQ) is an inter-application communication protocol.
Family: | Application Service |
Over: | tcp |
Revision: | 18 |
Risk level: | 3 |
Tag: | Server Applications |
Tag: | Application Layer Protocols |
Microsoft Active Directory is a directory service for IT infrastructure. This includes the Windows Domain Controller.
Right Management Service is a Microsoft right management service for files and Office documents based on a central server linked to the Active Directory which acts like a DRM license server. Support of this protocol cover both client-to-server and server-to-server requests but is limited to HTTP configurations.
Microsoft Active Directory Web services are used for the administrative tasks on an Active Directory.
Family: | Application Service |
Over: | ms_nmf |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Utilities |
Tag: | Business Applications |
Microsoft Directory Replication Service Remote Protocol (MS-DRSR) is a protocol for replication of Active Directory servers alongside LDAP. This plugin classifies the DCE/RPC based protocol.
Microsoft Local Security Authority Remote Protocol (MS-LSAD and MS-LSAT) allows remote management of security policies from an Active Directory server.
Message Queuing (MSMQ) technology enables applications running at different times to communicate across heterogeneous networks and systems that may be temporarily offline. Applications send messages to queues and read messages from queues.
Netlogon Remote Protocol is used for authentication of users and hosts on a Windows domain and also for domain controller database replication.
Microsoft Notification Protocol (MSNP, also known as the Mobile Status Notification Protocol) is an instant messaging protocol developed by Microsoft for use by the Microsoft Messenger service and the instant messaging clients that connect to it, such as Skype since 2014.
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Instant Messaging |
Tag: | Network Utilities |
Tag: | Business Applications |
Tag: | Desktop Applications |
This plugin classifies NUSP protocol. NUSP is custom protocol from NUUO company for initializing and maintaining video streams from cameras.
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Odyssey by Tyler technologies is an end-to-end Courts and Justice software solution. This plugin classifies the local web application server.
This protocol manages OpenBSD updates.
Family: | Web |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | spdy |
Revision: | 17 |
Risk level: | 1 |
Tag: | Software Update |
Opera Mobile Store provides over 300,000 apps and games for more than 7,500 different mobile phone models across Android, Java, Symbian, BlackBerry, Windows Mobile, Windows Phone and iOS platforms. In agreement with Nokia, Opera Mobile Store is also replacing the former Nokia store for legacy Nokia devices.
This plugin classifies OV Solutions Server traffic. OV Solutions company provides surveillance equipment and software like NVR (Network Video Recording).
Family: | Application Service |
Over: | nusp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Perforce is a commercial, proprietary, centralized revision control system developed by Perforce Software, Inc.
Family: | Application Service |
Over: | tcp |
Revision: | 15 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Server Applications |
Port Mapper protocol maps RPC program and version numbers to port numbers. This program makes dynamic binding of remote programs possible.
Family: | Application Service |
Over: | rpc |
Revision: | 17 |
Risk level: | 3 |
Tag: | Network Utilities |
Tag: | Server Applications |
Sentinel Rights Management System (RMS) is a license manager from Thales. This plugin classifies the communication from the client to the local license server.
Licence distribution protocol from Siemens Automation License Manager, used in SIMATIC products.
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
This plugin classifies SnapMirror relationship protocol for data transfer only, thus protocol related to replication of snapshots between any two ONTAP systems.
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Server Applications |
Splunk Cloud is the data collection, indexing, and visualization service for operational intelligence.
Family: | Application Service |
Over: | http2 |
Over: | http_proxy |
Over: | quic |
Over: | rtsp |
Over: | sip |
Over: | spdy |
Over: | splunk |
Over: | splunk_ufwd |
Over: | ssl |
Over: | stun |
Revision: | 1 |
Risk level: | 1 |
Tag: | Network Utilities |
Universal Forwarder is used to forward data Splunk application (6.5.0), it is designed to scale to large number of remote systems and collect very large amount of data.
Family: | Application Service |
Over: | splunk |
Revision: | 1 |
Risk level: | 1 |
Tag: | Transport Layer Protocols |
Service Location Protocol is a decentralized, lightweight, scalable and extensible protocol for service discovery within a local area network.
Simple Service Discovery Protocol (SSDP) provides a mechanism whereby network clients can discover desired network services.
Family: | Application Service |
Over: | udp |
Revision: | 17 |
Risk level: | 3 |
Tag: | Network Utilities |
Tag: | Application Layer Protocols |
This protocol is used to control remotely Windows services. Also known as MS-SCMR (Service Control Manager Remote Protocol). For further information, see https://msdn.microsoft.com/en-us/library/cc245832.aspx
Syslog protocol is used for the transmission of event notification messages across networks between a client and a server.
Tencent Appstore (Yingyongbao) is an online applications store developed by Tencent for Android OS devices.
Windows Marketplace is a service by Microsoft for its Windows Phone 7/8 and Microsoft Windows 8 platforms that allows users to browse and download applications that have been developed by third-parties. The website of the chain of retail stores Microsoft Store is also classified.
vMotion is the VMware protocol which allows hot migration of virtual machines between different vSphere servers running on different hosts.
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Server Applications |
Tag: | Application Layer Protocols |
Blast is a Virtual Desktop Infrastructure (VDI) protocol from VMWare, in use for the Horizon platform. When tunneled, it is classified by the vmware_horizon plugin.
VMware Fault Domain Manager is a service of vSphere High Availability (HA) and vSphere Fault Tolerance. This service monitors the availability and power state of virtual machines, and restarts protected virtual machines when they fail. vSphere is a software of the VMWare suite, which is a virtualization software suite. Fault Domain manager typically uses TCP/UDP port 8182.
Horizon is VMWare's Virtual Desktop Infrastructure (VDI). It is available both on-premises and in cloud version.
Vmware Horizon View is a commercial desktop-virtualization product developed by VMware. This plugin classifies pcoip streams over UDP, between virtual machines and Mac/Windows clients
Family: | Application Service |
Over: | pcoip |
Revision: | 2 |
Risk level: | 3 |
Tag: | Allows Remote Control |
X Font Server is a standard communication protocol between an X server and a font renderer.
Family: | Application Service |
Over: | tcp |
Revision: | 16 |
Risk level: | 1 |
Tag: | Server Applications |
Zapier is an online tool which automates workflows by connecting the applications and services used.
This plugin classifies replication protocol used by Apache ZooKeeper to synchronise instances.
Family: | Application Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Server Applications |
French mobile application providing tv live broadcast and catchup TV.
Family: | Audio/Video |
Over: | amazon_aws |
Over: | apple_hls |
Over: | flurry |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | quic |
Over: | smartadserver |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 1 |
Tag: | Mobile Applications |
Tag: | Streaming Video |
Tag: | Non-business Related |
7digital is a digital music and radio services platform. For example, it is used by Trebel application. This plugin classifies website traffic.
Internet radio and social networking website based on user-made playlists streaming.
Family: | Audio/Video |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | quic |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Social Networking |
Tag: | Streaming Audio |
Tag: | Web Sites |
Acast is a podcast platform. This plugin classifies listening, browsing and downloading podcasts traffic for free account.
Adobe Connect is a web communication system for the training, the marketing, the conferences and the online collaboration.
This protocol plug-in classifies the http and TCP traffic to the host .afreeca.com.
Family: | Audio/Video |
Over: | amazon_aws |
Over: | data_saver |
Over: | http2 |
Over: | http |
Over: | https |
Over: | quic |
Over: | rtmp |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Streaming Video |
Tag: | Non-business Related |
Tag: | Web Sites |
Allmusic is an online music guide service website. This plug-in classifies navigation on the AllMusic web service, and MP3 music playback. Video clip streaming is handled by youtube.
Amagi is a cloud platform for TV networks and content owners. This plugin classifies the website traffic.
Family: | Audio/Video |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http3 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Web Sites |
AMC Networks is an American entertainment company which has acquired RLJ Entertainment owner of Acorn TV. This plugin classifies the AMC Networks and Acorn TV websites.
Family: | Audio/Video |
Over: | akamai |
Over: | amazon_aws |
Over: | freshworks |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | workday |
Revision: | 1 |
Risk level: | 2 |
Tag: | Web Sites |
Anghami application provides an audio streaming service.
Family: | Audio/Video |
Over: | akamai |
Over: | amazon |
Over: | amazon_aws |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | tritondigital |
Over: | zendesk |
Revision: | 1 |
Risk level: | 2 |
Tag: | Streaming Audio |
Anvato is a video on demand technologies provider, now part of the media and entertainment offer of Google Cloud Platform (GCP).
Apple airplay is a protocol for display picture and video to a connected tv from a device connected to the same private network
Apple implementation of the HTTP Live Streaming IETF draft. Used on Apple iOS devices.
Family: | Audio/Video |
Over: | akamai |
Over: | akamai_video |
Over: | amazon_aws |
Over: | apple |
Over: | bmff |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | mpegts |
Over: | spdy |
Over: | ssl |
Over: | turner |
Over: | videoplaza |
Revision: | 1 |
Risk level: | 1 |
Tag: | Web Conferencing |
Tag: | Streaming Video |
Tag: | Streaming Audio |
Apple QuickTime is an extensible proprietary multimedia framework developed by Apple Inc., capable of handling various formats of digital video, picture, sound, panoramic images, and interactivity. QuickTime is available for Windows XP and later, as well as Mac OS X Leopard and later operating systems.
Apple TV Plus offers paid VOD distributed by Apple. This plugin classifies the video streams related to Apple TV Plus option and web site tv.apple.com. This plugin does not cover streams related to Apple TV application.
Baidu Short Videos is a short video platform owned by Baidu. This plugin classifies the iOS application traffic
BAMTech is a VOD technology provider owned by Walt Disney Company, Major League Baseball Advanced Media and National Hockey League. This plugin classifies its streaming technology as used by Disney Plus.
BBC Player is an in-browser live video streaming service.
Family: | Audio/Video |
Over: | akamai |
Over: | amazon_aws |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | llnwd |
Over: | rtmp |
Over: | spdy |
Over: | ssl |
Revision: | 17 |
Risk level: | 2 |
Tag: | Streaming Video |
Tag: | Non-business Related |
This plugin classifies BeIN Sports Connect for APAC and Middle East countries and BeIN Sports website. BeIn Sports is a Qatari network of sports television channels.
Bobo Video is an aggregated short video app. This plugin classifies browsing and watching videos traffic on mobile applications.
VodCCTV provides a web on-line video and video on demand client for the CCTV Chinese television network.
Chang Ba ("Just Sing") is a chinese karaoke platform. This plugin classifies website and Android application traffic.
This plugin classifies ClickView free services available on the website and the android application. ClickView is an educational videos and resources platform.
Connatix is a video syndication and monetization platform for publishers. This plugin classifies website traffic.
Family: | Audio/Video |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Web Sites |
crackle is an entertainment network and studio that distributes free movies, television shows and original programming.
Family: | Audio/Video |
Over: | akamai |
Over: | akamai_video |
Over: | amazon_aws |
Over: | bmff |
Over: | google_gen |
Over: | http2 |
Over: | http |
Over: | https |
Over: | rtmp |
Over: | spdy |
Over: | ssl |
Over: | windows_azure |
Revision: | 1 |
Risk level: | 1 |
Tag: | Streaming Video |
Tag: | Non-business Related |
Tag: | Web Sites |
Crunchyroll is a video streaming platform (owned by Sony) specialized in East Asian media.
Family: | Audio/Video |
Over: | akamai |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http3 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | zendesk |
Revision: | 1 |
Risk level: | 2 |
Tag: | Streaming Video |
Tag: | Non-business Related |
A DirecTV service - Data Catalog. DirecTV (DIRECTV) is an American direct broadcast satellite service provider and broadcaster.
This plugin classifies loading of DirecTV GO home page. DirecTV GO is video streaming platform proposed by AT&T in latina America.
Discovery Inc, is an American global media and entertainment company. This plugin classifies website traffic.
Family: | Audio/Video |
Over: | adobe |
Over: | akamai |
Over: | amazon_aws |
Over: | gcp |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | windows_azure |
Revision: | 1 |
Risk level: | 2 |
Tag: | Web Sites |
Dplay is a video streaming provider. This plugin classifies only free account.
Family: | Audio/Video |
Over: | discovery_inc |
Over: | http |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Streaming Video |
Tag: | Non-business Related |
Free live video streaming service by Facebook. This signature only classifies the live video streaming making (upstream) from the official Facebook mobile application. The live video watching is classified as facebook_video.
Filmin is a Spanish video on demand streaming platform. FilminLatino is the Mexican version of the service.
Adobe Flash Media Playback is a dynamic HTTP streaming protocol used to access video contents (Flash Media PlayBack, Flow Player, ...) from a smart client application. (In case of known server application, we will favor its classification instead of classify it as Flash)
Fuze (formerly known as ThinkingPhones) is a provider of cloud-based Unified Communications as a Service (UCaaS).
Family: | Audio/Video |
Over: | amazon_aws |
Over: | dtls |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | quic |
Over: | rtcp |
Over: | rtp |
Over: | rtsp |
Over: | sip |
Over: | spdy |
Over: | splunk_cloud |
Over: | ssl |
Over: | stun |
Over: | webrtc |
Revision: | 1 |
Risk level: | 3 |
Tag: | Instant Messaging |
Tag: | Social Networking |
Tag: | Business Applications |
Tag: | Streaming Video |
Tag: | Streaming Audio |
Video-conferencing application (audio, video HD, desktop sharing, file transfer)
Family: | Audio/Video |
Over: | fuze |
Over: | http2 |
Over: | http_proxy |
Over: | quic |
Over: | rtsp |
Over: | sip |
Over: | spdy |
Over: | ssl |
Over: | stun |
Revision: | 2 |
Risk level: | 3 |
Tag: | Allows Remote Control |
Tag: | File Storage and Sharing |
Tag: | Instant Messaging |
Tag: | Web Conferencing |
Tag: | Video Conferencing |
Tag: | VoIP |
Tag: | Business Applications |
Tag: | Streaming Video |
GITV is an internet television company providing systems, products for tv operators and also video contents. This plugin classifies traffic to gitv.tv and gitv.cn.
Google Play Music is a music streaming service and online music locker operated by Google.
Family: | Audio/Video |
Over: | fcm |
Over: | google_api |
Over: | google_gen |
Over: | gstatic |
Over: | http2 |
Over: | http |
Over: | https |
Over: | quic |
Over: | spdy |
Over: | ssl |
Revision: | 2 |
Risk level: | 1 |
Tag: | Web Applications |
Tag: | Streaming Audio |
Tag: | Non-business Related |
Tag: | Web Sites |
GVCP stands for Give Vision Control Protocol a standard for industrial cameras supported by several companies. This plugin classifies GVCP traffic related to control and discovery.
Family: | Audio/Video |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Internet of Things |
Tag: | Industrial Protocols |
The H225 Protocol is a VoIP protocol, used for call signaling and RAS (Registration, Admission and Status).
H245 is a VoIP protocol, used for call signaling codec negotiation.
Family: | Audio/Video |
Over: | tcp |
Revision: | 17 |
Risk level: | 3 |
Tag: | VoIP |
Tag: | Application Layer Protocols |
h248 Protocol (Megaco) in binary mode.
Family: | Audio/Video |
Over: | udp |
Revision: | 15 |
Risk level: | 2 |
Tag: | VoIP |
Tag: | Application Layer Protocols |
h248 Protocol (Megaco) in text mode.
Family: | Audio/Video |
Over: | udp |
Revision: | 15 |
Risk level: | 2 |
Tag: | VoIP |
Tag: | Application Layer Protocols |
HBO Max is a video streaming platform developed by Warner Media. This plugin classifies website traffic.
Horizon GO provides live TV, streams movies and series on demand. This plugin classifies the traffic on horizon.tv and ziggogo.tv.
Hulu is a free Video-On-Demand and video sharing service.
Family: | Audio/Video |
Over: | adobe |
Over: | akamai |
Over: | amazon_aws |
Over: | bamtech |
Over: | cloudflare |
Over: | conviva |
Over: | edgecast |
Over: | fastly |
Over: | google_ads |
Over: | http2 |
Over: | http |
Over: | https |
Over: | level3 |
Over: | rtmp |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Over: | udp |
Over: | zendesk |
Revision: | 18 |
Risk level: | 2 |
Tag: | Streaming Video |
Tag: | Non-business Related |
Huya is a Chinese live-streaming game platform. This plugin classifies browsing and video-playing traffic.
IWant TV is an over-the-top content (OTT) platform exclusively available in the Philippines.
Family: | Audio/Video |
Over: | abs_cbn |
Over: | akamai |
Over: | akamai_video |
Over: | amazon_aws |
Over: | cloudflare |
Over: | gcp |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Revision: | 2 |
Risk level: | 2 |
Tag: | Streaming Video |
Tag: | Streaming Audio |
Inter Asterisk Exchange (IAX2) is a data exchange protocol between Asterisk servers.
Family: | Audio/Video |
Over: | udp |
Revision: | 17 |
Risk level: | 1 |
Tag: | VoIP |
Tag: | Server Applications |
Tag: | Application Layer Protocols |
ICY is the former version of the SHOUTCast streaming protocol, developed by Nullsoft.
Family: | Audio/Video |
Over: | data_saver |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | tcp |
Over: | tritondigital |
Revision: | 1 |
Risk level: | 2 |
Tag: | Server Applications |
Tag: | Application Layer Protocols |
Tag: | Streaming Audio |
Tag: | Non-business Related |
iFilmTV is an iranian television portal, featuring Live TV streaming. This signature classifies live TV, as well as video trailers and clips playing.
iTunes is an Apple proprietary digital media player application, used for playing and organizing digital music and video files.
This signature detects Join.me, a free service that allows to share a desktop instantly with others.
Kayo Sports is an Australian on-demand and live sports video streaming platform owned by Streamotion. This plugin classifies the website traffic.
Family: | Audio/Video |
Over: | http |
Over: | ssl |
Over: | streamotion |
Revision: | 1 |
Risk level: | 2 |
Tag: | Streaming Video |
Tag: | Non-business Related |
Tag: | Web Sites |
This plugin classifies Kuaishou website and iOS application traffics (making a Live streaming and chat are not supported). Kuaishou is a content community and social platform and owned many applications (Kuaishou Flagship, Kuaishou Express, Kuaishou Concept, Yitian Camera, Kmovie, AcFun, Kuaikandian). Kwai is the international version of the Kuaishou
Libsyn provides audio & podcasts streaming services.
Family: | Audio/Video |
Over: | amazon_aws |
Over: | cloudflare |
Over: | disqus |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Streaming Audio |
Lifesize is a video and audio telecommunications company. This plugin classifies traffic generated on Android and Chrome platforms.
MagicJack is a VoIP service for home and business use, available as a mobile application and also with a proprietary device (magicJack PLUS).
MeetingPlace is a protocol used by the Cisco Unified MeetingPlace suite of voice, web, and video conferencing products.
Metacafe is a popular video sharing website launched in 2002.
Family: | Audio/Video |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | spdy |
Revision: | 16 |
Risk level: | 2 |
Tag: | Streaming Video |
Tag: | Non-business Related |
Milestone Systems is an IP video management software platform. This plugin classifies only website traffic.
Family: | Audio/Video |
Over: | amazon_aws |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | windows_azure |
Revision: | 1 |
Risk level: | 2 |
Tag: | Web Sites |
MMS protocol is used extensively nowadays by Microsoft video streaming servers. It enables to stream a file in real time to many simultaneous viewers.
MP3 Rocket is a music file downloader application. It uses the Youtube (aka Google Video) service to search and download video clips, and then transforms them into MP3 files on the host machine using a MP3 converter. This plug-in only classifies secondary flows of the application, like client updates. Video clip downloads are classified as youtube.
Message Session Relay Protocol (MSRP) is a protocol for transmitting instant messages, defined by RFC 4975.
Family: | Audio/Video |
Over: | tcp |
Revision: | 16 |
Risk level: | 3 |
Tag: | Instant Messaging |
Tag: | P2P File Sharing |
Tag: | Application Layer Protocols |
National K Song is a karaoke application owned by Tencent. The international version is named WeSing.
NetFlix is a producer and distributor of paid videos on demand.
Family: | Audio/Video |
Over: | akamai |
Over: | amazon |
Over: | amazon_aws |
Over: | bmff |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | imgix |
Over: | llnwd |
Over: | netflix_video |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Over: | udp |
Revision: | 18 |
Risk level: | 2 |
Tag: | Streaming Video |
Tag: | Non-business Related |
Classify traffic related to Netflix Streaming service. Most of that traffic goes to Open Connect Appliances (https://openconnect.netflix.com) which are deployed on ISP/IXP side to speed up throughput and so user experience. Fast.com is a Netflix application using the same servers to assess quality of Internet connection to Netflix service.
Nimo TV is a video game streaming platform. This plugin classifies the browsing and watching video traffic.
Octoshape is a video streaming solution provider for web streaming platforms which uses P2P technology.
Family: | Audio/Video |
Over: | akamai |
Over: | amazon_aws |
Over: | deutsche_telekom |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Over: | udp |
Revision: | 1 |
Risk level: | 3 |
Tag: | P2P File Sharing |
Tag: | Streaming Video |
Tag: | Non-business Related |
Omnicast is an IP CCTV (closed-circuit television) collector, storage and visualization product. This plugin classifies http and rtsp flows of Omnicast. Protocols specific to cameras are not handled by this plugin.
Optus Sport is an Australian on-demand and live sports video streaming platform owned by Optus. This plugin classifies the free access to Optus Sport.
This plugin classifies website browsing and OSN streaming applications traffic. Orbit Showtime Network (OSN) is a Middle Eastern multinational direct-broadcast satellite provider and also a video platform for Middle East and North Africa (MENA).
Proprietary protocol used by Paltalk in audio chats.
Family: | Audio/Video |
Over: | tcp |
Revision: | 17 |
Risk level: | 3 |
Tag: | VoIP |
Tag: | Non-business Related |
Proprietary protocol used by Paltalk in video.
Family: | Audio/Video |
Over: | tcp |
Revision: | 17 |
Risk level: | 3 |
Tag: | Video Conferencing |
Tag: | Non-business Related |
PPLIVE is an application intended to watch TV in peer-to-peer. The PPLIVE application has two main functions : live TV(streaming) and on-demand TV (VOD). These are two different protocols. This protocol plug-in handles both.
The PPStream protocol provides audio and video streaming. It is based on bittorrent (peer-to-peer) technology. It is mainly used in China. The PPStream activity was integrated in the iQiyi video platform by Baidu in 2013.
The Q.931 protocol enables the use of voice and image on networks for video conferencing. It provides no flow control, however, or retransmission, since the underlying layers are assumed to be reliable and the circuit-oriented nature of ISDN allocates bandwidth in fixed increments of 64 kbps. Q.931 does manage connection setup and close. Like TCP, Q.931 documents both the protocol itself and a state machine.
Family: | Audio/Video |
Over: | tcp |
Revision: | 18 |
Risk level: | 3 |
Tag: | Video Conferencing |
Qbrick is a service video provider (Video Platform, Video Player, Video Editor, Analytics, CDN, API). This plugin classifies website traffic.
QIK is a PC/smartphone application allowing live and VOD streaming from the web. The video chat additional feature is not supported yet.
QQLive is an application intended to watch TV in Peer-to-Peer mode. QQlive also classifies QQ live streaming on web browser
QQMusic is a Chinese peer-to-peer file sharing software. Its purpose is to download/stream audio files.
Family: | Peer to Peer |
Over: | http |
Over: | national_k_song |
Over: | qq_browser |
Over: | qq_web |
Over: | qqdownload |
Over: | qqvideo |
Over: | ssl |
Over: | udp |
Revision: | 17 |
Risk level: | 3 |
Tag: | P2P File Sharing |
Tag: | Streaming Audio |
Tag: | Non-business Related |
Radio Javan is a music platform for Persian and Iranian musics. This plugin classifies traffic related to a free account.
Rakuten TV is a video-on-demand (VOD) streaming service. This plugin classifies traffic for Europe and Japan.
Family: | Audio/Video |
Over: | akamai |
Over: | amagi |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | quic |
Over: | rakuten_video |
Over: | spdy |
Over: | ssl |
Over: | zendesk |
Revision: | 1 |
Risk level: | 2 |
Tag: | Streaming Video |
Tag: | Non-business Related |
Roku is a brand of smart TV operating systems, smart TVs, streaming devices, smart home and audio products.
The Real-time Transport Control Protocol (RTCP) allows monitoring of the data delivery in a manner scalable to large multicast networks, and to provide minimal control and identification functionality. This plug-in also classifies the encrypted profile of RTCP, known as SRTCP.
RTP is the real-time transport protocol used to transmit real-time data, such as audio, video or simulation data, over multicast or unicast network services. This signature also classifies the SRTP and ZRTP encrypted transport protocols.
The Real Time Streaming Protocol ((RTSP|RTSP)) is an application-level protocol for control over the delivery of data with real-time properties. (RTSP|RTSP) provides an extensible framework to enable controlled, on-demand delivery of real-time data, such as audio and video.
Secure Real Time Streaming Protocol (RTSPS) is RTSP over TLS/SSL. It first establishes an encrypted connection and then works the same as RTSP. RTSP is a network control protocol designed for use in entertainment and communications systems to control streaming media servers. The protocol is used for establishing and controlling media sessions between end points.
Skinny Client Control Protocol (SCCP) is a Cisco proprietary protocol used between Cisco Call Manager and Cisco VOIP phones. It is also supported by some other vendors.
Family: | Audio/Video |
Over: | tcp |
Revision: | 17 |
Risk level: | 1 |
Tag: | Network Layer Protocols |
Tag: | VoIP |
Shahid is an Arabic VOD service owned by MBC Group (Middle East Brodcasting Center). See also 'Mebc' in Protobook.
Shoutcast is a protocol used to stream audio files over HTTP. This plug-in classifies streaming from the web version of Shoutcast.
Family: | Audio/Video |
Over: | bootstrapcdn |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | icy |
Over: | okta |
Over: | spdy |
Over: | ssl |
Over: | zendesk |
Revision: | 18 |
Risk level: | 2 |
Tag: | Server Applications |
Tag: | Application Layer Protocols |
Tag: | Streaming Audio |
Tag: | Non-business Related |
Secure Internet Live Conferencing (SILC) is a protocol that provides secure synchronous conferencing services (very much like IRC) over the Internet.
Silverlight is a Microsoft web browser plugin designed to render programable animations and to stream videos. It quite similar to Adobe Flash: animated vector graphics, H264 video streaming. This plug-in classifies the Silverlight applications download over HTTP, and the HTTP video streaming from these applications.
Session Initiation Protocol (SIP) is the Internet Engineering Task Force's (IETF's) standard for multimedia conferencing over IP. Like other VoIP protocols, SIP is designed to address the functions of signaling and session management within a packet telephony network.
SIP-SOAP is an extension to the standard SIP protocol allowing for SOAP messages to be passed over a SIP connection.
Sky Go is an online TV service from Sky that allows to watch video content from Mac, Windows PC, most of mobile phones or video game consoles.
Slacker Radio is an online music streaming service available from web browser and mobile application. Slacker Radio is now LiveOne.
Sling TV is a video streaming platform, a subsidiary of Dish Network and available in USA and Puerto Rico.
Slingbox is a streaming protocol over the Internet used to watch and control TV shows received from your home devices. Slingbox servers permanently offline November 9, 2022 but still supports other products that continue to use this technology.
SMARTalk is a Japanese VoIP application for Smartphones which allows you to save money when making calls. You can reduce call charges to mobiles and fixed phone lines by using a 050 phone number.
Sohu Video is the video streaming platform from Sohu. This plugin classifies browsing and video playing traffic.
Sopcast is a video streaming service based on a peer-to-peer protocol : SOP (Streaming Over Peer-to-peer).
SoundCloud is an online audio distribution platform where users can upload, promote and share their sounds with others.
Family: | Audio/Video |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | quic |
Over: | spdy |
Over: | ssl |
Over: | zendesk |
Revision: | 20 |
Risk level: | 2 |
Tag: | Streaming Audio |
Tag: | Non-business Related |
Tag: | Web Sites |
Splice is a cloud-based music creation and collaboration platform.
Family: | Audio/Video |
Over: | amazon_aws |
Over: | cloudflare |
Over: | cloudinary |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | zendesk |
Revision: | 1 |
Risk level: | 2 |
Tag: | Web Sites |
Spotify is an application of musical streaming.
Family: | Audio/Video |
Over: | adobe |
Over: | akamai |
Over: | amazon_aws |
Over: | fastly |
Over: | gcp |
Over: | google_analytics |
Over: | google_appengine |
Over: | http2 |
Over: | http3 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | rtmp |
Over: | socks4 |
Over: | socks5 |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Over: | |
Over: | udp |
Revision: | 17 |
Risk level: | 3 |
Tag: | P2P File Sharing |
Tag: | Streaming Audio |
Tag: | Non-business Related |
Stan is an Australian streaming company. Stan is owned by StreamCo.
Family: | Audio/Video |
Over: | amazon_aws |
Over: | gcp |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | quic |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Streaming Video |
Tag: | Streaming Audio |
Tag: | Web Sites |
StarHub TV+ is the video streaming service of StarHub. This plugin classifies free services of StarHub TV+.
Starz is an American cable and satellite television network. This plugin classifies traffic generated by Starz which is a website and mobile app that featured original programming and feature film content from Starz available for streaming.
Storytel is a digital subscription service that enables audio book listening from browser or smartphones.
Streamotion is a digital streaming and technology company owner of Kayo Sports, Binge and Flash video streaming services. This plugin classifies the website traffic.
Tango is an embedded smartphone application dedicated to audio/video-conference.
Family: | Audio/Video |
Over: | akamai |
Over: | amazon_aws |
Over: | cedexis |
Over: | cloudflare |
Over: | dtls |
Over: | edgecast |
Over: | gcp |
Over: | google_gen |
Over: | http2 |
Over: | http |
Over: | https |
Over: | inmoji |
Over: | jabber |
Over: | rtcp |
Over: | rtp |
Over: | spdy |
Over: | ssl |
Over: | stun |
Over: | tcp |
Over: | udp |
Over: | udt |
Over: | webrtc |
Revision: | 17 |
Risk level: | 2 |
Tag: | Video Conferencing |
Tag: | Mobile Applications |
Tag: | Non-business Related |
Telestream, Inc. is an American privately held provider of software and hardware products for video capture, encoding, transcoding, and network-based delivery.
Tencent Weishi is a short video platform. This plugin classifies traffic of the website and the iOS application.
Tencent Video is the streaming video platform owned by Tencent. The international version is named WeTV.
Tidal is a high-fidelity music and video clips streaming service for PC and mobile devices.
Family: | Audio/Video |
Over: | amazon_aws |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | quic |
Over: | rtmp |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Streaming Video |
Tag: | Streaming Audio |
Tag: | Non-business Related |
Triton Digital provides audio & podcasts streaming services.
Family: | Audio/Video |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | windows_azure |
Revision: | 1 |
Risk level: | 2 |
Tag: | Streaming Audio |
TVAnts is a peer-to-peer TV software, using the BitTorrent peer-to-peer technology. It provides a way to watch on the PC most cable and satellite as well as WebTV.
Telephony protocol by Alcatel-Lucent Enterprise which signals media flows and other control messages for the phones. The UA/UDP flows contain the Alcatel NOE protocol when the Q_PROTO_UAUDP_OPCODE attribute value is 0x15 or 0x16. The RTP flows announced by a UA/UDP session will be classified as uaudp_rtp by the ixEngine.
Family: | Audio/Video |
Over: | udp |
Revision: | 1 |
Risk level: | 1 |
Tag: | VoIP |
Tag: | Streaming Video |
Tag: | Streaming Audio |
Uusee is a peer-to-peer TV software, using the BitTorrent peer-to-peer technology. It provides a way to watch on the PC most cable and satellite TV as well as WebTV on PC. It uses the network coding technology.
WebEx is an online meeting, videoconferencing and collaborative application. Webex is owned by Cisco.
VeohTV is a VOD streaming service which includes both client software and a website with embedded flash videos.
VEVO is a music video streaming platform sponsored by Google, Universal Music Group and Sony Music Entertainment
Viaplay is a video-on-demand service for the Nordic countries, which uses Silverlight to stream videos.
Family: | Audio/Video |
Over: | akamai |
Over: | amazon_aws |
Over: | http2 |
Over: | http |
Over: | https |
Over: | level3 |
Over: | silverlight |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Web Applications |
Tag: | Mobile Applications |
Tag: | Desktop Applications |
Tag: | Streaming Video |
Tag: | Non-business Related |
Tag: | Web Sites |
Logitech Vid is a Video-over-IP service based on SightSpeed. It is used by consumers with Logitech webcams.
Videoland is a video-on-demand service, when video streaming is hosted on NEP Worldwide servers, this traffic is classified as nepworldwide. This plugin classifies the traffic on videoland.com.
Viewster delivers free video.
Family: | Audio/Video |
Over: | akamai_video |
Over: | amazon_aws |
Over: | disqus |
Over: | http2 |
Over: | http |
Over: | https |
Over: | liverail |
Over: | llnwd |
Over: | spdy |
Over: | ssl |
Revision: | 2 |
Risk level: | 1 |
Tag: | Streaming Video |
Tag: | Non-business Related |
Tag: | Web Sites |
Vix is a video streaming platform. The video streaming traffic is hosted on a Google Cloud Platfrom.
Vizio is an Amercian manufacturer of electronic devices (TV, soundbar), and also selling viewer data and advertising. This plugin classifies the website and mobile applications traffic.
Family: | Audio/Video |
Over: | adobe |
Over: | amagi |
Over: | amazon_aws |
Over: | cloudflare |
Over: | gcp |
Over: | http2 |
Over: | http |
Over: | https |
Over: | salesforce |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Mobile Applications |
Tag: | Web Sites |
VK Live is an app for live streaming on VK (popular Social Network in Russia).
Family: | Audio/Video |
Over: | vkontakte |
Revision: | 1 |
Risk level: | 2 |
Tag: | Streaming Video |
Voddler is a streaming client application distributing movies and television programming using a patented hybrid peer-to-peer distribution system.
Wynk Music is a digital music streaming & podcast distribution platform owned by Airtel Digital. This plugin classifies the traffic from the website and the Android application.
X.25 is a packet switched data network protocol which defines an international recommendation for the exchange of data as well as control information between a user device (host), called Data Terminal Equipment (DTE) and a network node, called Data Circuit Terminating Equipment (DCE).
Family: | Audio/Video |
Over: | xot |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
Xcap (XML Configuration Access Protocol) protocol in VoLTE environnement is used to setup, enable or disable the Supplementary Services available for a user.
Comcast’s Cloud DVR is a service offered as part of its Xfinity TV platform, allowing subscribers to record television shows, movies, and other content directly to the cloud rather than a traditional physical DVR device in the home.
Comcast's IP Linear Service is the Xfinity IPTV service, transmitting live television channels over an IP network, rather than through traditional broadcast methods.
Xfinity TV is a video platform (including Linear TV and Cloud DVR) from Comcast, part of the XFinity offer and also available from some of their partners.
Xprotect is a professional video surveillance system provided by Milestone Systems. This plugin only support the demonstration version on mobile devices.
Yandex Music is a music and radio streaming web service by Yandex. Most of the traffic is classified as yandex only.
Yandex Stream is the plugin for the hosting service used by Yandex services for multimedia streaming (Yandex Music, Yandex, ...).
The CHAP protocol is used to verify the identity of a peer on a point-to-point link.
Family: | Authentication |
Over: | ppp |
Revision: | 18 |
Risk level: | 4 |
Tag: | Information Leaking |
Tag: | Server Applications |
CRYPTOAdmin is a remote authentication solution, enabling its users to access a remote enterprise's LAN. The solution is built of two parts: the CRYPTOAdmin authentication server and CRYPTOCard tokens and smart cards. Together, these provide strongly secured access to a remote enterprise network.
Diameter is an AAA (authentication, authorization and accounting) protocol for computer networks and an alternative to RADIUS.
The Identification Protocol provides a means to determine the identity of a user of a specific TCP connection.
Family: | Authentication |
Over: | tcp |
Revision: | 17 |
Risk level: | 3 |
Tag: | Network Utilities |
Tag: | Server Applications |
A key server is a computer that receives and then serves existing cryptographic keys to users or other programs. The users' programs can be working on the same network as the key server or on another networked computer.
Kerberos provides a means to verify the identities of the different workstations on an open (unprotected) network.
NDS authentication is the process of proving one's identification to Network Domain Security. Authentication is accomplished by having an object in the NDS tree represent the user requesting access. This object contains or has access to all of the pertinent information about the user (i.e., password signature, encryption keys, etc.) that NDS needs to prove that users communicating from client machines are who they say they are.
OneLogin is a cloud-based identity and access management owned by One Identity.
Family: | Authentication |
Over: | amazon_aws |
Over: | fcm |
Over: | http2 |
Over: | http |
Over: | https |
Over: | service_now |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Web Sites |
The Password Authentication Protocol (PAP) provides a simple authentication method over a PPP link.
Family: | Authentication |
Over: | ppp |
Revision: | 18 |
Risk level: | 3 |
Tag: | Network Utilities |
Tag: | Server Applications |
RADIUS (Remote Authentication Dial-In User Service) is a client/server protocol that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
Family: | Authentication |
Over: | udp |
Revision: | 17 |
Risk level: | 4 |
Tag: | Network Utilities |
Tag: | Information Leaking |
Tag: | Server Applications |
Socks 4 is an authentication protocol.
Family: | Tunneling |
Over: | tcp |
Revision: | 18 |
Risk level: | 3 |
Tag: | Tunnels |
TACACS+ (Terminal Access Controller Access-Control System Plus) is a Cisco Systems proprietary protocol which provides access control for routers, network access servers and other networked computing devices via one or more centralized servers.
Family: | Authentication |
Over: | tcp |
Revision: | 16 |
Risk level: | 4 |
Tag: | Network Utilities |
Tag: | Server Applications |
The Yellow Page Password protocol enables the modification of logins and passwords in Network Interface System cards.
Family: | Authentication |
Over: | rpc |
Revision: | 17 |
Risk level: | 4 |
Tag: | Network Utilities |
Tag: | Server Applications |
Yellow Pages Server is a protocol used to distribute NIS databases to client systems within an NIS domain.
Family: | Authentication |
Over: | rpc |
Revision: | 17 |
Risk level: | 4 |
Tag: | Network Utilities |
Tag: | Server Applications |
The Compression Control Protocol (CCP) is responsible for configuring data compression algorithms on a point-to-point link.
Family: | Compression |
Over: | ppp |
Revision: | 18 |
Risk level: | 1 |
Tag: | Network Layer Protocols |
COMP protocol is used for data compression over PPP.
Family: | Compression |
Over: | ppp |
Revision: | 18 |
Risk level: | 1 |
Tag: | Network Layer Protocols |
Bodet is a French company specialized in time monitoring in managing. This module manages protocol related to Bodet Time and Attendance software.
Family: | ERP |
Over: | tcp |
Revision: | 2 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
This plugin classifies of Experion Control Builder for Server LX.
Family: | Middleware |
Over: | udp |
Revision: | 2 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
Tag: | Industrial Protocols |
Folding@Home is software allowing to run distributed computed algorithms for research projects.
Family: | Thin Client |
Over: | amazon_aws |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | windows_azure |
Revision: | 2 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Tag: | Non-business Related |
Apache Cassandra is an open-source distributed NoSQL database. This plugin classifies the un-encrypted inter-node communication. Client to cluster flows are classified as cassandra.cql.
Compact Disc Database (CDDB) is a database for software applications to look up audio CD (compact disc) information over the Internet. This is performed by a client which calculates a (nearly) unique disc ID and then queries the database. As a result, the client is able to display the artist name, CD title, track list and some additional information.
Couchbase Server is a distributed, open source NoSQL database engine, storing key/values or JSON documents.
Apache Cassandra is an open-source distributed NoSQL database (classified as cassandra). This plugin classifies the Cassandra Query Language (CQL) protocol used by clients.
DB2 is a relational model database server from IBM which has its roots in the early 1980s. It runs on IBM mainframes and is also available for Linux/Unix/Windows.
Elevate Software DBISAM is a database server designed to be embedded in other software products.
Family: | Database |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Server Applications |
IBM Lotus Domino domain monitoring (DDM) provides one location in the Domino Administrator client that you can use to view the overall status of multiple servers across one or more domains, and then use the information provided by DDM to quickly resolve problems.
Distributed Data Management (DDM) is a function of the operating system that allows an application program or user on one system to use database files stored on remote systems. The systems must be connected by a communications network, and the remote systems must also be using DDM. With distributed relational database, information the client needs to connect to a database is provided in the relational database directory.
DRDA is a protocol for carrying out SQL queries and commands.
Family: | Database |
Over: | tcp |
Revision: | 17 |
Risk level: | 4 |
Tag: | Server Applications |
Tag: | Application Layer Protocols |
FileMaker Pro is a relational database application from FileMaker Inc and which runs on Microsoft Windows as well as Mac OS.
Apache Hadoop is an open source tool that enables distributed parallel processing of huge amounts of data across servers that both store and process the data.
Family: | Database |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
Tag: | Network Utilities |
Hbase is a distributed database based on Google Bigtable.
Family: | Database |
Over: | hdfs |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
Protocol used by Hadoop to store and exchange data across a cluster.
Family: | Database |
Over: | google_gen |
Over: | hadoop |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
Traffic related to Honeywell Process History Database (PHD).
Family: | Database |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
HPRC is used between client and NameNode machine.
Family: | Database |
Over: | hdfs |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
IBM DB2 is a database software solution that works on different operating systems (Linux, Unix, Windows) which provide performance for mixed workloads on distributed systems, and offers efficiencies for staffing and storage.
Informix is a family of relational database management systems developed by IBM. IBM acquired the Informix technology in 2001 but it dates back to 1981.It runs on IBM mainframes and is also available for Linux/Unix/Windows.
Intersystem IRIS is a database and application server, used in healthcare, BI, and financial applications.
SAP MaxDB is an SQL compliant database.
Family: | Database |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Server Applications |
Tag: | Desktop Applications |
Mobilink is a proprietary, binary, TCP based protocol which is used to synchronize the contents of multiple mobile client databases with a central SQL Server. The clients can run on smartphones, Java applets, etc., in addition to PC computers.
Family: | Database |
Over: | tcp |
Revision: | 17 |
Risk level: | 4 |
Tag: | Server Applications |
Mongodb is a relational database management system (RDBMS).
Family: | Database |
Over: | tcp |
Revision: | 1 |
Risk level: | 4 |
Tag: | Server Applications |
Microsoft Distributed Transaction Coordinator (MS-DTC) ensures consistency of transactions in a cluster. It can be used with products such as MS SQL or Oracle DB. This plugin classify the underlying MS-CMPO, OleTx Transports Protocol.
Microsoft SQL Server Analysis Services (MS-SSAS) is SQL Server's optional component for OnLine Analytical Processing (OLAP). This plugin classifies XMLA (XML for Analysis) which is a SOAP protocol for accessing those databases.
Family: | Database |
Over: | soap |
Revision: | 1 |
Risk level: | 2 |
Tag: | Server Applications |
Tag: | Application Layer Protocols |
Microsoft SQL Server Resolution Protocol (MC-SQLR) is a discovery protocol for Microsoft SQL Server instances.
Family: | Database |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
MySQL is an open source relational database management system (RDBMS) that uses Structured Query Language (SQL), the most popular language for adding, accessing, and processing data in a database. This plug-in support Bind Variables types and values extraction (Q_MYSQL_BIND_VARIABLE), using session context storage. This can cause significant per-session memory consumption, depending on traffic and database usage. Check mysql layer proto-tunes to define limits related to this usage.
Oracle Real Application Clusters (Oracle RAC) is an option for Oracle Database that provides clustering and high availability. This protocol plug-in classifies the proprietary Oracle UDP IPC protocol only, not the Open Source RDS protocol.
Family: | Database |
Over: | udp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Server Applications |
Tag: | Application Layer Protocols |
PostgreSQL is a sophisticated Object-Relational DBMS, supporting almost all SQL constructs, including subselects, transactions, and user-defined types and functions.
Remote Database Access (RDA) is a protocol standard for database access. RDA describes the connection of a database client to a database server. It includes features for communicating database operations and parameters from the client to the server, transporting result data from the server to the client, and database transaction management.
Redis is a data structure server. It is open-source, networked, in-memory, and stores keys with optional durability.
Family: | Database |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
Tag: | Business Applications |
IBM Informix SQL is a database application development system that features a suite of application development tools for small and large database applications. The Informix SQL suite includes a schema editor, menu builder, SQL editor, forms builder, and report writer.
The SQLI protocol (Structured Query Language Interface) is a proprietary protocol seemingly used exclusively in IBM Informix servers.
Family: | Database |
Over: | tcp |
Revision: | 18 |
Risk level: | 4 |
Tag: | Server Applications |
REAL SQL Server is a relational database management system (RDBMS) built on top of the sqlite database engine.
Sybase protocols are used to exchange messages (namely authentication and SQL queries) between database clients and servers developed by the Sybase Company.
TDS protocol is used to communicate between SQL applications and a SQL Server. Note: Prior to TDS version 8, a PRELOGIN message can wrap a TLS payload.
Transparent Network Service (TNS) is the Oracle (version 8 or higher) networking technology that provides a single application interface to all industry-standard networking protocols. To connect to a database, users initiate a connect request by passing information (username and password) along with a short name for the database service they wish to connect to.
Family: | Database |
Over: | tcp |
Revision: | 17 |
Risk level: | 4 |
Tag: | Server Applications |
Tag: | Application Layer Protocols |
I2P (Invisible Internet Project) is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
The IPsec protocol suite includes Encapsulation Security Payload (ESP) and Authentication Header (AH) protocols.
The Internet Security Association and Key Management Protocol (ISAKMP) defines procedures and packet formats to establish, negotiate, modify and delete Security Associations (SA).
This network protocol is used for validating certificates.
Family: | Encrypted |
Over: | amazon |
Over: | amazon_aws |
Over: | apple |
Over: | cloudflare |
Over: | google_gen |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | microsoft |
Over: | spdy |
Over: | ssl |
Revision: | 17 |
Risk level: | 2 |
Tag: | Network Utilities |
Tag: | Application Layer Protocols |
Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-based command interface and a protocol for obtaining secure access to a remote computer.
Family: | Encrypted |
Over: | evasive_protocol |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | http_tunnel |
Over: | https |
Over: | net_proxy |
Over: | spdy |
Over: | tcp |
Revision: | 17 |
Risk level: | 2 |
Tag: | Allows Remote Control |
Tag: | Encrypts communications |
Tag: | Tunnels |
Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. SSL has recently been succeeded by Transport Layer Security (TLS), which is based on SSL.
Family: | Encrypted |
Over: | cotp |
Over: | epic_emr |
Over: | hola_webproxy |
Over: | http |
Over: | http_proxy |
Over: | intersystem_iris |
Over: | libjingle_pseudotcp |
Over: | openvpn |
Over: | quic |
Over: | socks4 |
Over: | socks5 |
Over: | tcp |
Over: | tds |
Revision: | 17 |
Risk level: | 2 |
Tag: | Encrypts communications |
Tor is an application that intends to provide online anonymity. This protocol plug-in classifies the usage of the Tor application in the NORMAL MODE only. The BRIDGE RELAY mode is not supported.
AS2 (RFC4130) is a protocol for automatic B2B exchange of financial documents. This plugin classified AS2 when used over unencrypted HTTP.
Family: | ERP |
Over: | globalscape_eft |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Revision: | 2 |
Risk level: | 3 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
Bill.com is a U.S. provider of cloud-based billing software that serves to track purchases and create and receive payments for invoices.
Family: | ERP |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | zendesk |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
BMI G-Force Plus RF is a device for managing forklifts.
Family: | ERP |
Over: | dbisam |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Industrial Protocols |
Siemens Opcenter Execution Core, formerly known as Camstar Enterprise Platform, is a Manufacturing Execution System (MES). This plugin classifies the XML server and HTTP Web Services.
CONTPAQi is a Mexican accounting software editor. This plugin classifies the websites and on-line API endpoints of the software.
Family: | ERP |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | microsoft |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Over: | tds |
Over: | windows_azure |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Tag: | Web Sites |
Ordinal Coox is a Manufacturing Execution System. This plugin classifies the Coox specific protocol.
Family: | ERP |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Industrial Protocols |
Drift Conversation Cloud is a customer relationship platform that offers website integration of functionalities such as chat.
Microsoft Dynamics is the enterprise resource planning (ERP) and customer relationship management (CRM) platform. This plugin classifies Cloud version of Microsoft Dynamics.
Oracle Eloqua Marketing Automation is a marketing and lead management SaaS. This plugin classifies the public facing part of Eloqua.
Epicor is an Enterprise Resource Planning (ERP) system. This plugin classifies traffic on its SaaS (epicorsaas.com) as well as local MS NMF flows.
Family: | ERP |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | ms_nmf |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Over: | windows_azure |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
Tag: | Web Sites |
FreshBooks is an ERP SaaS for small businesses. It provides invoicing, basic project management, and expense reports functions, as well as access to additional functionalities provided by third parties extensions such as payment with Stripe or PayPal.
Gestor, edited by GFI now Inetum, is an employee time tracking solution. This plugin classifies various GFI punch clock devices associated with Gestor.
Family: | ERP |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
HubSpot is a CRM provided as a SaaS, that can be integrated on a website, including chat and marketing emails.
Family: | ERP |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | salesforce |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | |
Tag: | Social Networking |
Tag: | Business Applications |
Tag: | Web Sites |
Interflex is a provider of access control and workforce management hardware. Protocol used for communicating with some Interflex IF-40xx Terminal Controllers.
Family: | ERP |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Protocol used for communication with RFID readers.
Family: | ERP |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Tag: | Industrial Protocols |
Miller Insight Centerpoint is a welding station real time data collector. This plugin classifies communications with several Miller welding stations.
Family: | ERP |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Industrial Protocols |
Mulesoft allows creation of API and data connectors. This plugin classifies the Anypoint SaaS and CloudHub PaaS.
Oracle BI is Business Intelligence suite. This plugin classifies the web application’s HTTP server.
Family: | ERP |
Over: | european_union_portal |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Practice Ignition allows to submit and get approval for a commercial proposal to a customer. It is available as SaaS.
Family: | ERP |
Over: | amazon_aws |
Over: | bamboo_hr |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Tag: | Web Sites |
Primion Time and attendance solutions offer employee and room time monitoring software and hardware. This plugin classify traffic from ADT and DT devices.
Family: | ERP |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
SAP is an Enterprise Resource Planning (ERP). This plugin classifies the SAP Dynamic Information and Action Gateway (DIAG) protocol, and the SAP Netweaver web server.
Tareas IDEI is an AT&T application to manage the tasks to be performed by field workers, it also allows teams to capture data as they perform their work (track the location, progress of tasks and daily activities).
TimePro VG is a 'Time and Attendance' Software developed by Amano.
Family: | ERP |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Workday provides cloud based finance and HR software. On internal networks a part of the traffic won't be classified as Workday.
Protocol used for communication with Zebra RFID readers.
Family: | ERP |
Over: | llrp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
9P is a network protocol developed by Bell Labs and distributed in their Operating System Plan 9.
Family: | File Server |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | File Storage and Sharing |
Tag: | Network Layer Protocols |
Apple Filing Protocol (AFP) is a file sharing protocol used on Mac.
Family: | File Server |
Over: | dsi |
Revision: | 1 |
Risk level: | 4 |
Tag: | File Storage and Sharing |
Tag: | Application Layer Protocols |
AVAMAR is a backup system distributed by Dell EMC offering data deduplication. System with data deduplication is able to backup only once a duplicated object like an email or file that has been copied several times on a system. Classification focus on classification of traffic between client and server.
Clariion is a SAN product line from EMC. NaviSphere is its remote configuration interface. This plugin classifies the internal communication protocols and web interface of NaviSphere.
Family: | File Server |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | File Storage and Sharing |
Tag: | Network Layer Protocols |
Tag: | Desktop Applications |
The FTP protocol is used for reliable data transfer between a client and a server.
Family: | File Server |
Over: | http_proxy |
Over: | socks4 |
Over: | socks5 |
Over: | tcp |
Revision: | 17 |
Risk level: | 3 |
Tag: | File Storage and Sharing |
Tag: | Application Layer Protocols |
Secure version of the FTP protocol.
Family: | File Server |
Over: | ssl |
Revision: | 18 |
Risk level: | 2 |
Tag: | Encrypts communications |
Tag: | File Storage and Sharing |
Tag: | Application Layer Protocols |
FTP is a communication protocol made for share files in the network TCP/IP
Family: | File Server |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Encrypts communications |
Tag: | File Storage and Sharing |
Tag: | Application Layer Protocols |
Enhanced File Transfer(EFT) is a file server from GlobalScape, a HelpSystems company, for sharing business files with internal and external users.
GMAIL Drive is a Shell Namespace Extension that creates a virtual file system around a Google Mail account, allowing Gmail as a storage medium. GMAIL Drive is only classified over http and not over https.
Family: | File Server |
Over: | gmail |
Revision: | 17 |
Risk level: | 3 |
Tag: | File Storage and Sharing |
GridFTP is an extension to the FTP protocol for the grid computing platform Globus to allow peer-to-peer transfers of large files
The Hotline protocol is used to upload/download files, to chat and to get news about chatters (it is not a peer-to-peer protocol).
iRods is an open source massive data management and storage software.
Family: | File Server |
Over: | tcp |
Revision: | 3 |
Risk level: | 2 |
Tag: | File Storage and Sharing |
Tag: | Business Applications |
Mailbox-LM is a used by FTP Daemon, a file transfer protocol server designed to work with IBM Sterling Gentran:Server for UNIX with ADD. The daemon is a tool that provides the user's trading partners direct access to their mailboxes while enabling the user to limit their access to other components of the user's EDI system.
The Mount protocol is related to the NFS protocol. It provides operating system specific services to launch the NFS protocol -- looking up server path names, validating user identity, and checking access permissions.
Family: | File Server |
Over: | rpc |
Revision: | 17 |
Risk level: | 4 |
Tag: | File Storage and Sharing |
Tag: | Application Layer Protocols |
Tag: | Non-business Related |
NetBIOS defines a software interface and standard methods providing a communication interface between the application program and the attached medium. NetBIOS is used in various LAN (Ethernet, Token Ring etc) as well as WAN environments such TCP/IP, PPP and X.25 networks.
The NFS protocol provides transparent remote access to shared file systems across networks as described in RFC 1813. This plug-in also classifies the experimental legacy version of NFS (v1) developed by Sun, but does not provide attribute extraction for this version.
Family: | File Server |
Over: | rpc |
Revision: | 17 |
Risk level: | 4 |
Tag: | File Storage and Sharing |
Tag: | Application Layer Protocols |
Tag: | Non-business Related |
The NFS protocol provides transparent remote access to shared file systems across networks as described in RFC 7530 and 7531. This plug-in only classifies the version 4.0 of NFS.
Family: | File Server |
Over: | rpc |
Revision: | 1 |
Risk level: | 1 |
Tag: | File Storage and Sharing |
The network lock manager is a facility that works in cooperation with the Network File System (NFS) to provide a System V style of advisory file and record locking over the network.
Family: | File Server |
Over: | rpc |
Revision: | 17 |
Risk level: | 3 |
Tag: | Network Utilities |
Tag: | Application Layer Protocols |
Symantex Private Branch Exchange service protocol, used in the Veritas NetBackup data backup software.
Family: | File Server |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Server Applications |
Tag: | Application Layer Protocols |
Prospero Data Access Protocol (PDAP) is used to implement the Prospero File System, which is based on the Virtual System Model.
Classifies the Symantec NetBackup streams that use the Quantum DXi replication solution. This implements the OpenStorage API (OST).
Family: | File Server |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
RemoteFS is a network file system designed for use with home NAS. Simple to use, few dependencies, reasonable security, completely in user space.
The RQuota protocol enables the implementation of quotas on remote machines. It is used in conjunction with the NFS protocol.
Family: | File Server |
Over: | rpc |
Revision: | 17 |
Risk level: | 3 |
Tag: | File Storage and Sharing |
Tag: | Application Layer Protocols |
The RStat protocol is used in the Sun NFS family to exchange statistics on network activity.
Family: | File Server |
Over: | rpc |
Revision: | 17 |
Risk level: | 3 |
Tag: | File Storage and Sharing |
Tag: | Application Layer Protocols |
Rsync is a protocol used by various services performing updates. It greatly speeds up the update process since only the differences between two sets of files are transfered, instead of the whole new file.
The RUser's protocol provides a service that lists users currently logged on a remote server.
Family: | File Server |
Over: | rpc |
Revision: | 17 |
Risk level: | 4 |
Tag: | Information Leaking |
Tag: | Application Layer Protocols |
SFS config server is part of the Shared File Systems (SFS) a high performance, HIPPI-based common system which is shared among CRI UNICOS systems only.
The Server Message Block protocol (SMB) provides a method for client applications to read and write to files and to request services from server programs in a computers network. This protocol plug-in supports SMB/SMB2 protocols, as well as SMB 3.0 when SMB Multichannel is not in use. The SMB RDMA (Remote Direct Memory Access) implementation over the iWarp stack (incl. SMB Direct) is supported.
Family: | File Server |
Over: | netbios |
Over: | smb_direct |
Over: | tcp |
Revision: | 17 |
Risk level: | 4 |
Tag: | File Storage and Sharing |
Tag: | Information Leaking |
SUNDR is a network file system designed to store data securely on untrusted servers. SUNDR lets clients detect any attempts at unauthorized file modification by malicious server operators or users. SUNDR's protocol achieves a property called fork consistency, which guarantees that clients can detect any integrity or consistency failures as long as they see each others file modifications. An implementation is described that performs comparably with NFS (sometimes better and sometimes worse), while offering significantly stronger security.
The Sync protocol is an RPC service allowing data synchronization.
Family: | File Server |
Over: | rpc |
Revision: | 17 |
Risk level: | 3 |
Tag: | Network Utilities |
Trivial File Transfer Protocol (TFTP) is a file transfer protocol that is simpler to use than the File Transfer Protocol (FTP) but that proposes less features. TFTP uses the User Datagram Protocol (UDP) rather than the Transmission Control Protocol (TCP).
Family: | File Server |
Over: | udp |
Revision: | 17 |
Risk level: | 4 |
Tag: | File Storage and Sharing |
Tag: | Network Utilities |
Tag: | Application Layer Protocols |
This plugin supports fourth version of UDT (https://tools.ietf.org/html/draft-gg-udt-03) over UDP. This protocol is involved in GridFTP infrastructure. It is a protocol for high performance data transfer with multiplexing and session control.
Family: | File Server |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | File Storage and Sharing |
Tag: | Network Layer Protocols |
WorkSite is a Document Management System (DMS) application. It is primarily used by law firms and corporate legal departments.
Family: | File Server |
Over: | rpc |
Revision: | 1 |
Risk level: | 1 |
Tag: | File Storage and Sharing |
Tag: | Business Applications |
The Yellow Pages Update protocol enables information updates in Network Information Services (NIS) cards.
Family: | File Server |
Over: | rpc |
Revision: | 17 |
Risk level: | 4 |
Tag: | Information Leaking |
Tag: | Server Applications |
Tag: | Application Layer Protocols |
Acronis Backup is a backup platform that use cloud or local storage and can save multiple hosts using agents. Online storage is classified as acronis_cloud.
Family: | File Transfer |
Over: | acronis |
Revision: | 1 |
Risk level: | 2 |
Tag: | File Storage and Sharing |
AIM is an instant messaging protocol. This plug-in classifies download flows of files that are exchanged between AIM application users.
Advanced Maryland Automatic Network Disk Archiver (AMANDA) is an open source computer archiving tool
Background File Transfer Program (BFTP) is a file transfer service that is built upon the third-party transfer model of FTP. It performs file transfer asynchronously and eliminates requirement for a human user to be directly involved at the time that a file transfer takes place.
Background Intelligent Transfer Service (BITS) transfers files (downloads or uploads) between a client and server and provides progress information related to the transfers.
The Coherent File Distribution Protocol (CFDP) has been designed to speed up one-to-many file transfer operations that exhibit traffic coherence on media with broadcast capability. Examples of such coherent file transfers are identical diskless workstations booting simultaneously, software upgrades being distributed to more than one machines at a site, a certain "object" (bitmap, graph, plain text, etc.) that is being discussed in a real-time electronic conference or class being sent to all participants, and so on. A CFDP client that wants to receive a file first contacts a server to acquire a "ticket" for the file in question. This server could be a suitably modified BOOTP server, the equivalent of the tftpd daemon, etc. The server responds with a 32-bit ticket that will be used in the actual file transfers.
CVSup is a computer program written for Unix/Linux based systems that synchronizes files and directories from one location to another while minimizing data transfer using file-type specific delta encoding when appropriate. CVSup was designed for keeping source code repositories - such as CVS - synchronized, but has been extended to support synchronizing any type of file.
Tivoli Storage Manager, renamed Spectrum Protect, is a backup software from IBM. This plugin classifies versions before Spectrum Protect Plus.
This protocol is used to transport data in IRC file transfer.
Family: | File Transfer |
Over: | tcp |
Revision: | 15 |
Risk level: | 3 |
Tag: | P2P File Sharing |
Tag: | Non-business Related |
Jabber transfer is an open standard to transfer files between two Jabber clients.
Family: | File Transfer |
Over: | tcp |
Revision: | 17 |
Risk level: | 3 |
Tag: | P2P File Sharing |
Tag: | Non-business Related |
Multisource File Transfer Protocol (MFTP) is designed for the purpose of file sharing. It is still under development, and therefore may acquire more features. This is the communication protocol used by such clients as eMule and eDonkey and, in its extended implementation, by the Overnet network.
My Pocket is a service that enables the user to send his smartphone data into the personal cloud. Data storage and sharing among users form part of the services provided. On the smartphone, there's an application to manage photos, videos, address book, and can be accessed via the WEB browser from a computer over the internet.
NetWare is a computer network operating system by Novell. NetWare Over TCP/IP feature makes both NetWare Core Protocol (NCP) and Novell Directory Services (NDS) application-layer protocols in the Internet protocol suite without the need for IPX encapsulation or special naming support.
The NI FTP is a two-party file transfer protocol. The transfer occurs in two phases. In the first, the transfer is defined and the attributes of the data to be transferred are negotiated. In the second, the data is actually transferred.
OBject Exchange (OBEX) is a communications protocol that facilitates the exchange of binary objects between devices.
Paltalk is an instant messaging protocol.
Family: | File Transfer |
Over: | tcp |
Revision: | 17 |
Risk level: | 3 |
Tag: | Instant Messaging |
Tag: | P2P File Sharing |
Tag: | Non-business Related |
Port File Transfer Program (PFTP) is a file transfer protocol that transfers files, directories and data from standard input to any host on the net running PFTP.
The Rush render queue allows users to manage jobs. A 'job' is usually just a range of frames that need to be rendered. The render queue consists of two executables: rush(1) is the command line oriented user front end tool and rushd(8) is the network daemon that runs on each host, one daemon per host.
Simple Asynchronous File Transfer (SAFT) is an internet protocol designed to do asynchronous file transfer: any user A can send a file to another user B without B doing any action. Is used by sendfile software.
Sender-Initiated File Transfer (SIFT) protocol, also commonly called Unsolicited File Transfer (UFT) protocol is a file transfer protocol. It's method contrasts with other file transfer methods in that the sender need not have an account or any registration on the target host system, and the receiving user may have less steps to take to retrieve the file(s) sent. Unlike traditional file transfer, UFT lends itself handily to background or deferred operation, though it may be carried out immediately, even interactively.
Media Shuttle is a cloud based file sharing solution from Signiant targeting high volume transfers. It have enterprise work flows management capabilities. This plugin classifies Signiant web site, MediaShuttle web interface, Signiant file transfer protocol.
Classifies the Windows agent used by Active Backup for Business on Synology NAS.
Family: | File Transfer |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Veeam is a backup for virtual and physical hosts. It is compatible with major virtualization software and cloud storage products, and has specific methods for backing-up certain software products, each of which is classified by its own plugin. This plugin classifies the Veeam website and the Veeam backup agent.
Baidu Tieba is the Baidu forum platform. This plugin only classifies website and applications browsing.
LinkedIn is professional social network.
Family: | Forum |
Over: | amazon_aws |
Over: | cloudflare |
Over: | edgecast |
Over: | gstatic |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | office365 |
Over: | slideshare |
Over: | spdy |
Over: | ssl |
Revision: | 20 |
Risk level: | 3 |
Tag: | Social Networking |
Tag: | Non-business Related |
Windows Live Groups is an online service by Microsoft that enables users to create their social groups for sharing, discussion and coordination.
This protocol plug-in classifies the http traffic of any client for chat.mibbit.com. It also classifies the ssl traffic to the Common Names web2.mibbit.com and chat.mibbit.com.
Moodle is an open-source learning platform (MOOC). This plugin classifies Moodle website, Moodle cloud instances and HTTP only local instances.
Family: | Forum |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Web Sites |
The Network News Transport Protocol (NNTP) is used for the distribution, inquiry, retrieval and posting of net news articles using a reliable stream-based mechanism.
Secure version of the NNTP protocol.
Family: | Forum |
Over: | ssl |
Revision: | 18 |
Risk level: | 1 |
Tag: | Application Layer Protocols |
Quora is a question-and-answer platform.
Family: | Forum |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | qualtrics |
Over: | spdy |
Over: | ssl |
Over: | zendesk |
Revision: | 1 |
Risk level: | 3 |
Tag: | Mobile Applications |
Tag: | Web Sites |
Mobile app which allows to browse forums.
Family: | Forum |
Over: | amazon_aws |
Over: | google_analytics |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Mobile Applications |
VK Group, former Mail.ru group, is a Russian social network editor. Their services includes VKontakte, Mail.ru, and Odnoklassniki.
Family: | Forum |
Over: | aim |
Over: | akamai |
Over: | amazon_aws |
Over: | cloudflare |
Over: | dtls |
Over: | http2 |
Over: | http3 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | itunes |
Over: | jabber |
Over: | mediascope |
Over: | rtcp |
Over: | rtmp |
Over: | rtp |
Over: | spdy |
Over: | ssl |
Over: | stun |
Over: | tcp |
Over: | udp |
Over: | wamba |
Over: | webrtc |
Revision: | 1 |
Risk level: | 4 |
Tag: | Social Networking |
Tag: | Web Sites |
Yahoo! Groups offers free mailing lists, photo and file sharing, group calendars and more.
Family: | Forum |
Over: | yahoo |
Revision: | 17 |
Risk level: | 3 |
Tag: | Social Networking |
Tag: | Social Plugins |
Tag: | Non-business Related |
Akatsuki Inc is a mobile game and a live experience platform. This plugin classifies website traffic.
Mobile game.
Family: | Game |
Over: | amazon_aws |
Over: | flurry |
Over: | google_ads |
Over: | http2 |
Over: | http |
Over: | https |
Over: | quic |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Mobile Applications |
Tag: | Non-business Related |
Amazon Luna is a cloud based gaming subscription service from Amazon. Games are streamed to the browser.
Angry Birds is a mobile game edited by Rovio.
Family: | Game |
Over: | amazon_aws |
Over: | facebook_apps |
Over: | gcp |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Mobile Applications |
Tag: | Non-business Related |
Apex Legends is an online shooting video game available on PC and consoles (ps4, xbox one), published by Electronic Arts.
Family: | Game |
Over: | amazon_aws |
Over: | electronic_arts |
Over: | http |
Over: | ssl |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Asphalt9 is a multiplayer car racing game developed and published by Gameloft. This plugin classifies mobile versions.
Battlefield 1 is a first-person shooter video game published by Electronic Arts and released in October 2016.
Family: | Game |
Over: | amazon_aws |
Over: | electronic_arts |
Over: | http2 |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Brawlhalla is a free to play battle arena on-line multiplayer game edited by Blue Mammoth Games and plublished by Ubisoft.
Family: | Game |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | ubisoft |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Call of duty (aka COD) is a video game First Personal Shooter (FPS) available on Xbox, PS4, Microsoft windows and published by Activision. This plugin classifies the World War II edition.
Call of Duty: Mobile is a free to play mobile videogame. This plugin classifies only the traffic generated by the online playing.
Mobile game.
Family: | Game |
Over: | amazon_aws |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Mobile Applications |
Tag: | Non-business Related |
Diablo III is a hack and slash action role-playing video game developed and published by Blizzard Entertainment.
Dota2 2 is a free-to-play multiplayer online battle arena (MOBA) video game developed and published by Valve Corporation. UDP streams will be classified as steam only
The Dragon Ball video game series are based on the manga and anime. This plugin classifies traffic generated by DRAGON BALL FighterZ video game.
Everquest is a 3D fantasy massively multiplayer online role-playing game (MMORPG), for Windows platforms, developed by Sony Online Entertainment(SOE).
Fifa is a football video game edited by EA Sports. This plugin classifies video game online traffic.
Family: | Game |
Over: | electronic_arts |
Over: | http |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Final Fantasy XIV Online is a massively multiplayer online role-playing game (MMORPG) published by Square Enix.
Family: | Game |
Over: | http |
Over: | square_enix |
Over: | ssl |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Fortnite is a game developed by Epic Games.
Family: | Game |
Over: | akamai |
Over: | amazon_aws |
Over: | epic_games |
Over: | http2 |
Over: | http |
Over: | https |
Over: | sip |
Over: | spdy |
Over: | ssl |
Over: | unreal_engine |
Over: | vivox |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Free Fire is a mobile video game published by Garena.
Family: | Game |
Over: | akamai |
Over: | amazon_aws |
Over: | garena |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Mobile Applications |
Games for mobile devices by Gameloft.
Family: | Game |
Over: | amazon_aws |
Over: | bootstrapcdn |
Over: | helpshift |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Over: | udp |
Revision: | 3 |
Risk level: | 2 |
Tag: | Games |
Tag: | Mobile Applications |
Tag: | Non-business Related |
GTA5 is a video game developed by Rockstar Games.
Family: | Game |
Over: | rockstargames |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Halo is a video game First Personal Shooter (FPS) available on Microsoft platforms (PC, Xbox) and published by Microsoft. This plugin classifies the Halo 5 game exclusive to XboxOne.
Hearthstone is an online multiplayer card game, developed and published by Activision-Blizzard.
Family: | Game |
Over: | battlenet |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
This protocol plug-in classifies the http traffic to the host imvu.com.
Family: | Game |
Over: | amazon_aws |
Over: | cloudflare |
Over: | gcp |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | spdy |
Over: | ssl |
Revision: | 19 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
This plugin classify injustice 2 web site. Injustice 2 is an online game edited by NetherRealm Studios and published by Warner Bros.
Kali is an IPX network emulator for DOS and Windows, enabling legacy multiplayer games to work over a modern TCP/IP network such as the Internet. Later versions of the software also functioned as a server browser for games that natively supported TCP/IP.
King is a mobile game editor. This plug-in handles King games content delivery traffic and King.com website access.
This protocol plug-in classifies the http traffic to the host linegame.jp, the portal of various Line games.
Line Wind Runner is a popular asian mobile device game accessible from the Line application.
Family: | Game |
Over: | hangame |
Over: | line_games |
Revision: | 2 |
Risk level: | 2 |
Tag: | Games |
Tag: | Mobile Applications |
Tag: | Non-business Related |
League of Legends is a popular Multiplayer Online Battle Arena video game developed by Riot Games.
Family: | Game |
Over: | akamai |
Over: | amazon_aws |
Over: | cloudflare |
Over: | fastly |
Over: | garena |
Over: | http2 |
Over: | http |
Over: | https |
Over: | qq_web |
Over: | riot_games |
Over: | spdy |
Over: | ssl |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
The Lord of the Rings Online is a video game of type MMORPG inspired of the world of The Lord of the Rings.
2013 for Kakao (aka Magu-Magu) is Korean baseball game, developped by CJ E&M corp.
Family: | Game |
Over: | netmarble |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Mario Kart Tour is a video game edited by Nintendo. This plugin classifies the game and its associated website.
Meta Quest is the Facebook VR headset. This plugin classifies Horizon Workrooms, Horizon Worlds traffic and calls traffic using the Meta Quest headset.
Mihoyo is a chinese video games development company.
Family: | Game |
Over: | alibaba_cloud |
Over: | amazon_aws |
Over: | cloudflare |
Over: | gcp |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | udp |
Revision: | 1 |
Risk level: | 3 |
Tag: | Games |
Tag: | Non-business Related |
My Talking Tom is a mobile game.
Family: | Game |
Over: | amazon_aws |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Mobile Applications |
Tag: | Non-business Related |
Overwatch is an online video game part of Multiple First Personal Shooter (Multi FPS) and described as hero shooter available on popular play stations.
Pokemon Unite is a multiplayer online battle arena game developed by TiMi Studio Group a subsidiary of Tencent Games.
Family: | Game |
Over: | amazon_aws |
Over: | google_appengine |
Over: | http2 |
Over: | http |
Over: | https |
Over: | qq_games |
Over: | spdy |
Over: | ssl |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Social Networking |
Tag: | Non-business Related |
PlayStation Network (PSN) is the on-line gaming service for consoles made by Sony.
Family: | Game |
Over: | akamai |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | llnwd |
Over: | spdy |
Over: | ssl |
Over: | udp |
Revision: | 17 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Japanese Mobile game.
Family: | Game |
Over: | amazon_aws |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Mobile Applications |
Tag: | Non-business Related |
PWI is a free gaming MMORPG offering an unparalleled character customization tool and a unique gameplay style in a magical universe.
Family: | Game |
Over: | http |
Over: | perfect_world_ent |
Over: | ssl |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
QQ dancer is an online multiplayer dancing and music game from Tencent.
Family: | Game |
Over: | qq_web |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
QQ R2 is an online multiplayer game from Tencent. The game provides different services : multiple games, chat and web browsing.
Family: | Game |
Over: | http |
Over: | qq_games |
Over: | qq_web |
Over: | qqdownload |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Quake is a protocol allowing communication between Quake Clients and Quake servers.
Family: | Game |
Over: | udp |
Revision: | 17 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Ragnarok Online is an online role-playing game . This plugin classifies traffic generated by Ragnarok M Eternal Love application.
RakNet is networking middleware for multiplayer game network engine (used by Roblox, Minecraft...).
Family: | Game |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Riot Games is a videogame company, and has developed games like League of Legends, Valorant, etc... This plugin classifies website traffic.
Rocket League is a game made by Psyonix. This signature only classifies match making signalization streams. This enables to block the online game workflow.
Rules of survival is an online multiplayer Battle Royale game from Chinese company Netease Games.
Family: | Game |
Over: | http |
Over: | netease_games |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Rovio is a mobile game editor. This plug-in handles Rovio games content delivery traffic and Rovio website access.
This plugin classifies online games using Valve's Source engine, such as HalfLife, CounterStrike, TeamFortress. Some game servers will be classified as Steam protocol
Square Enix is a Japanese games development and mangas company.
Family: | Game |
Over: | amazon_aws |
Over: | cloudflare |
Over: | gcp |
Over: | http2 |
Over: | http3 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Web Sites |
Steam is a digital distribution, digital rights management, multiplayer and communications platform developed by Valve Corporation.
Family: | Game |
Over: | akamai |
Over: | amazon_aws |
Over: | gcp |
Over: | google_analytics |
Over: | gstatic |
Over: | highwinds |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Over: | udp |
Over: | windows_azure |
Revision: | 19 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Street Fighter is a fighting video game franchise developed and published by Capcom . This plugin classifies traffic generated by Street Fighter IV Champion Edition an online mobile video game.
Mobile game
Family: | Game |
Over: | amazon_aws |
Over: | google_ads |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Mobile Applications |
Tag: | Non-business Related |
Ubisoft is an online Game software editor and publisher (Far Cry, Assasin's Creed, Watchdogs...).
Family: | Game |
Over: | akamai |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Unity is a 3D engine supported by more that 25 platforms. This plugin focuses on the video game services.
Family: | Game |
Over: | akamai |
Over: | amazon_aws |
Over: | cloudflare |
Over: | gcp |
Over: | google_api |
Over: | http2 |
Over: | http |
Over: | https |
Over: | qualtrics |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
unreal_engine is a video game engine developed by Epic Games.
Family: | Game |
Over: | epic_games |
Over: | http |
Over: | ssl |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
Tag: | Web Sites |
Valorant is a free-to-play first-person shooter multiplayer game developed by Riot Games.
Family: | Game |
Over: | http |
Over: | riot_games |
Over: | ssl |
Over: | udp |
Over: | vivox |
Revision: | 1 |
Risk level: | 2 |
Tag: | Games |
Tag: | Non-business Related |
War Rock is a multiplayer first-person shooter made by the South Korean company, Dream Execution. The game is distributed as a free-to-play, a common form of freeware EULA and available through online downloading. Outside of the Far East, the game is hosted by NexonEU.
This protocol plug-in classifies traffic related to Warner Bros Interactive Entertainment. Warner Bros. Interactive Entertainment (also known as WB Games) is the video game production arm of Warner Bros.
WiiConnect24 is an asynchronous communication protocol implemented on the Nintendo Wii gaming system. It used by some information channels and services embedded in the console, and by some games too.
Vivox provides managed communication services in the form of integrated voice chat, Instant Messaging (IM) to online games, virtual worlds and other online communities.
World Of Tanks is a massively multiplayer online belarusian game developed by Wargaming.net company.
World Of Tanks Blitz, aka WOTB, is a massively multiplayer online Belarussian game developed by Wargaming.net company.
Online multiplayer gaming and digital media delivery service created and operated by Microsoft Corporation.
Xcloud is the cloud gaming service provided by Xbox on android with the Game Pass Ultimate subscription.
AIM (originally AOL Instant Messenger) is an instant messaging application. The protocol name is OSCAR (Open System for CommunicAtion in Realtime) and is used in both ICQ and AIM services.
Family: | Instant Messaging |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | rtmp |
Over: | scorecardresearch |
Over: | spdy |
Over: | tcp |
Revision: | 18 |
Risk level: | 3 |
Tag: | Instant Messaging |
Tag: | Non-business Related |
Badoo is a dating oriented social networking website.
Family: | Instant Messaging |
Over: | amazon_aws |
Over: | dtls |
Over: | |
Over: | google_maps |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | quic |
Over: | rtcp |
Over: | rtp |
Over: | rtsp |
Over: | sip |
Over: | spdy |
Over: | ssl |
Over: | stun |
Over: | tcp |
Over: | webrtc |
Revision: | 19 |
Risk level: | 3 |
Tag: | Instant Messaging |
Tag: | Social Networking |
Tag: | Non-business Related |
BBM is the messenger/voip/Video protocol for blackberry. This plug-in classifies the audio and video data flows of BlackBerry Messenger.
bbm_audio is the voip layer of the blackberry's messenger.
Family: | Instant Messaging |
Over: | bbm |
Revision: | 1 |
Risk level: | 2 |
Tag: | Instant Messaging |
Tag: | Mobile Applications |
Tag: | Streaming Audio |
BBM_video is the video layer of the blackberry's messenger.
Family: | Instant Messaging |
Over: | bbm |
Revision: | 1 |
Risk level: | 2 |
Tag: | Instant Messaging |
Tag: | Mobile Applications |
Tag: | Streaming Video |
Bleep is a fully encrypted and distributed instant messaging protocol created by the BitTorrent team. This protocol plug-in supports both text and voice discussions.
Family: | Instant Messaging |
Over: | udp |
Revision: | 1 |
Risk level: | 4 |
Tag: | Instant Messaging |
Tag: | VoIP |
Tag: | Non-business Related |
BlueJeans is a cloud video conferencing platform.
Family: | Instant Messaging |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | rtcp |
Over: | rtp |
Over: | spdy |
Over: | ssl |
Over: | stun |
Revision: | 1 |
Risk level: | 2 |
Tag: | Video Conferencing |
DingTalk is an enterprise communication and collaboration platform developed by Alibaba Group.
Family: | Instant Messaging |
Over: | alibaba_cloud |
Over: | alibaba_group |
Over: | http |
Over: | https |
Over: | ssl |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Social Networking |
Discord is a chat, audio and video call application for gaming.
Family: | Instant Messaging |
Over: | amazon_aws |
Over: | cloudflare |
Over: | dtls |
Over: | gcs |
Over: | google_gen |
Over: | http2 |
Over: | http |
Over: | https |
Over: | quic |
Over: | rtcp |
Over: | rtp |
Over: | spdy |
Over: | ssl |
Over: | stun |
Over: | udp |
Over: | webrtc |
Revision: | 1 |
Risk level: | 2 |
Tag: | Instant Messaging |
Tag: | Social Networking |
Tag: | Web Conferencing |
C'Me, developed by Etisalat, is a mobile application offering voice and video calls along with instant messaging.
feiliao is a Chinese instant messaging application. This plug-in classifies file transfers and chats.
Family: | Instant Messaging |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | File Storage and Sharing |
Tag: | Instant Messaging |
Fetion is a Chinese instant messaging application provided by China Mobile. This plug-in classifies file transfers, chat and audio calls.
FreePP is an instant messaging application, that provides domestic and international calls feature. This plugin only classifies the instant messaging traffic.
Goodnight is a simple voice-chat app for calling and chatting for free, focused on the Korean, Chinese, and Anglophone markets.
Family: | Instant Messaging |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | websocket |
Revision: | 1 |
Risk level: | 3 |
Tag: | Social Networking |
Tag: | VoIP |
Google messages is an application for texting (SMS, MMS, RCS). A web interface is also available that can be synchronized in both ways with mobile application. Classification of RCS traffic may depend on telecommunication service provider.
Family: | Instant Messaging |
Over: | google_api |
Over: | google_gen |
Revision: | 1 |
Risk level: | 2 |
Tag: | Instant Messaging |
Google Hangouts is an instant messaging service available on desktop and mobile devices. The former Google Talk version uses XMPP, and provides both text and voice communication. This plug-in also classifies RTP Audio/Video streams of Google Hangouts using DNS Caching.
Family: | Instant Messaging |
Over: | gcm |
Over: | google_api |
Over: | google_docs |
Over: | google_gen |
Over: | gstatic |
Over: | gsuite |
Over: | http2 |
Over: | http |
Over: | https |
Over: | jabber |
Over: | quic |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Revision: | 9 |
Risk level: | 1 |
Tag: | Instant Messaging |
Tag: | VoIP |
Tag: | Web Applications |
HOVRS is a Hands On Video Relay Service. This plugin classifies traffic to i711.com, hovrs.com, purple.us and purplevrs.com.
This protocol plug-in classifies the http traffic to the hosts icq.com and icq.net. It also classifies the ssl traffic to the Common Names icq.com and icq.net.
This protocol plug-in classifies the http traffic to the host iloveim.com.
Family: | Instant Messaging |
Over: | amazon_aws |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Revision: | 18 |
Risk level: | 3 |
Tag: | Instant Messaging |
Tag: | Non-business Related |
IMO is a instant messaging application which allows the users to exchange messages without having to pay for SMS, share photos and videos.
Jabber is an open standard instant messaging and presence system involving the XMPP protocol.
Family: | Instant Messaging |
Over: | amazon_aws |
Over: | google_gen |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | rtp |
Over: | socks4 |
Over: | socks5 |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Revision: | 17 |
Risk level: | 3 |
Tag: | Instant Messaging |
Tag: | Non-business Related |
KakaoTalk is an instant messaging platform for mobile devices; users or group of users can send messages, share photos, videos and contact information. Audio flows are classified as RTP only.
Lava Lava is a Chinese language based Instant Messaging application.
Family: | Instant Messaging |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Instant Messaging |
Tag: | Social Networking |
Libon is an application that provides international audio call feature. This application is owned by Orange.
Line is a Japanese Instant Messaging and Voip application for smartphones and PCs. Please note : the parent attribute 'call' and its children are deprecated for Line (since mid-2014) but can be extracted from SIP.
Family: | Instant Messaging |
Over: | akamai |
Over: | amazon_aws |
Over: | blogimg |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | naver |
Over: | quic |
Over: | rtcp |
Over: | rtp |
Over: | rtsp |
Over: | sip |
Over: | spdy |
Over: | ssl |
Over: | stun |
Over: | tcp |
Over: | udp |
Revision: | 15 |
Risk level: | 3 |
Tag: | Instant Messaging |
Tag: | VoIP |
Tag: | Non-business Related |
Line2 (formerly Toktumi) is a telecommunication company that provides a second phone number for USA or Canada.
IBM Lotus Sametime is a client-server application and middleware platform that provides real-time, unified communications and collaboration for enterprises.
Maaii is a cross-platform messaging application which allows iPhone and Android users to send and receive text messages and phone calls for free.
Mail.ru Agent is a cross-platform mobile messaging application supporting text, audio and video. It is featured by Mail.ru.
Microsoft Teams is the chat-based workspace in Office 365. Most of the application traffic is classified as skype or office365.
Mumble is an open source, low-latency, high quality voice chat software primarily intended for use while gaming.
MyPeople Messenger is a cross-platform application providing free text, picture, and video messaging.
Netmeeting ILS is the protocol used between Netmeeting and Internet Locator Servers (ILS). Netmeeting is a VoIP and multi-point videoconferencing client included in many versions of Microsoft Window. A Internet Locator Server (ILS) is a directory used to find other users and facilitate rendezvous.
ntalk is a chat application. It works in a client-server model and it's designed to work in all kinds of networks. ntalk was written to be much more easy-to-use, friendly and functional than Unix talk.
Omegle is a an online text or video chat website that connects people randomly.
Family: | Instant Messaging |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | https |
Over: | spdy |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Instant Messaging |
Tag: | Social Networking |
Tag: | Video Conferencing |
OTO Global is an instant messaging application that provides feature to make landline or international calls.
Paltalk is an instant messaging protocol.
Family: | Instant Messaging |
Over: | amazon_aws |
Over: | cloudflare |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Over: | udp |
Revision: | 18 |
Risk level: | 3 |
Tag: | Instant Messaging |
Tag: | Non-business Related |
The Interoperable Presence Information Protocol (PIP) was an experimental IETF presence protocol to provide simple messaging and presence information.
Open Whisper Systems (OWS) instant messaging mobile application that implements the Signal secured protocol.
Sina is a Chinese chat client similar to MSN Messenger or ICQ. It contains several features like chat, news portal, micro blogging, music player, online storage (files, photos, etc.).
Family: | Web |
Over: | amazon_aws |
Over: | chinanetcenter |
Over: | cloudflare |
Over: | cnzz |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | jabber |
Over: | scorecardresearch |
Over: | spdy |
Over: | ssl |
Over: | taobao |
Over: | udp |
Revision: | 16 |
Risk level: | 3 |
Tag: | File Storage and Sharing |
Tag: | Instant Messaging |
Tag: | Non-business Related |
Skype is an instant messaging and voice over IP application edited by Microsoft.
Family: | Instant Messaging |
Over: | amazon_aws |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | microsoft |
Over: | office365 |
Over: | rtcp |
Over: | rtp |
Over: | sip |
Over: | spdy |
Over: | ssl |
Over: | stun |
Over: | tcp |
Over: | udp |
Over: | websocket |
Over: | windows_azure |
Revision: | 22 |
Risk level: | 3 |
Tag: | Instant Messaging |
Tag: | VoIP |
Tag: | Non-business Related |
Softros Messenger is a LAN messaging and file transfer application.
Family: | Instant Messaging |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Instant Messaging |
Tag: | P2P File Sharing |
talk is a Unix text chat program. It originally allowed messaging only between the users logged on to one multi-user computer, but later was extended to allow chat to users on other systems.
TeamSpeak 3 continues the legacy of the original TeamSpeak communication system. TeamSpeak 3 is not merely an extension of its predecessors but rather a complete rewrite in C++ of its proprietary protocol and core technology.
Text Me is an instant messaging application which can make texting and calling to any phone and make national & international calls.
textPlus is an instant messaging application which can send and receive sms / text / MMS / group messages to anyone in the US or Canada.
TikTok is a social network application acquired by ByteDance and previously known as Musical.ly. It allows its users to share live stream video content.
WangWang is the instant messenger service provided by Taobao which provides two applications, Wangxin for buyers and Qianniu for sellers.
WhatsApp Messenger is a cross-platform, instant, mobile messaging application which allows the users to exchange messages without having to pay for SMS. WhatsApp Messenger is available for iPhone, BlackBerry, Android and Nokia and yes, those phones can all message each other.
Vonage Mobile is an instant messaging application that provides feature to make landline or international calls.
Voxer is an instant messaging application that provides voice, text, photo, and video with walkie talkie messaging (Push-to-talk PTT) features in a secure messaging app.
Vyke is an IM allowing to buy phone number from countries such US, UK, Canada and do VoIP, text messaging (SMS), and usual chat (File transfer/text).
Yahoo Together is a group messaging application. Known by its project name Squirrel, it replaces Yahoo web messenger.
Yubo is a social network for finding new friends and live streaming. This plugin classifies the applications and the website.
Zalo is a vietnamese mobile IM application created by VNG Corporation with audio/image file send feature. The HTTP/HTTPS traffic generated by this application may either be classified as Zalo or Zing.
Zoom Video Conferencing, also referred to as Zoom by users, combines video conferencing, online meetings, and mobile collaboration into one platform.
Family: | Instant Messaging |
Over: | amazon_aws |
Over: | cloudflare |
Over: | gcp |
Over: | google_gen |
Over: | http2 |
Over: | http3 |
Over: | http |
Over: | https |
Over: | qualtrics |
Over: | rtcp |
Over: | rtp |
Over: | spdy |
Over: | ssl |
Over: | stun |
Over: | tcp |
Over: | udp |
Over: | zendesk |
Revision: | 1 |
Risk level: | 3 |
Tag: | Allows Remote Control |
Tag: | Instant Messaging |
Tag: | Web Conferencing |
Tag: | Video Conferencing |
Tag: | VoIP |
Tag: | Mobile Applications |
Tag: | Desktop Applications |
Tag: | Streaming Video |
Tag: | Routable Application |
BMPP is a protocol for identifying the bulk mail receipt preferences of an e-mail address, which allows bulk e-mailers to discover if a mailbox is willing to accept bulk email.
Courier Mail Server is a mail transfer agent (MTA) server that provides ESMTP, IMAP, POP3, SMAP, webmail, and mailing list services with individual components. It is best known for its IMAP server component. Individual components can be enabled or disabled at will. The Courier Mail Server implements basic web-based calendaring and scheduling services integrated in the webmail module.
Emailtree AI is an AI-powered email management tool designed to help prioritize and organize emails effectively
The Internet Message Support Protocol (IMSP) is designed to support the provision of mail in a medium to large scale operation. It is intended to be used as a companion to the IMAP4 protocol, providing services which are either outside the scope of mail access or which pertain to environments which must run more than one IMAP4 server in the same mail domain. The services that IMSP provides are extended mailbox management, configuration options, and address books.
The Intel InBusiness eMail Station is a highly integrated email server which provides small businesses with the ability to locally manage and configure their own email accounts.
Mailbutler is an email client that can be linked to email accounts, can generate content and take actions using an AI Assistant.
Mailer transport queue for Zmailer, a mail transfer agent for Linux, BSD and other Unix-like systems.
Message Posting Protocol (MPP) is a network protocol that is used for posting messages from a computer to a mail service host. It is based on 2 basic structures: command and reply.
The Message Send Protocol (SEND) is used to send a short message to a given user on a given terminal on a given host.
NI MAIL is a program for email mass sending with SOCKS proxy support. It is free for non-commercial use and is most common in Russia.
On-Demand Mail Relay (ODMR) is an SMTP extension that allows e-mail to be relayed once the recipient has been authenticated. It uses the Extended SMTP (ESMTP) command ATRN, similar to the ETRN command but available for dynamically assigned IP addresses.
PCMail is a distributed mail system providing mail service to an arbitrary number of users, each of whom owns one or more workstations.
Post Office Protocol Version 2 (POP2) enables a user's workstation to access mail from a mailbox server.
Quick Mail Queuing Protocol (QMQP) is a network protocol designed to share e-mail queues between several hosts. It is designed and implemented in qmail.
The Quick Mail Transfer Protocol (QMTP) is an e-mail transmission protocol that is designed to have better performance than Simple Mail Transfer Protocol (SMTP), the de facto standard. It was designed and implemented in qmail.
Remote Mail Checking Protocol (RMCP) is a mail checking service that is used between a client and a server pair. Client queries server in order to find out whether new mail has arrived for a specified user. The protocol provides for both non-authenticated and authenticated polling.
The IMAP protocol (Internet Message Access Protocol Version 4) enables a client to access and manipulate electronic mail messages on a server.
IMAPS is the secure version of the IMAP protocol.
Family: | |
Over: | ssl |
Revision: | 18 |
Risk level: | 2 |
Tag: | |
Tag: | Encrypts communications |
Lotus Notes is a groupware knowledge management system which integrates various services such as web browsing, calendaring and mailing.
Family: | |
Over: | tcp |
Revision: | 17 |
Risk level: | 4 |
Tag: |
Post Office Protocol - Version 3 (POP3) allows a workstation to simply and dynamically access a mail stored on a mail server.
Secure version of the POP3 protocol.
Family: | |
Over: | ssl |
Revision: | 17 |
Risk level: | 2 |
Tag: | |
Tag: | Encrypts communications |
The Simple Mail Transfer Protocol (SMTP) is a protocol used for transfering mail reliably and efficiently.
Secure version of the SMTP protocol.
Family: | |
Over: | ssl |
Revision: | 18 |
Risk level: | 2 |
Tag: | |
Tag: | Encrypts communications |
AAON Prism 2 is a software for control of AAON HVAC, Wattmaster Commlink 5 module over IP.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
AccessBuilder (Access Builder) is a family of dial-in remote access servers that give mobile computer users and remote office workers full access to work group, departmental, and enterprise network resources. Remote users dial into AccessBuilder via analog or digital connections to get direct, transparent links to Ethernet and Token Ring LANs-just as if they were connected locally. AccessBuilder products support a broad range of computing platforms, network operating systems, and protocols to fit a variety of network environments. They provide multi-protocol bridging and routing for wide area Client-to-LAN connections and remote LAN extensions to the central site.
Apache ActiveMQ is a message broker server. It supports multiple client protocols: Openwire (native protocol), MQTT, Websocket,...
AMQP (Advanced Message Queuing Protocol) is an open standard application layer protocol for message-oriented middleware, originated in 2003 by JP Morgan Chase in London.
Family: | Middleware |
Over: | tcp |
Revision: | 17 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
This layer classifies traffic from TCP/3422 related to actual data carried out by AnywhereUSB devices connected to it. Those data are in clear text.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 4 |
Tag: | Application Layer Protocols |
B&R Industrial Automation is a manufacturer for the industry. This plugin classifies a plastic molding machinery.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Industrial Protocols |
Cimco DNC-Max is a leading DNC (Direct/Distributed Numerical Control) software solution for DNC program transfers to multiple CNC (Computerized Numerical Control) machines.
CoAP (Constrained Application Protocol) is a specialized web transfer protocol for use with constrained nodes and constrained networks in the Internet of Things.
Codesys is an embedded system and its IDE for industrial Programmable Logic Controller (PLC). This plugin classifies the protocol between the IDE and the PLC.
CyberCash serves as a conduit through which payments can be transported quickly, easily and safely between buyers, sellers and their banks. The CyberCash system provides several separate payment services on the Internet including credit card and electronic cash.
Retrospect is a family of backup software applications for the Mac OS, Mac OS X, and Microsoft Windows operating systems.
Protocol used by control software and some Accu-Sort barcode scanners from Datalogic.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
The DCE/RPC protocol is an RPC implementation used in Distributed Computing Environments. This protocol is used by many software applications including Microsft Exchange.
Traffic related to DeltaV, a distributed control system used in industrial process control (Emerson Process Management).
DIOP is a GIOP implementation over UDP which aims to be more efficient than the TCP one.
Family: | Middleware |
Over: | giop |
Revision: | 17 |
Risk level: | 1 |
Tag: | Application Layer Protocols |
DLMS/COSEM is a standardized protocol for energy and water smart meters. This plugin classifies DLMS above the UDP or wrapper_dlms (WPDU).
Family: | Middleware |
Over: | hdlc |
Over: | tcp |
Over: | udp |
Over: | wrapper_dlms |
Revision: | 1 |
Risk level: | 2 |
Tag: | Industrial Protocols |
Dr Schenk Inspection System is product inspecting and analyzing raw material from factory on product chain. It gathers sensors, actuators and visualization components all interacting with the Inspection System.
This layer classifies EquipCommand protocol from TotalTrax equipment (SX/VX series), it solely handles the non-ciphered part of this protocol.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 3 |
Tag: | Application Layer Protocols |
Erlang distribution protocol allows several node to communicate together and exchange information.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
This plugin classifies the control protocol between ESK M3 Access Control module for forklifts and the P106 software that manage them.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
Tag: | Industrial Protocols |
This layer gathers signatures of protocols used by Fanuc equipment. This layer does not cover ALL protocols generated by Fanuc equipment.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Tag: | Industrial Protocols |
Proficy is a General Electric product for industrial environment allowing monitoring and data management from SCADA network. This plugin classifies traffic related to Proficy Gateway service (PR Gateway) and Proficy Licensing server (PR Licensing)
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Industrial Protocols |
GFMS is Security Asset Manager (SAM) software from Key Systems Inc. This plugin classifies unsecure XML traffic between GFMS and SAM devices.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 3 |
Tag: | Application Layer Protocols |
The General Inter-Orb protocol (GIOP) is used to make requests or return replies between ORBs in a Corba environment.
This protocol is the secure version of the GIOP protocol.
Family: | Middleware |
Over: | ssl |
Revision: | 18 |
Risk level: | 1 |
Tag: | Application Layer Protocols |
GNU Krell Monitors (GKrellM) is a computer program based on the GTK+ toolkit that creates a single process stack of system monitors. It can be used to monitor the status of CPUs, main memory, hard disks, network interfaces, local and remote mailboxes, and many other things. Plugins are available for a multitude of tasks, for example, controlling the XMMS media player or a SETI@home client from within the stacked monitor. GKrellM is popular among users of Linux and other Unix-like operating systems.
High-Level Data Link Control (HDLC) is a data link layer protocol standardized by ISO/IEC 13239:2002. This plugin classifies Frame Type 3 when transported over TCP/IP.
HL7 (Health Level 7) is a standardized protocol to exchange medical or administrative data between equipment and applications.
High-Availability Seamless Redundancy provides redundancy for industrial Ethernet networks. This headers is used for packet duplication removal. The ixEngine doesn't run the duplication removal algorithm.
High-Availability Seamless Redundancy (HSR) and Parallel Redundancy Protocol (PRP) provide redundancy for industrial Ethernet networks. This plugin classifies supervision frames.
Communication protocol for the “central” server on IBM iSeries (AS/400) i Access Servers.
Family: | Middleware |
Over: | ibm_iseries |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
SQL, NDB or ROI Database access protocol for IBM iSeries (AS/400) i Access servers.
Family: | Middleware |
Over: | ibm_iseries |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Communication protocol for the Data Queue server on IBM iSeries (AS/400) i Access Servers.
Family: | Middleware |
Over: | ibm_iseries |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
Communication protocol for the file server on IBM iSeries (AS/400) i Access Servers.
Family: | Middleware |
Over: | ibm_iseries |
Revision: | 1 |
Risk level: | 2 |
Tag: | File Storage and Sharing |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
Network printing protocol for IBM iSeries (AS/400) i Access Servers.
Family: | Middleware |
Over: | ibm_iseries |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Communication protocol for Remote Command and program call server on IBM iSeries (AS/400) i Access Servers.
Family: | Middleware |
Over: | ibm_iseries |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
Communication protocol used by some IBM iSeries (AS/400) i Access Servers.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
Internet Backplane Protocol (IBP) is middleware for managing and using remote storage. It was invented to support Logistical Networking in large scale distributed systems and applications. IBP provides a mechanism for using distributed storage for logistical purposes.
IEC 60870-5-104 protocol (aka IEC 104) is a part of IEC Telecontrol Equipment and Systems Standard IEC 60870-5 that provides a communication profile for sending basic telecontrol messages between two systems in electrical engineering and power system automation.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Industrial Protocols |
IIOP is the GIOP implementation over TCP.
Family: | Middleware |
Over: | giop |
Revision: | 17 |
Risk level: | 1 |
Tag: | Application Layer Protocols |
Clavister InControl is a centralized management system for Netwall firewalls. This plugin classifies the protocol between the InControl client and its server, as well as the logging protocol.
Invar Systems AS/RS (Automated Storage and Retrieval System) control protocol is part of Invar's integrated warehouse software system (IWS).
Family: | Middleware |
Over: | ms_nmf |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
ipcserver is a client-server communication program that listens for connections from local-domain clients.
iQ-CAN is a control software for Automated Vehicles in factories from Savant Automation (AGV).
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
iWarehouse is the fleet and warehouse management system of Raymond Corporation (a subsidiary of Toyota Industries that manufactures and distributes electric lift trucks). This plugin classifies the protocol of the on-board device, named Monitor.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Industrial Protocols |
TIBCO Jaspersoft is the editor of JasperReports and other BI software built upon it. This plugin classifies website traffic and the default installation of the JasperReports Server.
Jaten is a chinese provider of AGV robots. This plugin classifies network remote control protocol of their AGV.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 3 |
Tag: | Allows Remote Control |
Tag: | Application Layer Protocols |
Classifies the Java Remote Method Invocation (RMI) protocol.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Utilities |
JFrog Artifactory is an asset management software for DevOps CI/CD chains. This plugin classifies the SaaS instances on jfrog.io and local HTTP server instances.
This plugin classifies the control protocol of KEYENCE Barcode Reader products, also used by their setup software (AutoID Network Navigator).
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Melsec is a range of PLC by Mitsubishi. This plugin classifies communications with GX Works for a Melsec-Q device.
This plugin classifies Mercury Security controllers communication protocol with TLS disabled. Mercury security controllers manage physical access control (doors and card readers) to buildings.
Traffic related to Modbus Remote Terminal Unit (RTU), a distributed control system used in industrial process control (Emerson Process Management).
Mondex is a smart card electronic cash system. The main protocol of Mondex implements electronic cash transfer, using either a device (wallet) with two slots, or an Internet connection.
This plugin classifies ASPP (Async Server Proprietary Protocol) from Moxa (NPort devices) without activation of encryption.
MQTT (MQ Telemetry Transport) is a machine-to-machine (M2M)/"Internet of Things" connectivity protocol. It was designed as an extremely lightweight publish/subscribe messaging transport. It is useful for connections with remote locations where a small code footprint is required and/or network bandwidth is at a premium.
.NET Message Framing Protocol, also known as its URI scheme 'tcp.net', is a Microsoft framing protocol for TCP. It also enables port sharing between several applications.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
The .NET Remoting Protocol (MS-NRTP) is a RPC library for .NET applications. This plugin classifies MS-NRTP serialized by MS-NRBF over TCP.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Client applications use the MicroSoft PowerShell Remoting Protocol (MS PSRP) to send pipelines of commands to a server system over a network for execution by the server.
Microsoft Remote Procedure Call (MSRPC) is the Microsoft implementation of the DCE RPC mechanism.
Family: | Middleware |
Over: | dcerpc |
Revision: | 17 |
Risk level: | 3 |
Tag: | Application Layer Protocols |
Clavister NetWall is a firewall. This plugin classifies the protocol between inControl and a NetWall.
This plugin classifies project upload from NBDesigner software to a compliant Omron Programmable Terminal.
Family: | Middleware |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
OnGuard is a product from Lenel for managing physical security of buildings. This plugin classifies the connection from the client software to the server.
OPC Classic is specifications based on Microsoft Windows technology, using COM/DCOM for communication among software components in a distributed client-server network."
OPC is the interoperability standard for the secure and reliable exchange of data in the industrial automation space and in other industries. This plug-in classifies the OPC Unified Architecture (UA) binary protocol over TCP.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Industrial Protocols |
OpenWire is the native protocol of Apache ActiveMQ, a message-passing middleware.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
This module classifies the traffic generated by ORACLE OEM Management. Oracle OEM (Oracle Enterprise Manager / Enterprise Manager Cloud Control) is an orchestrator for the IT and cloud instances. It deploys and configure Oracle products, including Oracle Linux from PXE, but also 3rd party software using plugins and may also connect to some 3rd party orchestrator.
Orbix is a CORBA ORB (Object Request Broker) from Micro Focus which helps programmers build distributed applications. Orbix cfg (config) works over TCP/UDP typically on port 3076.
Orbix is a CORBA ORB (Object Request Broker) from Micro Focus which helps programmers build distributed applications. Orbix cfg (config) works over SSL typically on port 3078.
Used by Progress Software Corporation in their Orbix software for enterprise COBRA solutions. Orbix Locator works over TCP/UDP typically on port 3075.
Used by Progress Software Corporation in their Orbix software for enterprise COBRA solutions. Orbix Locator works over SSL typically on port 3077.
PCCC stands for "Programmable Controller Communication Commands", it is used to control software running in Programmable Logic Controler (PLC). PCCC traffic can be hardware specific, this plugin addresses traffic generated by Rockwell/Allen-Bradley to talk to SLC5, PLC5E and MicroLogix PLC for service.
OSI PI Analysis Framework SCADA protocol (AF Server, MDB Sync, etc.).
Family: | Middleware |
Over: | ms_nmf |
Revision: | 1 |
Risk level: | 1 |
Tag: | Industrial Protocols |
OSI PI DataArchive and Server SCADA protocol (ProcessBook, Datalink, etc.).
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Industrial Protocols |
PROFINET (an acronym for Process Field Net) is an industry technical standard for data communication over Industrial Ethernet, designed for controlling and collecting data from equipment in industrial systems, with a particular strength in delivering data under tight time constraints (1ms or less). The standard is maintained and supported by Profibus & Profinet International, an umbrella organization headquartered in Karlsruhe, Germany.
Parallel Redundancy Protocol provides redundancy for industrial Ethernet networks. This plugin detects the Redundancy Control Trailer (RCT) to Ethernet frames. The ixEngine does not run the duplication removal algorithm.
Family: | Middleware |
Over: | eth |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Industrial Protocols |
Control protocol for the S&C Purewave UPS system.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
RabbitMQ is an open source Message Broker. This plugin classifies local server deployment when the client protocol identifies the server.
RMI-IIOP (Remote Method Invocation over Internet Inter-ORB Protocol) delivers CORBA distributed architecture to Java 2 platform, using both remote method invocation system RMI and IIOP protocol.
Family: | Middleware |
Over: | iiop |
Revision: | 18 |
Risk level: | 1 |
Tag: | Application Layer Protocols |
Rockwell Network Applications (RNA) is Rockwell implementation of Windows DNA-M and is used for communication between Rockwell FactoryTalk products.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
RPC (Remote Procedure Call) is an easy and popular paradigm for implementing the client-server model of distributed computing. A request is sent to a remote system to execute a designated procedure, using arguments supplied, and the result is returned to the caller.
Integrated Object Network (ION) is a proprietary SCADA protocol for Schneider Electrics smart meters.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Tag: | Industrial Protocols |
This plugin classifies the main data protocol used by Siemens Apogee HVAC product line. This device also uses BACnet and other control protocols that are not covered here.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
SignalR is an open-source Microsoft library for real-time functionalities in web applications. This plugin classifies Azure-hosted (signalr.net) and local HTTP server instance versions.
SiloTrack is the management software for Monitor Technologies industrial devices to measure material level in a silo or a vessel tank. This plugin classifies the ciphered on TCP/3451 communications between the client and the server connected to the device.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
Tag: | Industrial Protocols |
SOAP is a lightweight protocol based on XML intended for exchanging structured information in a decentralized, distributed environment. Note: this protocol can be found in HTTP requests, but it won't be classified if some known web application or service was classified instead.
Socomec is a manufacturer for industrial power networks. This plugin classifies the monitoring socket of the Silverlight user interface for the PassIP+ gateway to the proprietary ISOM bus. It is used for insulation fault detection.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Industrial Protocols |
STOMP is a text based protocol for asynchronous message passing. It is used by some message brokers such as ActiveMQ, RabbitMQ, HornetQ, etc.
IEEE C37.118 Synchrophasor Protocol conveys electrical current measurements in power grid substations.
The Replication Services for David enable a replication of the contents of any archives that are stored on different David Servers. David (from Tobit Software) is a mail access server that also provides other services, such as: fax, voice and document management.
Temasys provides cloud-based WebRTC infrastructure and developer-centric SDKs for embedding real-time communications into web or mobile apps for interactive video, voice and data communications.
Apache Thrift framework used for serialisation.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 3 |
Tag: | Allows Remote Control |
Tag: | Transport Layer Protocols |
This layer classifies only a limited number of protocols known to be used by Toyo hardware (PLC).
Family: | Middleware |
Over: | telnet |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Tag: | Industrial Protocols |
Tress Poll is a time clock device and software manufactured by Grupo Tress Internacional. This plugin classifies those time clock devices.
TCP/UDP wrapper protocol (WPDU) for transporting over IP the DLMS/COSEM (IEC-62056) protocol for energy and water smart meters.
SOAP-based protocol for managing computer systems (Web Services Management). This signature classifies the standard HTTP API.
This layer classifies only a limited number of protocols known to be used by Yokogowa hardware.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Administration protocol used by ZNT-Richter Process Automation Controller (PAC) applications.
Family: | Middleware |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Industrial Protocols |
The Application Configuration Access Protocol (ACAP) is a protocol for storing and synchronizing general configuration and preference data.
Agent Extensibility Protocol allows management of Simple Network Management Protocol objects defined by different processes via a single master agent.
Altiris provides service-oriented management solutions which allow managing IT infrastructures. Altiris was founded in 1998 and acquired by Symantec in 2007.
APC Agent protocol allows to monitor and manage APC devices in LAN network. This protocol uses UDP port 9950.
Family: | Network Management |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
BACnet is a communication protocol for Building Automation and Control (BAC) networks defined by the standard ISO 16484-5. The BACnet stack defines different layers, the BACnet Application Layer (bacnet_app) manages access to objects exposed by BACnet devices and operations done on them.
Family: | Network Management |
Over: | bacnet_net |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
BACnet is a communication protocol for Building Automation and Control (BAC) networks defined by the standard ISO 16484-5. The BACnet stack defines different layers, the BACnet Network Layer (bacnet_net) contains the network addresses required for routing BACnet messages to BACnet devices.
Family: | Network Management |
Over: | bacnet_vlc |
Over: | llc |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
BACnet is a communication protocol for Building Automation and Control (BAC) networks defined by the standard ISO 16484-5. The BACnet stack defines different layers, the BACnet Virtual Link Control layer (bacnet_vlc) is used by BACnet devices over IP networks. It formalizes all the services that a BACnet device might require from the link layer but are not readily available from the underlying IP layer.
Family: | Network Management |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
Big Brother (BB) is a tool for systems and network monitoring, generally used by system administrators. Big Brother produces HTML pages containing a simple matrix of hosts and tests with red and green dots to denote system status.
HCL BigFix, formerly IBM or Tivoli BigFix, is an endpoint management software. This plugin classifies the relay server and cloud servers.
Cisco Discovery Protocol (CDP) is a layer 2 protocol used by Cisco network equipment to discover other Cisco network equipment present on a link. Note: Attribute extraction for CDP is only possible when classified over SNAP.
The Common Industrial Protocol (CIP) is an industrial protocol for industrial automation applications.
Family: | Network Management |
Over: | enip |
Revision: | 1 |
Risk level: | 1 |
Tag: | Industrial Protocols |
Cisco IP SLA is used to monitor IP applications by using active traffic.
Family: | Network Management |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
Tag: | Network Utilities |
This are packets sent by Cisco PfRv3 enabled routers to measure link quality.
Family: | Network Management |
Over: | rtp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Utilities |
ENIP (EtherNet/IP) is an industrial network protocol that adapts the Common Industrial Protocol to standard Ethernet.
HPE Insight Manager is an inventory and health monitoring software for HP enterprise class hardware and have basic support for other vendors. This plugin classify flows to the web UI, iLo, Linux servers running WBEM, and Windows servers with WMI.
formerly Proficy HMI/SCADA iFIX, is a industrial automation system.
Family: | Network Management |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Internet of Things |
Tag: | Industrial Protocols |
Juniper Mist is a cloud based automated network troubleshooting service based on machine learning and Mist AI.
Kodi (formerly XBox Media Center) is a free media player sofware application.
Family: | Network Management |
Over: | amazon_aws |
Over: | brightcove |
Over: | cloudflare |
Over: | github |
Over: | http2 |
Over: | http |
Over: | https |
Over: | microsoft |
Over: | spdy |
Over: | ssl |
Over: | upnp |
Over: | websocket |
Revision: | 1 |
Risk level: | 3 |
Tag: | Desktop Applications |
Tag: | Streaming Video |
Tag: | Streaming Audio |
LCP is used to establish, configure and test the data-link connection for a PPP link. This protocol is used to automatically agree upon the encapsulation format options, handle varying limits on sizes of packets, detect a looped-back link and other common misconfiguration errors, and terminate the link. This protocol is used to establish, configure and test the data-link connection for a PPP link.
Family: | Network Management |
Over: | ppp |
Revision: | 17 |
Risk level: | 1 |
Tag: | Network Utilities |
Label Distribution Protocol (LDP) is a protocol in which routers capable of Multiprotocol Label Switching (MPLS) exchange label mapping information. LDP is used to build and maintain LSP databases that are used to forward traffic through MPLS networks.
mbCONNECT24 is a cloud-based service portal for industrial applications edited by MB Connect Line. This plugin classifies OpenVPN access from MB Connect Line physical routers and access to the web application.
Modbus is a standard communication protocol in industry for connecting industrial electronic devices (SCADA). Here, we consider modbus as the combination of Modbus/TCP (Transport layer for TCP/IP networks) and Modbus (serial communication protocol).
Family: | Network Management |
Over: | modbus_rtu |
Over: | socomec |
Over: | tcp |
Over: | udp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Industrial Protocols |
Key Management Service (KMS) activates computers on a local network, eliminating the need for individual computers to connect to Microsoft. To do this, KMS uses a client server topology.
Family: | Network Management |
Over: | msrpc |
Revision: | 1 |
Risk level: | 1 |
Tag: | Network Utilities |
Tag: | Business Applications |
Windows Remote Management (WinRM) is Microsoft's implementation of WS-Management Protocol, allowing remote administration of Windows servers.
NetFlow is a Cisco protocol that provides nearly real-time traffic monitoring, aggregation and statistic evaluation, multicriteria data flow selection, using source/destination IP addresses, protocols, etc.
Family: | Network Management |
Over: | udp |
Revision: | 18 |
Risk level: | 3 |
Tag: | Network Utilities |
Network Radar is a network scanning and managing tool. This plugin classifies traffic on www.networkradar.eu.
Nagios Remote Data Processor (NDRP) is a flexible data transport mechanism and processor for Nagios.
Nagios Remote Plugin Executor (NRPE) is a Nagios agent that allows remote system monitoring using scripts that are hosted on the remote systems.
Family: | Network Management |
Over: | ssl |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Utilities |
Tag: | Business Applications |
The Prospero System is a collection of protocols and embedded software providing distributed directory services, file access services, naming etc.
The Remote Management and Control Protocol (RMCP) is a server management protocol for remote access to IPMI (Intelligent Platform Management Interface). This plugin classifies RCMP+.
Family: | Network Management |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Protocol used by Rockwell ThinManager (a centralized management software that seamlessly integrates with industrial computers and thin clients) for passing configuration parameters to compatible thin clients.
Family: | Network Management |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
RSVP is a Resource reSerVation setup Protocol designed for an integrated services Internet. RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. The RSVP protocol is used by a host to request specific qualities of service from the network for particular application data streams or flows. RSVP is also used by routers to deliver quality-of-service (QoS) requests to all nodes along the path(s) of the flows and to establish and maintain state to provide the requested service.
Family: | Network Management |
Over: | ip |
Revision: | 19 |
Risk level: | 3 |
Tag: | Transport Layer Protocols |
Resource Reservation Protocol (RSVP) is a Transport Layer protocol designed to reserve resources across a network for an integrated services internet. RSVP operates over an IPv4 or IPv6 internet Layer and provides receiver-initiated setup of resource reservations for multicast or unicast data flows with scaling and robustness. It does not transport application data but is similar to a control protocol, like ICMP or IGMP.
S7comm (S7 Communication) is a Siemens proprietary protocol that runs between programmable logic controllers (PLCs) of the Siemens S7-300/400 family. It is used for PLC programming, exchanging data between PLCs, accessing PLC data from SCADA (supervisory control and data acquisition) systems and diagnostic purposes.
Family: | Network Management |
Over: | cotp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
S7communication Plus is a Siemens proprietary protocol for Siemens' Programmable Logic Controllers (PLC).
Family: | Network Management |
Over: | cotp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Industrial Protocols |
System Center Configuration Manager, is a systems management software product by Microsoft for managing large groups of computers running Windows, Mac OS X, Linux or UNIX, as well as various mobile operating systems.
Simple Hierarchical Data Representation (SHDR) is a protocol used between the Adapter and Agent in an MTConnect industrial setup.
Family: | Network Management |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
Tag: | Industrial Protocols |
SNMP multiplexing (SMUX) is a computer networking protocol used in implementing the Simple Network Management Protocol (SNMP). It defines communications between the SNMP Agent and other processes.
SNMP is a request/response protocol that communicates management information between two types of SNMP software entities: SNMP applications (also called SNMP managers) and SNMP agents.
Nortel/SynOptics Network Management Protocol is a proprietary Nortel Networks management protocol.
Family: | Network Management |
Over: | snap |
Revision: | 17 |
Risk level: | 1 |
Tag: | Not Used |
WCCP is a Cisco protocol that specifies interactions between one or more routers and one or more web-caches.
Family: | Network Management |
Over: | udp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Network Utilities |
Vital QIP is DDI application (DNS, DHCP, IPAM (IP Address Management)) that comes with a manager (AMS) to administrate Vital QIP appliance.
Windows Management Instrumentation (WMI) is the Microsoft implementation of the Web-Based Enterprise Management (WBEM).
Agent for Zabbix monitoring server. Uses TCP port 10050.
Family: | Network Management |
Over: | tcp |
Revision: | 15 |
Risk level: | 3 |
Tag: | Network Utilities |
Tag: | Information Leaking |
Tag: | Server Applications |
The 3pc protocol (Third Party Connect Protocol) is found over the IP layer (IANA protocol number: 34).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
IPv6 over Low-Power Wireless Personal Area Network.
Family: | Network Service |
Over: | 802_15_4 |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
The 802.11 protocol is used to carry data (at MAC level) on IEEE 802.11 Wireless Local Area Networks.
Family: | Network Service |
Over: | capwap |
Revision: | 13 |
Risk level: | 1 |
Tag: | Not Used |
802.15.4 is a radio protocol for LR-WPANs (Low-Rate Wireless Personal Area Networks), and is the basis for the Zigbee & 6LoWPAN specifications.
Family: | Network Service |
Over: | zigbee_ep |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
ISO 8650-1/X.227 OSI Association Control SErvice (ACSE).
Family: | Network Service |
Over: | pp |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The activenet protocol (Active Networks) is found over the IP layer (IANA protocol number: 107).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
ALPES is a client server protocol build on top of TCP. Its main goal is to secure the administration of a network of computers by transferring configuration text files between an information server and its clients and executing programs on them.
The Remote EXecution Protocol (REX) provides a simple service for process-to-process interactions across a network, as part of ANSA Engineering Module.
ANSAware is an infrastructure for developing and running distributed application. It is available for a number of operating system like SunOS, HP/UX, VMS and MS DOS. A factory server is able to create server processes called capsules, and interfaces for a certain service type dynamically on the local computer node. References to these interfaces are mediated by a server called trader.
The any_0hop protocol (Any 0-hop protocol) is found over the IP layer (IANA protocol number: 114).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
Adhoc On-Demand Distance Vector (AODV) is a routing protocol for mobile adhoc networks (MANETs) and other wireless adhoc networks.
The argus protocol (ARGUS) is found over the IP layer (IANA protocol number: 13).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
Ariel is a client/server application developed to facilitate transfer of documents between libraries that are located in different geographical locations. Ariel allows users to send high-detail electronic images to other Ariel workstations anywhere in the world, using either FTP or email, converting the images to PDF files for easy delivery.
The aris protocol (ARIS) is found over the IP layer (IANA protocol number: 104).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
Process Application Programming Interface (PAPI) is used by Aruba Networks in their network management tools to control and manage access points.
AppleShare is a product from Apple which implemented various network services such as file server, a print server, web server, electronic mail server. AppleShare IP is a version of AppleShare that supports the use of TCP/IP protocol stack. AppleShare IP WebAdmin is the remote administration service of AppleShare IP where an administrator can perform administrative operations using a web browser.
The AppleTalk Protocol Suite implements services for routing, file transfer, printer sharing and emails in Apple environments.
AppleTalk Echo Protocol (AEP) is a transport layer protocol designed to test the reachability of network nodes. AEP generates packets to be sent to the network node and is identified in the Type field of a packet as an AEP packet.
AppleTalk Name Binding (NBP) was a dynamic, distributed system for managing AppleTalk names. When a service started up on a machine, it registered a name for itself as chosen by a human administrator.
The AppleTalk Routing Table Maintenance Protocol (RTMP) was the protocol by which routers kept each other informed about the topology of the network.
The AppleTalk Update-based Routing Protocol (AURP) provides wide area routing enhancements to the AppleTalk routing protocols and is fully compatible with AppleTalk Phase 2.
The Zone Information Protocol was the protocol by which AppleTalk network numbers were associated with zone names. A zone was a subdivision of the network that made sense to humans. While a network number had to be assigned to a topologically-contiguous section of the network, a zone could include several different discontiguous portions of the network.
The audit daemon, auditd, operates as a server, monitoring /dev/audit for local audit data, monitoring a known port for data from remote cooperating audit daemons, and monitoring an AF_UNIX socket for input from the system administrator.
The ax25 protocol (AX.25 Frames) is found over the IP layer (IANA protocol number: 93).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The bbn_rcc_mon protocol (BBN RCC Monitoring) is found over the IP layer (IANA protocol number: 10).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Network Utilities |
The Bundle Discovery Protocol(BDP) is used to determine where the Bundle Head is in a Multi-link PPP (MP) Link Control Protocol (LCP) phase. When a user dials into a Remote Access Server (RAS) and negotiates an MP connection in the LCP phase, the RAS must determine if a Bundle Head exists, and if not create it.
The Border Gateway Multicast Protocol (BGMP) is an IETF on-going project in an attempt to design a true inter-domain multicast routing protocol. BGMP should be able to scale in order to operate in the global Internet.
Britton Lee IDM is a protocol developed in the late 1980's as part of the Britton Lee company's relational database system.
The bna protocol (BNA) is found over the IP layer (IANA protocol number: 49).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
Deployment Server for Java (DSJ) is a deployment service. It is a part of Jbuilder, an integrated development environment (IDE) for the programming language Java, originally developed by Borland Software Corporation.
The br_sat_mon protocol (Backroom SATNET Monitoring) is found over the IP layer (IANA protocol number: 76).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
CAB Protocol provides a real estate developer and/or a facility manager with a suite of standardized methods for exchanging real-time data between building automation systems.
Cadlock is used to access AutoCad drawings protected by CadVault, a CadLock Incorporated product for digital rights management of graphical and non-graphical elements within AutoCAD drawing files.
The cbt protocol (Core-based trees) is found over the IP layer (IANA protocol number: 7).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The cftp protocol (CFTP) is found over the IP layer (IANA protocol number: 62).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
CGIProxy is a proxy software package. A CGI (Common Gateway Interface) Proxy is a proxy that appears as a web page allowing the user access to all sites through it.
Cisco Group Management Protocol (CGMP) limits the forwarding of IP multicast packets to only those ports associated with IP multicast clients.
The chaos protocol (Chaos) is found over the IP layer (IANA protocol number: 16).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The Character Generator Protocol (CHARGEN) is a service of the Internet Protocol Suite. It is intended for testing, debugging, and measurement purposes.
Check Point Management Interface (CPMI) is a proprietary protocol of Check Point Software Technologies. CPMI provides security services for their VPN-1 virtual private network/firewall software. The protocol contributes to Check Point Software's Open Platform for Security (OPSEC), which is a framework for network security. Typically CPMI uses TCP port 18190 as default.
Cisco Network Admission Control (NAC) is a system that provides integrated network security solutions. It offers authentication and authorization of wired, wireless, and VPN users and devices (access control), end-point security policies, simple guest access control, audition and information logging of network activity. Typically NAC uses UDP ports 8905 and 8906.
This protocol is used for data exchange between the Cisco Mobility Service Engine (MSE) and the Cisco Wireless LAN Controller (WLC).
Cisco Wireless LAN controller coordinates a set of Cisco wireless LAN access points. This plugin classifies the NDP packets and the protocol used between WLC instances for the Radio Resource Management functionality. The WLC also communicates with the APs using capwap tunnels, this will be classified as that protocol.s
Family: | Network Service |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
Tag: | Network Utilities |
Tag: | Business Applications |
Cisco Software-Defined AVC (SD-AVC) is a component of Cisco Application Visibility and Control (AVC). It works as a centralized network service, operating with specific participating devices in a network.
Family: | Network Service |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Utilities |
Tag: | Business Applications |
Tag Distribution Protocol (TDP) is a two party protocol that runs over a connection oriented transport layer with guaranteed sequential delivery. Tag Switching Routers use TDP to communicate tag binding information to their peers. TDP supports multiple network layer protocols including but not limited to IPv4, IPv6, IPX and AppleTalk.
Cloanto is a service developed by the Cloanto Corporation for use in the company's software components for electronic marketing, publishing, commerce and internationalization.
The Common Management Information Protocol (CMIP) is the OSI specified network management protocol. Defined in ITU-T Recommendation X.711, ISO/IEC International Standard 9596-1. It provides an implementation for the services defined by the Common Management Information Service (CMIS) specified in ITU-T Recommendation X.710, ISO/IEC International Standard 9595, allowing communication between network management applications and management agents. CMIS/CMIP is the network management protocol specified by the ISO/OSI Network management model and is further defined by the ITU-T in the X.700 series of recommendations.
The Common Management Information Protocol (CMIP) is the OSI specified network management protocol. Defined in ITU-T Recommendation X.711, ISO/IEC International Standard 9596-1. It provides an implementation for the services defined by the Common Management Information Service (CMIS) specified in ITU-T Recommendation X.710, ISO/IEC International Standard 9595, allowing communication between network management applications and management agents. CMIS/CMIP is the network management protocol specified by the ISO/OSI Network management model and is further defined by the ITU-T in the X.700 series of recommendations.
Coda Authentication Server represents the authentication procedure, as part of Coda, a distributed file system.
The compaq_peer protocol (Compaq Peer Protocol) is found over the IP layer (IANA protocol number: 110).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
Almanid Connection Endpoint (connendp) is a common module that serves the Almanid IdentityProtector. IdentityProtector is a backup product for Novell Directory Services and Novell eDirectory.
ContentServer is a Frontier 6 application that allows members of a website team to contribute to a Frontier-managed site, even if they don't use Frontier.
COTP (Connection Oriented Transport Protocol) is a protocol ensuring the transport service in the OSI model.
Covia is used mainly by emergency response teams and the military to enable audio, video, data and other types of communication between multiple systems and devices running different operating systems.
The cphb protocol (Computer Protocol Heart Beat) is found over the IP layer (IANA protocol number: 73).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The cpnx protocol (Computer Protocol Network Executive) is found over the IP layer (IANA protocol number: 72).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
Compaq Insight Manager Service (CPQ-WBEM) is a service used by the Compaq Insight Manager software. In 2002 Compaq was acquired by HP, and the Insight Manager software is now known as HP Insight Control.
The crtp protocol (Combat Radio Transport Protocol) is found over the IP layer (IANA protocol number: 126).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The crudp protocol (Combat Radio User Datagram) is found over the IP layer (IANA protocol number: 127).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The Computer Science Network (CSNET) was a computer network that began operation in 1981 in the United States. Its purpose was to extend networking benefits for computer science departments at academic and research institutions that could not be directly connected to ARPANET, due to funding or authorization limitations. The CSNET name service allowed manual and automated email address lookup based on various user attributes, such as name, title, or institution.
Proprietary protocol developed by Allen-Bradley, used on programmable logical controllers (PLC).
Family: | Network Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
The Concurrent Versions System keeps track of all work and all changes in a set of files, typically the implementation of a software project, and allows several developers to collaborate.
Datagram Authenticated Session Protocol (DASP) is designed to provide an unordered, reliable, secure session for full-duplex datagram exchange that can be implemented for low power wireless networks and low cost devices.
DATEX-ASN (AP-DATEX) provides a communications stack that supports routing, sequencing, and file transfer over point-to-point links, based on (sockets) TCP, IP, and PPP.
The Daytime Protocol is a debugging and measurement service. A host may connect to a server, that in turn returns an ASCII character string of the current date and time in an unspecified format.
dBase is a relational database management system. dBase II was the first widely used database management system (DBMS) for microcomputers. A major upgrade was released as dBase III, and ported to a wider variety of platforms, adding UNIX and VMS.
The dccp protocol (Datagram Congestion Control Protocol) is found over the IP layer (IANA protocol number: 33).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 2 |
Tag: | Transport Layer Protocols |
The dcn_meas protocol (DCN Measurement Subsystems) is found over the IP layer (IANA protocol number: 19).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The Device Control Protocol (DCP) is an application level protocol optimized for the integration, monitoring and control of devices on a network. It provides a framework for integrating unconventional network devices attached to networks either directly or as computer periphery.
The ddp protocol (Datagram Delivery Protocol) is found over the IP layer (IANA protocol number: 37).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
The ddx protocol (D-II Data Exchange (DDX) is found over the IP layer (IANA protocol number: 116).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
The dfs protocol (Any distributed file system) is found over the IP layer (IANA protocol number: 68).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
The dgp protocol (Dissimilar Gateway Protocol) is found over the IP layer (IANA protocol number: 86).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The DHCP protocol is used to configure automatically the network parameters of a station.
Family: | Network Service |
Over: | udp |
Revision: | 17 |
Risk level: | 4 |
Tag: | Network Utilities |
Tag: | Application Layer Protocols |
The DHCPv6 protocol is used to automatically configure the network parameters of a station in an IPv6 network.
Family: | Network Service |
Over: | udp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Network Utilities |
Tag: | Application Layer Protocols |
The Discard Protocol is a service intended for testing, debugging, and measurement purposes. A host sends data to another host that supports the Discard Protocol. The data is simply discarded by the receiving host, and no response is returned.
Distributed C Compiler protocol.
Family: | Network Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
Tag: | Network Utilities |
Tag: | Desktop Applications |
OSI Directory Service defines a powerful mechanism for storing and retrieving information about objects, and for arranging those objects in a hierarchical structure. Many types of objects and information can be stored in The Directory, including white pages information, application information, service information, etc. The OSI protocol defined to allow access to this information is the Directory Access Protocol (DAP). The DAP, being an OSI application-layer program, is fairly heavy-weight and requires a substantial amount of computing power and coding investment to implement. The DIXIE protocol is designed for use by smaller hosts (e.g., Macintoshes and PCs) that do not have the computing power or necessary software to implement a full OSI protocol stack. The DIXIE protocol is also useful for any Internet application that wants a simple interface to X.500 that requires very little coding investment.
DNP3 (Distributed Network Protocol) is a set of protocols used between components in process automation systems (SCADA).
The DNS protocol is used to translate internet names (www.site.com) into IP addresses and vice versa.
Family: | Network Service |
Over: | alibaba_cloud |
Over: | apple |
Over: | cisco |
Over: | cloudflare |
Over: | comcast |
Over: | |
Over: | google_gen |
Over: | http2 |
Over: | http |
Over: | https |
Over: | mozilla |
Over: | nextdns |
Over: | spdy |
Over: | ssl |
Over: | tcp |
Over: | udp |
Revision: | 17 |
Risk level: | 3 |
Tag: | Information Leaking |
Tag: | Application Layer Protocols |
The DNScrypt protocol is used to translate FQDN (Fully Qualified Domain Name) into address IP and vice versa with encrypted communication
The Data Stream Interface (DSI) is a session layer used to carry Apple Filing Protocol traffic over Transmission Control Protocol (TCP).
Family: | Network Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 1 |
Tag: | File Storage and Sharing |
Tag: | Server Applications |
DSP3270 was created in 1980 in order to allow bisynchronous (BSC) 3270 terminals to communicate through an X.25 network. A PAD (packet assembler-disassembler) connected to a BSC 3270 type device communicates over the packet switched network with another PAD connected to a host computer. The protocol defines the communication between the two PADs, it is carried above the X.25 level 3 layer and so it could be called a level 4 protocol although it is not compatible with the OSI Transport layer.
The dsr protocol (Dynamic Source Routing Protocol) is found over the IP layer (IANA protocol number: 48).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
The Deception ToolKit (DTK) is a toolkit designed to give defenders a couple of orders of magnitude advantage over attackers. In DTK, the deception is intended to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.
DTLS stands for Datagram Transport Layer Security protocol. It provides communications privacy for datagram protocols, and prevents eavesdropping, tampering, or message forgery.
DTP (Dynamic Trunk Protocol) is a proprietary networking protocol developed by Cisco Systems for the purpose of negotiating trunking on a link between two VLAN-aware switches.
The egp protocol (Exterior Gateway Protocol) is found over the IP layer (IANA protocol number: 8).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The emcon protocol (EMCON) is found over the IP layer (IANA protocol number: 14).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The encap protocol (Encapsulation Header) is found over the IP layer (IANA protocol number: 98).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 4 |
Tag: | Tunnels |
Tag: | Transport Layer Protocols |
Entrust Key Management Service Handler (Entrust-KMSH) is a cryptographic key management service for Entrust, a network security company, authentication products.
Efficient Short Remote Operations (ESRO) provide an efficient mechanism for realization of Remote Procedure Call.
The Ethernet protocol enables the addressing and sending of data between stations of an Ethernet segment.
Remote Execution (EXEC) protocol is used to run a program on a remote server as if it was being run on the local machine. This is accomplished by redirecting standard in/out and standard error through the connection.
Fast Adaptative and Secure Protocol (FASP) is developped by the company Aspera. It's a transfer protocol of high performance.
Family: | Network Service |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | File Storage and Sharing |
Tag: | Network Layer Protocols |
Tag: | Transport Layer Protocols |
FirstClass Protocol (FCP) is a transport layer networking protocol that all FirstClass communications used. The protocol guarantees error-free communications for all activities. FCP could run on several different physical layers, starting with modems and AppleTalk, and later adding Novell's IPX and TCP/IP. Both the client and server could communicate over any of these links, allowing a user to move from office to home and have access to the same server.
The fibre_channel protocol (Fibre Channel) is found over the IP layer (IANA protocol number: 133).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The Finger/Name protocol provides an interface to the Name and Finger programs at several network sites. These programs return a friendly, human-oriented status report on either the system at the moment or a particular person in depth.
The fire protocol (FIRE) is found over the IP layer (IANA protocol number: 125).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
Fujitsu Device Control is a system that controls devices within a house, to reduce the effort required of a user during authentication, as well as to prevent unauthorized access by a third party. By Fujitsu Limited, a Japanese IT services provider.
The gdomap daemon is used by GNUstep programs to lookup distributed objects of processes running across the network (and between different user accounts on a single machine). The daemon is not used for lookup where two processes belonging to the same user are using a host-local connection.
Geneve is a network virtualization over layer 3 (NVO3) Encapsulation protocol defined by IETF into RFC 8926.
The ggp protocol (Gateway_to_Gateway) is found over the IP layer (IANA protocol number: 3).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
Git is software for tracking changes in any set of files, usually used in software development for coordinating work among programmers collaboratively developing source code.
The gmtp protocol (GMTP) is found over the IP layer (IANA protocol number: 100).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
GraphOn Login is a protocol used by GraphOn, a company that develops secure cloud application delivery solutions.
GOOSE (Generic Object Oriented Substation Events) is a controlled model mechanism in which any format of data (status, value) is grouped into a data set and transmitted within a time period of 4 millisecond.
High-availability clusters (also known as HA clusters or failover clusters) are groups of computers that support server applications that can be reliably utilized with a minimum of downtime. They operate by harnessing redundant computers in groups or clusters that provide continued service when system components fail. HA clusters usually use a private network connection to monitor the health and status of each node in the cluster.
The Host Access Protocol (HAP) is a network layer protocol that defines the different types of host-to-network control messages and host-to-host data messages that may be exchanged over the access link connecting a host and the network packet switch node. The protocol establishes formats for these messages, and describes procedures for determining when each type of message should be transmitted and what it means when one is received.
The Dynamic Tunnel Configuration Protocol (DTCP) protocol provides a means for receivers to dynamically discover the presence of feeds and to maintain a list of operational tunnel end-points. Feeds periodically announce their tunnel end-point addresses over the unidirectional link using the HELLO message.
High-Level Entity Management System (HEMS) is made up of three parts: a query processor which can reside on any addressable entity, an event generator which also resides on entities, and applications which know how to send requests to the query processor and interpret the replies.
The hip protocol (Host Identity Protocol) is found over the IP layer (IANA protocol number: 139).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
The hmp protocol (Host Monitoring) is found over the IP layer (IANA protocol number: 20).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
The hopopt protocol (IPv6 Hop-by-Hop Option) is found over the IP layer (IANA protocol number: 0).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
The host protocol (Any host internal protocol) is found over the IP layer (IANA protocol number: 61).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
NIC Internet Hostname Server is a TCP-based host information program and protocol running on the SRI-NIC machine. The function of this particular server is to deliver machine-readable name/address information describing networks, gateways, hosts and eventually domains, within the internet environment. As currently implemented, the server provides the information outlined in the DoD Internet Host Table Specification.
Used by HP OpenView product family that consists of network and systems management products. In 2007, HP OpenView was rebranded as HP Network Management Center.
The HP OpenView Performance manager, agents, and monitor combine to provide flexible distributed management solution. This solution is a single interface for centrally monitoring, analyzing, and forecasting resource utilization for distributed multi-vendor environments.
Page description language (PDL) is a language that describes the appearance of a printed page in a higher level than an actual output bitmap.
HP Extended Local-Link Control is an LLC protocol enhancement. It is HP proprietary.
Family: | Network Service |
Over: | llc |
Revision: | 17 |
Risk level: | 1 |
Tag: | Not Used |
A Hybrid Point of Presence (PoP) is an Internet router with T1 lines into the internet. The POP takes TCP/IP packets from the Internet, modulates them into a standard TV channels and feeds them to a TV system.
Hyper-G is a multi-user, multi-protocol, structured hypermedia information system. It runs as a client-server application on the Internet.
Hyperwave-ISP is part of the Hyperwave document management system, which focuses on document and knowledge management in intranet environments.
The i_nlsp protocol (Integrated Net Layer Security TUBA) is found over the IP layer (IANA protocol number: 52).
Family: | Network Service |
Over: | ip |
Revision: | 20 |
Risk level: | 1 |
IAFServer is part of the Integrated Authentication Framework (IAF), a token-based infrastructure that enables Software AG's enterprise single sign-on. In addition, it allows usage of a configurable authentication system (user database) with Software AG products across platforms.
The iatp protocol (Interactive Agent Transfer Protocol) is found over the IP layer (IANA protocol number: 117).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
IEC 60870-6/TASE.2. Inter-Control Center Communications Protocol (ICCP) provides data exchange over Wide Area Networks (WANs) between utility control centers, utilities, power pools, regional control centers, and Non-Utility Generators.
Family: | Network Service |
Over: | mms_iso |
Revision: | 17 |
Risk level: | 1 |
The icmp protocol (Internet Control Message) is found over the IP layer (IANA protocol number: 1).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Network Layer Protocols |
Tag: | Network Utilities |
ICMPv6 is the diagnostic protocol used in IPv6 networks.
Family: | Network Service |
Over: | ip6 |
Revision: | 17 |
Risk level: | 1 |
Tag: | Network Layer Protocols |
Tag: | Network Utilities |
The idpr protocol (Inter_Domain Policy Routing Protocol) is found over the IP layer (IANA protocol number: 35).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
The idpr_cmtp protocol (IDPR Control Message Transport Proto) is found over the IP layer (IANA protocol number: 38).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
The idrp protocol (Inter_Domain Routing Protocol) is found over the IP layer (IANA protocol number: 45).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Network Utilities |
IEC 61850 Sampled Measured Values (SMV or SV) is protocol used in Electrical substations to share data between Intelligent Electronic Device (IED) under hard real time constraints (IEC 61850-9-2).
The IEEE Media Management System (MMS) is a distributed, multi-platform system for managing removable media. The IEEE MMS standards define a software component model for working with removable media as well as a number of protocols that define interfaces between the components. These standards enable vendors to construct applications that use removable media as well as components of an MMS that inter-operate with other MMS components.
The ifmp protocol (Ipsilon Flow Management Protocol) is found over the IP layer (IANA protocol number: 101).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The Internet Group Management Protocol (IGMP) is used by IP hosts to report their multicast group membership to routers.
Family: | Network Service |
Over: | ip |
Revision: | 17 |
Risk level: | 1 |
Tag: | Network Utilities |
The IGP protocol (any private interior gateway (used by Cisco for their IGRP)) is found over the IP layer (IANA protocol number: 9).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
The IL protocol (IL Transport Protocol) is found over the IP layer (IANA protocol number: 40).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
Integra Software Management Environment is part of Symantec Management Platform, which provides a set of services that IT-related solutions can leverage. Solutions plug into the platform and take advantage of the platform services, such as security, reporting, communications, package deployment, and Configuration Management Database (CMDB) data.
The Internet Protocol allows logical addressing of stations over an interconnected system of networks.
The IP_EXP_1 protocol (IANA Internet Protocol Number 253 used for experimentation and testing) is found over the IP layer (IANA protocol number: 253).
Family: | Network Service |
Over: | ip |
Revision: | 3 |
Risk level: | 1 |
Tag: | Not Used |
The IP_EXP_2 protocol (IANA Internet Protocol Number 254 used for experimentation and testing) is found over the IP layer (IANA protocol number: 254).
Family: | Network Service |
Over: | ip |
Revision: | 3 |
Risk level: | 1 |
Tag: | Not Used |
The ip_in_ip protocol (IP_within_IP Encapsulation Protocol) is found over the IP layer (IANA protocol number: 94).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
The ip_rdp protocol (Reliable Data Protocol over IP) is found over the IP layer (IANA protocol number: 27).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
The ip_reserved protocol (IANA Reserved Internet Protocol Number) is found over the IP layer (IANA protocol number: 255).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
IPv6 is the next generation protocol designed by the IETF to replace the current version Internet Protocol, IP Version 4 (IPv4).
The ipcomp protocol (IP Payload Compression Protocol) is found over the IP layer (IANA protocol number: 108).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
The IP Control Protocol (IPCP) is used to configure IP parameters of a station on a Point To Point link.
Family: | Network Service |
Over: | ppp |
Revision: | 18 |
Risk level: | 1 |
Tag: | Network Utilities |
The ipcv protocol (Internet Packet Core Utility) is found over the IP layer (IANA protocol number: 71).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Network Utilities |
The iplt protocol (IPDS MES Physical Layer Tester) is found over the IP layer (IANA protocol number: 129).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The ippc protocol (Internet Pluribus Packet Core) is found over the IP layer (IANA protocol number: 67).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
The iptm protocol (Protocol Internet Protocol Traffic Manager) is found over the IP layer (IANA protocol number: 84).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
The ipx_in_ip protocol (IPX in IP) is found over the IP layer (IANA protocol number: 111).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 3 |
Tag: | Tunnels |
Service Advertisement Protocol (SAP) allows servers to advertise their services to clients in a Novell network.
Family: | Network Service |
Over: | ipx |
Revision: | 18 |
Risk level: | 3 |
Tag: | Network Utilities |
The irtp protocol (Internet Reliable Transaction) is found over the IP layer (IANA protocol number: 28).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
TIA/EIA/IS-99 modem client (IS99C) is a data services option standard for wideband spread spectrum digital cellular systems.
TIA/EIA/IS-99 modem server (IS99S) is a data services option standard for wideband spread spectrum digital cellular systems.
Internet Small Computer Systems Interface (iSCSI), as described in RFC3720.
Family: | Network Service |
Over: | tcp |
Revision: | 2 |
Risk level: | 1 |
The isis protocol (ISIS for ipv4) is found over the IP layer (IANA protocol number: 124).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
InterSwitch Link Frame Format is a Cisco proprietary protocol used between network equipment of a LAN to transmit VLAN membership information of a frame.
Family: | Network Service |
Over: | base |
Revision: | 18 |
Risk level: | 1 |
Interlibrary Loan (ILL) protocol is used for communication between various document exchange systems. It allows ILL systems at different libraries that are residing on different hardware platforms and using different software packages such as VDX to communicate with each other to request and receive electronic documents.
The iso_ip protocol (ISO Internet Protocol) is found over the IP layer (IANA protocol number: 80).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
A protocol that is used to bridge ISO TP0 packets between X.25 and TCP networks. This technique is useful when interconnecting a DDN IP internet to an X.25 subnetwork.
The iso_tp4 protocol (ISO Transport Protocol Class 4) is found over the IP layer (IANA protocol number: 29).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
A Service Access Point (SAP) is an identifying label for network endpoints used in Open Systems Interconnection (OSI) networking. The Transport Services Access Point (TSAP) is a label for for the transport layer. This protocol is an implementation of TSAP over TCP.
IWARP (Internet Wide Area RDMA Protocol) is a protocol suite that implements Remote Direct Memory Access for efficient data transfer.
Family: | Network Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
Kerberos is a network authentication protocol. The protocol is used to verify identities over the internet using a trusted third party. Extensions of the protocol also use the exchange of cryptographic certification of a public key. Usually the protocol uses TCP/UDP ports 88/749 as default.
The kryptolan protocol (Kryptolan) is found over the IP layer (IANA protocol number: 65).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The lan protocol (Any local network) is found over the IP layer (IANA protocol number: 63).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
The larp protocol (Locus Address Resolution Protocol) is found over the IP layer (IANA protocol number: 91).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
The leaf_1 protocol (Leaf 1) is found over the IP layer (IANA protocol number: 25).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The leaf_2 protocol (Leaf 2) is found over the IP layer (IANA protocol number: 26).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
Lightstreamer is a real-time engine that delivers data over HTTP and WebSockets. This signature only classifies the HTTP flows.
The IEEE 802.2 Logical Link Control (LLC) protocol provides a link mechanism for upper layer protocols encapsulated in a frame. LLC type I service provides a datalink connectionless mode service, while LLC type II provides a connection-oriented service at the datalink layer.
Lightweight Access Point Protocol (LWAPP) is a protocol that can control multiple Wi-Fi access points at once. This can reduce the amount of time spent on configuring, monitoring or troubleshooting a large network. The system also allows network administrators to closely analyze the network.
M2PA is a signaling peer-to-peer protocol used by MTP2 in the Signaling System 7 (SS7).
Family: | Network Service |
Over: | sctp |
Revision: | 7 |
Risk level: | 4 |
Tag: | Network Layer Protocols |
Tag: | VoIP |
M2UA is an SCTP adaptation layer for encapsulated MTP2 messages in the Signaling System 7 (SS7).
Family: | Network Service |
Over: | sctp |
Revision: | 7 |
Risk level: | 4 |
Tag: | Network Layer Protocols |
Tag: | VoIP |
M3UA enables SS7 protocols stacking (ISUP, SCCP, ...) over an IP network.
Family: | Network Service |
Over: | sctp |
Revision: | 7 |
Risk level: | 4 |
Tag: | Network Layer Protocols |
Tag: | VoIP |
Server Admin is one of the remote administration/configuration tools for Mac OS X Server. It is used for remote administration of one or more servers. It can be used to install and setup Mac OS X Server on a remote computer, manage file share points, and configure service settings.
Mailslot is an IPC (InterProcess communication) protocol available on Windows Operating System.
Family: | Network Service |
Over: | smb |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
The manet protocol (MANET Protocols) is found over the IP layer (IANA protocol number: 138).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The masqdialer system is designed to provide easily accessible control of multiple dial-out modem connections to the members of a LAN using IP Masquerade for their internet connectivity. The system is a client/server design, so as long as a client can be written for a particular platform, that platform can take advantage of masqdialer's offerings.
Mapping of Airline Traffic over IP Type A (MATIP) is a communication application that connects an airline office or travel agency to a central computer system for seat reservations and ticket issuing. A dumb terminal or a PC accesses the central system (IBM or UNISYS) through a data network.
Mapping of Airline Traffic over IP Type B (MATIP) is an e-mail application where real-time is not needed. The addressing scheme uses an international format defined by IATA and contains the city and airline codes. It is transmitted with a high level of protection, multi-addressing and four levels of priority.
McIDAS (Man computer Interactive Data Access System) is a suite of sophisticated software packages that perform a wide variety of functions with satellite imagery, observational reports, numerical forecasts, and other geophysical data. Those functions include displaying, analyzing, interpreting, acquiring and managing the data.
Multipoint Communication Service (MCS) is a multipoint data delivery service for use in multimedia and audiovisual conferencing service. It provides the mechanism for multipoint aware applications to send data to all or a subset of the group with a single send primitive and to force, if desired, a uniformly sequenced reception of data for all users.
Family: | Network Service |
Over: | cotp |
Revision: | 17 |
Risk level: | 1 |
Tag: | Network Utilities |
mDNS (Multicast DNS) simplifies network configuration by allowing network devices to pick a domain name in the local DNS namespace and announce it using a subset of multicast IP address.
Family: | Network Service |
Over: | dns |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
The merit_inp protocol (MERIT Internodal Protocol) is found over the IP layer (IANA protocol number: 32).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The mfe_nsp protocol (MFE Network Services Protocol) is found over the IP layer (IANA protocol number: 31).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The micp protocol (Mobile Internetworking Control Pro.) is found over the IP layer (IANA protocol number: 95).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Mobile IP is a proposed standard protocol that builds on the Internet Protocol by making mobility transparent to applications and higher level protocols like TCP.
Family: | Network Service |
Over: | ip6 |
Revision: | 17 |
Risk level: | 1 |
MNDP (MikroTik Neighbor Discovery protocol) is a discovery protocol allowing to identify other devices compatible with MNDP.
Family: | Network Service |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Utilities |
Tag: | Application Layer Protocols |
The mobile protocol (IP Mobility) is found over the IP layer (IANA protocol number: 55).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
The mobilehdr protocol (Mobile Header) is found over the IP layer (IANA protocol number: 135).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The mpls_in_ip protocol (Multi Protocol Label Switching data-carrying mechanism) is found over the IP layer (IANA protocol number: 137).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
Message Processing Module (MPM) is part of the Internet message system. It is responsible for routing and delivering messages.
The Multiprotocol Transport Networking (MPTN) architecture is a general solution providing interconnectivity for applications. The MPTN architecture provides a protocol-independent system interface that includes most functions provided by existing transport protocols.
The Multicast Routing Monitor (MRM) is a feature in Cisco products. It is a management diagnostic tool that provides network fault detection and isolation in a large multicast routing infrastructure. It is designed to notify a network administrator of multicast routing problems in near real time.
The Distributed File System Replication (DFSR) service is a new multi-master replication engine that is used to keep folders synchronized on multiple servers.
Direct Internet Message Encapsulation (DIME) is a lightweight binary format to encapsulate a binary payload along with its type. This plugin handles version 1 of Dime.
Family: | Network Service |
Over: | tcp |
Revision: | 1 |
Risk level: | 3 |
Tag: | Application Layer Protocols |
The Microsoft Global Catalog is a distributed data repository that contains a searchable, partial representation of every object in every domain in a multi-domain Active Directory Domain Services (ADDS) forest. The global catalog is stored on domain controllers that have been designated as global catalog servers and is distributed through multi-master replication.
Microsoft System Center Operations Manager is a cross-platform data center management system for operating systems and hypervisors. It uses a single interface that shows state, health and performance information of computer systems. It also provides alerts generated according to some availability, performance, configuration or security situation being identified. It works with Microsoft Windows Server and Unix-based hosts.
Microsoft SQL Monitor uses the SQL Server Resolution Protocol. It is an application-layer request/response protocol that facilitates connectivity to a database server and provides for Communication endpoint information and Database instance enumeration.
Multicast Source Discovery Protocol (MSDP) is a multicast routing protocol belonging to the Protocol Independent Multicast (PIM) family. MSDP interconnects multiple IPv4 PIM Sparse-Mode (PIM-SM) domains, which enables PIM-SM to have Rendez-Vous Point (RP) redundancy and inter-domain multicasting.
The mtp protocol (Multicast Transport Protocol) is found over the IP layer (IANA protocol number: 92).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The mux protocol (Multiplexing) is found over the IP layer (IANA protocol number: 18).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Network Utilities |
Neighbor Aware Multicast Routings Protocol (NAMP), is a tree based, hybrid multicast routing protocol for A Mobile Ad Hoc Network (MANET). MANET is a system of wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary network topologies without the presence of any fixed communication infrastructure.
NBMA Address Resolution Protocol (NARP) allows a source terminal (a host or router), wishing to communicate over a Non-Broadcast Multi-Access (NBMA) link layer network, to find out the NBMA addresses of a destination terminal if the destination terminal is connected to the same NBMA network as the source.
Family: | Network Service |
Over: | ip |
Revision: | 17 |
Risk level: | 1 |
The Netnews Administration System (NAS) is a framework to simplify the administration and usage of network news (also known as Netnews) on the Internet. Data for the administration of newsgroups and hierarchies are kept in a distributed hierarchical database and are available through a client-server protocol.
The NAT Port Mapping Protocol (NAT-PMP) is a network protocol for establishing network address translation (NAT) settings and port forwarding configurations automatically without user effort.
Family: | Network Service |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Network Utilities |
Tag: | Application Layer Protocols |
NetBios Name Service (NBNS) is a protocol resulting from NetBios, and which makes it possible to manage the names in a Microsoft NetBios network. NetBios names are human readable and NBNS serves the same purpose as the DNS system in IP environments.
The NetWare Core Protocol (NCP) is a network protocol used to access file, print, directory, clock synchronization, messaging, remote command execution and other network service functions.
Family: | Network Service |
Over: | tcp |
Revision: | 17 |
Risk level: | 4 |
Tag: | Network Utilities |
nCube License Manager is a service used by nCube, a series of parallel computing computers. nCube used server class chips manufactured by a third party in massively parallel hardware deployments, primarily for the purposes of on-demand video. nCube was acquired and is now a part of the telecommunications company AARIS.
NDMP (Network Data Management Protocol) is an open protocol for enterprise-wide network based backup over TCP.
NEST, by Novell, defines a systems architecture, and supplies a set of implementation tools and strategies, to add value to embedded systems by making NetWare services available for their use. These services range from file and print, to communications with other network nodes.
The netblt protocol (Bulk Data Transfer Protocol) is found over the IP layer (IANA protocol number: 30).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
Netnews (Usenet) is a worldwide distributed Internet discussion system. It was developed from the general purpose UUCP architecture of the same name.
Netop Remote Control provides solutions for the remote management and support of enterprise IT infrastructure, help desk, customer service, kiosk and POS devices. The cross-platform capabilities make it possible to access the most common operating systems from any operating system of the same selection. Connection over the Internet is possible to both pre-installed clients as well as on-demand clients. Netop supports access to computers not having loaded the operating system for maintenance of BIOS etc.
NETRJS is a private protocol for remote job entry service, was defined and implemented by the UCLA Campus Computing Network (CCN). CCN's NETRJS server allows a remote user, or a daemon process working in behalf of a user, to access CCN's Remote Job Service (RJS) subsystem.
IBM NetView Distribution Manager (IBM NetView DM) provides centralized management capabilities. It enables customers to automate the distribution of software and data to a large number of remote targets when utilizing the S/390 computers as the primary management system. It provides centralized tracking, automated error recovery, and efficient utilization of the network during the distribution process and shows the customer a history of the distribution process.
NeXTSTEP (also written NeXTstep, NeXTStep, and NEXTSTEP) was the object-oriented, multitasking operating system developed by NeXT Computer to run on its range of proprietary workstation computers, such as the NeXTcube. It was later ported to several other computer architectures.
Network Mapper (Nmap) is a security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses. Nmap is able to determine the operating system of the target, names and versions of the listening services, estimated uptime, type of device, and presence of a firewall.
The Network Queueing System (NQS) allows users to submit batch jobs to queues on local or remote machines for execution. The NQS supports returning log and error files to the machine that originated the job.
The Network Systems (NS) protocol family is a collection of protocols layered atop the Internet Datagram Protocol (IDP) transport layer, using the Xerox Network Systems (XNS) address formats.
The nsfnet_igp protocol (NSFNET_IGP) is found over the IP layer (IANA protocol number: 85).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
NSH (Network Service Header) is an encapsulation protocol used for service functions chaining. This protocol is only supported when running on ixE 5.1 (at least) flow manager.
Internet Inter-ORB Protocol (IIOP) is used to allow different computer programs which use different programming code to communicate with one another on the Internet. IIOP Name Service operates in Secure Socket Layer and Transport Layer Security(SSL/TLS).
Network Time Protocol (NTP) is a time synchronization system for computer clocks through the Internet network. It provides mechanisms to synchronize time and coordinate time distribution in a large network.
Family: | Network Service |
Over: | udp |
Revision: | 17 |
Risk level: | 2 |
Tag: | Network Utilities |
The nvp_ii protocol (Network Voice Protocol) is found over the IP layer (IANA protocol number: 11).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | VoIP |
The Tivoli object dispatcher (oserv) is the central driving mechanism for operations in the Tivoli environment. It maintains the Tivoli object database on each system that has Tivoli installed, it routes object calls to the proper systems and objects, and it arranges for the execution of methods that are invoked in the context of objects that reside on the local system.
The Optimized Link State Routing Protocol (OLSR) is an IP routing protocol optimized for mobile adhoc networks, which can also be used on other wireless adhoc networks. OLSR is a proactive link-state routing protocol, which uses hello and topology control (TC) messages to discover and then disseminate link state information throughout the mobile adhoc network. Individual nodes use this topology information to compute next hop destinations for all nodes in the network using shortest hop forwarding paths.
The Health Monitoring Service is used to monitor web services installed in one or multiple sites. The Health Monitoring Service can highlight issues that cause downtime or poor performance, such as unavailable services, long response time, and security breaches.
OpalisRobot is a comprehensive system management and automation solution. It delivers real-time monitoring, notification, corrective action and event driven job scheduling to provide administrators with proactive management.
Operations Planning and Control (OPC) is part of IBM Tivoli OPC Operations and Administration discipline. Tivoli OPC supports operations management, providing the foundation for enterprise-wide production workload management. Tivoli OPC helps users plan, manage, and automate the production workload, and control a single-image OS/390 system or complex, multi-vendor networks and systems from a single point of control.
Used by IBM in their Tivoli Operations Planning and Control product for planning, managing, and automating production workloads from a single point of control.
Oracle Names is a distributed naming service developed to help simplify the setup and administration of global, client/server computing networks. Oracle Names establishes and maintains an integrated system of names servers that work together like a directory service, storing addresses for all the services on a network and making them available to clients wanting to make a connection.
Oracle Connection Manager, a Net8 component that acts much like a router and provides protocol conversion, connection concentration, and access control.
SQL*NET is a client-server middleware used to transfer information between databases and between database to clients.
ISO Network Layer Protocol is used by Cisco Equipment to transmit OSI protocols (IS-IS, ...) over Ethernet.
PassGo Technologies Service is a service used by PassGo. PassGo is a product manufactured by PassGo Technologies, a company that developed software for web access management, privilege management and one-time password token products. In 2008 they were acquired by Quest Software Inc.
The Change Password service is a protocol provider that services Kerberos Change Password and Set Password Protocol requests. Change Password is a request-reply protocol that uses Kerberos infrastructure to allow users to securely set initial passwords or to change existing passwords. The Change Password protocol interoperates with the original Kerberos Change Password protocol, while adding the ability for an administrator to set a password for a new user.
Packet Forwarding Control Protocol (PFCP) is a 3GPP protocol, used on Sx and N4 links, to allow communication between the Control and User plane. It transfers information and forwarding rules between those two planes.
Family: | Network Service |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
The pgm protocol (PGM Reliable Transport Protocol) is found over the IP layer (IANA protocol number: 113).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Photuris is a session-key management protocol intended for use with the IP Security Protocols (AH and ESP). Photuris establishes short-lived session-keys between two parties, without passing the session-keys across the Internet.
PHProxy is a web HTTP proxy programmed in PHP meant to bypass firewalls and access otherwise inaccessible resources.
Family: | Network Service |
Over: | http2 |
Over: | http |
Over: | http_proxy |
Over: | https |
Over: | spdy |
Revision: | 15 |
Risk level: | 5 |
Tag: | Anonymizer |
Tag: | Masquerading Tunnels |
The PIM Protocol provides an efficient routing of multicast groups that may span wide-area Internet zones.
The pipe protocol (Private IP Encapsulation within IP) is found over the IP layer (IANA protocol number: 131).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
The Public Information Retrieval Protocol (PIRP) gives Internet hosts a simple, uniform, efficient, extensible, easily implemented method of publishing information.
The Time-Stamp Protocol (TSP, PKIX-TimeStamp) is a cryptographic protocol for certifying timestamps using X.509 certificates and public key infrastructure. The timestamp is the signer's assertion that a piece of electronic data existed at or before a particular time.
Palto Alto Panorama is a network security management appliance with DPI visibility and network rules editing. This plugin classifies the management protocol between Panorama and managed firewalls or managed collectors.
The pnni protocol (PNNI over IP) is found over the IP layer (IANA protocol number: 102).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Persistence of Vision Raytracer (POV-Ray) is a ray tracing program available for a variety of computer platforms. It was originally based on DKBTrace. There are also influences from the earlier Polyray Raytracer. POV-Ray is freeware with the source code available.
ISO 8823/X.226 OSI PRESENTATION PROTOCOL (PP).
Family: | Network Service |
Over: | sp |
Revision: | 17 |
Risk level: | 1 |
The private_enc protocol (Any private encryption scheme) is found over the IP layer (IANA protocol number: 99).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 5 |
Tag: | Encrypts communications |
The prm protocol (Packet Radio Measurement) is found over the IP layer (IANA protocol number: 21).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The Prospero Resource Manager (PRM) is a scalable resource allocation system that supports the allocation of processing resources in large networks and on multiprocessor systems.
The Prospero Resource Manager (PRM) presents a uniform and scalable model for scheduling tasks in parallel and distributed systems. PRM provides the mechanisms through which nodes on multiprocessors can be allocated to jobs running within an extremely large distributed system. The system manager is one (out of three) type of managers that manages the full set of resources that exist in a system.
The ptp protocol (Performance Transparency Protocol) is found over the IP layer (IANA protocol number: 123).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a local area network it achieves clock accuracy in the sub-microsecond range, making it suitable for measurement and control systems.
The Precision Time Protocol (PTP) is a protocol used to synchronize clocks throughout a computer network. On a local area network it achieves clock accuracy in the sub-microsecond range, making it suitable for measurement and control systems.
The pup protocol (PUP) is found over the IP layer (IANA protocol number: 12).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
The PWDGEN Service provides a set of six randomly generated eight-character CRLF-delimited "words" with a reasonable level of pronounceability, using a multi-level algorithm. An implementation of the algorithm is available in FORTRAN-77 for examination and possible implementation by system administrators only.
The pvp protocol (Packet Video Protocol) is found over the IP layer (IANA protocol number: 75).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Generic Discovery Protocol (GDP) is a protocol developed for finding or discovering Internet connectivity servers (such as WinGate). It is used by both the WinGate Internet Client (WGIC) and GateKeeper for finding WinGate. It is designed to be fully automatic, requiring no user intervention.
The qnx protocol (QNX) is found over the IP layer (IANA protocol number: 106).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
The Quote Of The Day (QOTD) service is a useful debugging and measurement tool. A quote of the day service simply sends a short message without regard to the input.
RANAP (Radio Access Network Application Part) is used in RAN (Radio Access Network). It is responsible for the signalling service between UTRAN (Universal Terrestrial Radio Access Network) or GERAN (GSM Edge Radio Access Network).
Family: | Network Service |
Over: | sccp_ss7 |
Revision: | 1 |
Risk level: | 1 |
Tag: | Industrial Protocols |
Route Access Protocol (RAP) is a general protocol for distributing routing information at all levels of the Internet, from private LANs to the widest-flung international carrier networks. It does not distinguish between "interior" and "exterior" routing (except as restricted by specific policy), and therefore is not as restricted nor complex as those protocols that have strict level and area definitions in their models.
The rescap Resolution protocol is a general client-server resolution protocol that translates resource identifiers to a list of attributes. A rescap client can ask a rescap server for the attributes of a particular mail user. Rescap is very lightweight and acts only as a resolution protocol, not a directory service.
Relational Interface System (RIS) is Intergraph Corporation's middleware for connecting client software and DBMS. It is used in geographic information systems Modular GIS Environment (MGE) and GeoMedia, the digital photogrammetric station ImageStation, security systems, CAD software (such as MicroStation) and mechanical-design software I/EMS (predecessor of Solid Edge). It was developed for UNIX (including CLIX) many years before Open Database Connectivity (ODBC) and in the last years for Apple Macintosh and Windows computers.
The Remote Job Entry (RJE)is a Job Entry Subsystem (JES2) function that provides the ability to submit jobs and receive system output (SYSOUT) at remote facilities as if the jobs had been submitted at a local facility.
Resource Location Protocol (RLP) is a protocol used to discover the location of resources present in a network.
Family: | Network Service |
Over: | udp |
Revision: | 17 |
Risk level: | 1 |
Rational Method Composer is a tool platform that enables process engineers and managers to implement, deploy, and maintain processes for organizations or individual projects.
Rmonitor is a protocol used by remote network monitoring devices, often called monitors or probes, that exist for the purpose of managing a network. Often these remote probes are stand-alone devices and devote significant internal resources for the sole purpose of managing a network. An organization may employ many of these devices, one per network segment, to manage its internet.
Rmt is a program used by the remote, dump, restore or tar programs in manipulating a magnetic tape drive through an interprocess communication connection.
The rohc protocol (Robust Header Compression) is found over the IP layer (IANA protocol number: 142).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Roughtime is a secure time synchronization protocol.
Family: | Network Service |
Over: | udp |
Revision: | 1 |
Risk level: | 2 |
Tag: | Application Layer Protocols |
IBM Remote Program Load allows a client computer to retrieve startup and configuration software from a server when it starts.
Reverse Routing Header (RRH) is a variable size reverse route header used to learn a path back hop-by-hop. It is formed of addresses that are located on the egress interface of the packets.
Registry Registrar Protocol (RRP) is a text protocol that permits multiple registrars to provide second level Internet domain name registration services in the top level domains (TLDs) administered by a TLD registry. The registry stores information about registered domain names and associated name servers.
The rsvp_e2e_ignore protocol (Original Experimental Academic Or Proprietary Protocols) is found over the IP layer (IANA protocol number: 134).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The Resource Reservation Protocol (RSVP) is a transport layer protocol designed to reserve resources across a network for an integrated services Internet. It is one component of a framework designed to extend IP to support multiple, controlled classes of service over a wide variety of link-level technologies. To deploy this technology with maximum flexibility, it is desirable for tunnels to act as RSVP-controllable links within the network.
The rvd protocol (MIT Remote Virtual Disk Protocol) is found over the IP layer (IANA protocol number: 66).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
Sirius Systems Software is a software for business needs. It provides business solutions for customers along with mobile devices support, connecting offices together, and creating new customer database. It also provides remote monitoring and and email protection service.
S1 Application Protocol (S1AP), as described in 3GPP TS 36.413 version 11.2.1 Release 11 (2013-02).
Family: | Network Service |
Over: | sctp |
Revision: | 8 |
Risk level: | 3 |
Tag: | Network Utilities |
Tag: | Application Layer Protocols |
The sat_expak protocol (SATNET and Backroom EXPAK) is found over the IP layer (IANA protocol number: 64).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The sat_mon protocol (SATNET Monitoring) is found over the IP layer (IANA protocol number: 69).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The scc_sp protocol (Semaphore Communications Sec. Pro.) is found over the IP layer (IANA protocol number: 96).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
SCCP is a network layer protocol that provides routing, flow control or error detection services in SS7 networks.
Family: | Network Service |
Over: | m3ua |
Revision: | 7 |
Risk level: | 3 |
Tag: | Network Layer Protocols |
Tag: | Network Utilities |
Tag: | VoIP |
STP is a connection-oriented data transfer protocol. It is found over the IP layer (IANA protocol number: 118).
Family: | Network Service |
Over: | ip |
Revision: | 1 |
Risk level: | 1 |
Tag: | Network Layer Protocols |
The scps protocol (SCPS) is found over the IP layer (IANA protocol number: 105).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The sctp protocol (Stream Control Transmission Protocol) is found over the IP layer (IANA protocol number: 132).
Secure Data Network System Key Management Protocol (SDNS-KMP) is a key management protocol for SDNS. SDNS implements computer to computer communications security for distributed applications. The key management section implements the exchange of credentials and the traffic encryption key attributes.
The sdrp protocol (Source Demand Routing Protocol) is found over the IP layer (IANA protocol number: 42).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The secure_vmtp protocol (SECURE_VMTP) is found over the IP layer (IANA protocol number: 82).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
The Secure Neighbor Discovery (SEND) protocol is a security extension of the Neighbor Discovery Protocol (NDP) in IPv6. The Neighbor Discovery Protocol (NDP) is responsible in IPv6 for discovery of other network nodes on the local link, to determine the link layer addresses of other nodes, and to find available routers, and maintain reachability information about the paths to other active neighbor nodes.
Secure Electronic Transaction (SET) was a standard protocol for securing credit card transactions over insecure networks, specifically, the Internet. SET was not itself a payment system, but rather a set of security protocols and formats that enable users to employ the existing credit card payment infrastructure on an open network in a secure fashion.
Simple File Transfer Protocol (SFTP), was proposed as an unsecured file transfer protocol with a level of complexity intermediate between TFTP and FTP. SFTP supports user access control, file transfers, directory listing, directory changing, file renaming and deleting.
Simple Gateway Monitoring Protocol (SGMP) allows commands to be issued to application protocol entities to set or retrieve values (integer or octet string types) for use in monitoring the gateways on which the application protocol entities reside. Messages are exchanged using UDP and utilize unreliable transport methods.
The shim6 protocol (Shim6 Protocol) is found over the IP layer (IANA protocol number: 140).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The simple_msg_p protocol (Simple Message Protocol) is found over the IP layer (IANA protocol number: 121).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The Sitara Network Protocol (SNP) addresses performance problems over the Internet, intranets, and extranet, providing a higher quality of service to traffic between the end points of a Sitara-enhanced connection.
The Sitara Network Protocol (SNP) addresses performance problems over the Internet, intranets, and extranet, providing a higher quality of service to traffic between the end points of a Sitara-enhanced connection.
The Sitara Network Protocol (SNP) addresses performance problems over the Internet, intranets, and extranet, providing a higher quality of service to traffic between the end points of a Sitara-enhanced connection.
The skip protocol (SKIP) is found over the IP layer (IANA protocol number: 57).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The SM protocol is found over the IP layer (IANA protocol number: 122).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
SMB Direct protocol is a transmission protocol which allows higher thoughput when exchanging data using SMB.
Family: | Network Service |
Over: | iwarp |
Revision: | 1 |
Risk level: | 3 |
Tag: | File Storage and Sharing |
Tag: | Network Utilities |
Tag: | Application Layer Protocols |
The SysMan Station is a client-server application consisting of a daemon (smsd) and the SysMan Station graphical user interface (sysman station). The SysMan Station provides the ability to monitor and manage a single system or a TruCluster system. The smsd server is responsible for gathering system management data from the host and presenting that information to the SysMan Station client.
Gateway Access Server (GAS) is part of Systems Network Architecture (SNA), IBM's proprietary networking architecture. It is a complete protocol stack for interconnecting computers and their resources.
Sub-Network Access Protocol (SNAP) is a protocol encapsulated in the LLC protocol enabling the encapsulation of a greater number of protocols in Ethernet II frames.
Family: | Network Service |
Over: | llc |
Revision: | 17 |
Risk level: | 1 |
System iNtrusion Analysis and Reporting Environment (SNARE) is a group of open-source agents, and a commercial server, used to collect audit log data from a variety of operating systems and applications to facilitate centralized log analysis. Agents are available for Linux, Windows, Solaris, IIS, Lotus Notes, Irix, AIX, ISA and more.
The snp protocol (Sitara Networks Protocol) is found over the IP layer (IANA protocol number: 109).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
This protocol defines a method by which a pager can receive a message over the Internet
Family: | Network Service |
Over: | tcp |
Revision: | 17 |
Risk level: | 3 |
Tag: | Application Layer Protocols |
Simple Network Time Protocol Heartbeat (SNTP-HEARTBEAT) is used to provide a multicast heartbeat in a network. It can be used by network operators as well as application developers to alert themselves to losses of multicast connectivity in portions of the network.
SoftPC is a software emulator of x86 hardware by Insignia that runs MS-DOS on UNIX workstations and Windows on MAC OS.
Sonar is a service designed to allow the availability of network-accessible resources to a world wide audience by providing several copies (or mirrors) of those resources at multiple locations.
ISO 8327-1/X.225 OSI Session Protocol (SP).
Family: | Network Service |
Over: | cotp |
Revision: | 17 |
Risk level: | 1 |
The sprite_rpc protocol (Sprite RPC Protocol) is found over the IP layer (IANA protocol number: 90).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The sps protocol (Secure Packet Shield) is found over the IP layer (IANA protocol number: 130).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The System Resource Controller (SRC) provides a set of commands and subroutines to make it easier for the system manager and programmer to create and control subsystems.
The srp protocol (SpectraLink Radio Protocol) is found over the IP layer (IANA protocol number: 119).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The sscopmce protocol (Service Specific Connection Oriented Protocol for M-Cast Env) is found over the IP layer (IANA protocol number: 128).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
SCSI on Scheduled Transfer (ST) standard (SST) defines a method of encapsulating SCSI packets inside STP (ST Protocol), providing a possibility for high-performance network-attached storage. SCSI (Small Computer System Interface) is a set of standards for physically connecting and transferring data between computers and peripheral devices.
The st protocol (Stream) is found over the IP layer (IANA protocol number: 5).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Not Used |
The Statistics Server (STATSRV) protocol is intended as a lightweight mechanism similar in spirit to NETSTAT and complementary to it. STATSRV is designed to capture statistics data with minimal intrusion on existing systems or networks. It is intended for use with existing hosts and gateways primarily for casual monitoring and debugging purposes.
STUN (Session Traversal Utilities for NAT) allows a client behind a NAT to establish UDP tunnels between two hosts.
Family: | Network Service |
Over: | http_proxy |
Over: | ssl |
Over: | tcp |
Over: | udp |
Revision: | 18 |
Risk level: | 5 |
SU/MIT Telnet Gateway is used to enable users to telnet between networks running different protocols.
This protocol defines the transport of SCCP signalization over an IP network through SCTP.
Family: | Network Service |
Over: | sctp |
Revision: | 7 |
Risk level: | 3 |
Tag: | Network Layer Protocols |
Tag: | VoIP |
The sun_nd protocol (SUN ND PROTOCOL_Temporary) is found over the IP layer (IANA protocol number: 77).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
Sun Microsystems Remote Procedure Call (SunRPC) is a client-server protocol that allows users to call procedures remotely, which means the procedure is actually done at the server and not at the local user. The server holds a port mapper that listens to queries, usually on port 111.
The SUPDUP protocol provides means for login to a remote system over a network with terminal-independent output, so that only the local system need know how to handle the user's terminal. It offers facilities for graphics and for local assistance to remote text editors.
Speeded Up Robust Feature (SURF) is a robust local feature detector that can be used in computer vision tasks like object recognition or 3D reconstruction. It is partly inspired by the SIFT descriptor.
The swipe protocol (IP with Encryption) is found over the IP layer (IANA protocol number: 53).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 5 |
Tag: | Not Used |
Synergy is a computer resources sharing application that lets users easily share a mouse and keyboard between multiple computers. It works on Windows, Mac OS X and Linux.
The tcf protocol (TCF) is found over the IP layer (IANA protocol number: 87).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
TCP is a protocol providing a connection-oriented and reliable transfer service. It is used by most TCP/IP applications today (IANA protocol number: 6).
Tobit software provides different kinds of communication solutions, including Faxing software, email, fax, voice, SMS and more.
This protocol is used in the bank sector.
Family: | Network Service |
Over: | udp |
Revision: | 17 |
Risk level: | 4 |
Tag: | Business Applications |
Tag: | Application Layer Protocols |
Timbuktu is a remote control software product developed by WOS Datasystems. Timbuktu is compatible with computers running both Mac OS X and Windows.
A time server is a server computer that reads the actual time from a reference clock and distributes this information to its clients using a computer network. The time server may be a local network time server or an Internet time server.
The tlsp protocol (Transport Layer Security) is found over the IP layer (IANA protocol number: 56).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The tp_plus_plus protocol (TP++ Transport Protocol) is found over the IP layer (IANA protocol number: 39).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
This plugin classifies IP packets issued by the traceroute command, a network diagnostic command for obtaining the route to a given IP address. This plugin supports traceroute with UDP and ICMP methods.
The trunk_1 protocol (Trunk 1) is found over the IP layer (IANA protocol number: 23).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The trunk_2 protocol (Trunk 2) is found over the IP layer (IANA protocol number: 24).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The User Datagram Protocol is a transport protocol providing a simple but non-reliable message transfer service in IP networks. It is used by most applications that do not require a reliable delivery transmission service. (IANA protocol number: 17).
The UDPLITE protocol (Connectionless protocol very similar to UDP) is found over the IP layer (IANA protocol number: 136).
Family: | Network Service |
Over: | ip |
Revision: | 19 |
Risk level: | 1 |
Tag: | Transport Layer Protocols |
The UNASSIGNED_IP_PROT_143 protocol (IANA Unassigned Internet Protocol Number 143) is found over the IP layer (IANA protocol number: 143).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_144 protocol (IANA Unassigned Internet Protocol Number 144) is found over the IP layer (IANA protocol number: 144).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_145 protocol (IANA Unassigned Internet Protocol Number 145) is found over the IP layer (IANA protocol number: 145).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_146 protocol (IANA Unassigned Internet Protocol Number 146) is found over the IP layer (IANA protocol number: 146).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_147 protocol (IANA Unassigned Internet Protocol Number 147) is found over the IP layer (IANA protocol number: 147).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_148 protocol (IANA Unassigned Internet Protocol Number 148) is found over the IP layer (IANA protocol number: 148).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_149 protocol (IANA Unassigned Internet Protocol Number 149) is found over the IP layer (IANA protocol number: 149).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_150 protocol (IANA Unassigned Internet Protocol Number 150) is found over the IP layer (IANA protocol number: 150).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_151 protocol (IANA Unassigned Internet Protocol Number 151) is found over the IP layer (IANA protocol number: 151).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_152 protocol (IANA Unassigned Internet Protocol Number 152) is found over the IP layer (IANA protocol number: 152).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_153 protocol (IANA Unassigned Internet Protocol Number 153) is found over the IP layer (IANA protocol number: 153).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_154 protocol (IANA Unassigned Internet Protocol Number 154) is found over the IP layer (IANA protocol number: 154).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_155 protocol (IANA Unassigned Internet Protocol Number 155) is found over the IP layer (IANA protocol number: 155).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_156 protocol (IANA Unassigned Internet Protocol Number 156) is found over the IP layer (IANA protocol number: 156).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_157 protocol (IANA Unassigned Internet Protocol Number 157) is found over the IP layer (IANA protocol number: 157).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_158 protocol (IANA Unassigned Internet Protocol Number 158) is found over the IP layer (IANA protocol number: 158).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_159 protocol (IANA Unassigned Internet Protocol Number 159) is found over the IP layer (IANA protocol number: 159).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_160 protocol (IANA Unassigned Internet Protocol Number 160) is found over the IP layer (IANA protocol number: 160).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_161 protocol (IANA Unassigned Internet Protocol Number 161) is found over the IP layer (IANA protocol number: 161).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_162 protocol (IANA Unassigned Internet Protocol Number 162) is found over the IP layer (IANA protocol number: 162).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_163 protocol (IANA Unassigned Internet Protocol Number 163) is found over the IP layer (IANA protocol number: 163).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_164 protocol (IANA Unassigned Internet Protocol Number 164) is found over the IP layer (IANA protocol number: 164).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_165 protocol (IANA Unassigned Internet Protocol Number 165) is found over the IP layer (IANA protocol number: 165).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_166 protocol (IANA Unassigned Internet Protocol Number 166) is found over the IP layer (IANA protocol number: 166).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_167 protocol (IANA Unassigned Internet Protocol Number 167) is found over the IP layer (IANA protocol number: 167).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_168 protocol (IANA Unassigned Internet Protocol Number 168) is found over the IP layer (IANA protocol number: 168).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_169 protocol (IANA Unassigned Internet Protocol Number 169) is found over the IP layer (IANA protocol number: 169).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_170 protocol (IANA Unassigned Internet Protocol Number 170) is found over the IP layer (IANA protocol number: 170).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_171 protocol (IANA Unassigned Internet Protocol Number 171) is found over the IP layer (IANA protocol number: 171).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_172 protocol (IANA Unassigned Internet Protocol Number 172) is found over the IP layer (IANA protocol number: 172).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_173 protocol (IANA Unassigned Internet Protocol Number 173) is found over the IP layer (IANA protocol number: 173).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_174 protocol (IANA Unassigned Internet Protocol Number 174) is found over the IP layer (IANA protocol number: 174).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_175 protocol (IANA Unassigned Internet Protocol Number 175) is found over the IP layer (IANA protocol number: 175).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_176 protocol (IANA Unassigned Internet Protocol Number 176) is found over the IP layer (IANA protocol number: 176).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_177 protocol (IANA Unassigned Internet Protocol Number 177) is found over the IP layer (IANA protocol number: 177).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_178 protocol (IANA Unassigned Internet Protocol Number 178) is found over the IP layer (IANA protocol number: 178).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_179 protocol (IANA Unassigned Internet Protocol Number 179) is found over the IP layer (IANA protocol number: 179).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_180 protocol (IANA Unassigned Internet Protocol Number 180) is found over the IP layer (IANA protocol number: 180).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_181 protocol (IANA Unassigned Internet Protocol Number 181) is found over the IP layer (IANA protocol number: 181).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_182 protocol (IANA Unassigned Internet Protocol Number 182) is found over the IP layer (IANA protocol number: 182).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_183 protocol (IANA Unassigned Internet Protocol Number 183) is found over the IP layer (IANA protocol number: 183).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_184 protocol (IANA Unassigned Internet Protocol Number 184) is found over the IP layer (IANA protocol number: 184).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_185 protocol (IANA Unassigned Internet Protocol Number 185) is found over the IP layer (IANA protocol number: 185).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_186 protocol (IANA Unassigned Internet Protocol Number 186) is found over the IP layer (IANA protocol number: 186).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_187 protocol (IANA Unassigned Internet Protocol Number 187) is found over the IP layer (IANA protocol number: 187).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_188 protocol (IANA Unassigned Internet Protocol Number 188) is found over the IP layer (IANA protocol number: 188).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_189 protocol (IANA Unassigned Internet Protocol Number 189) is found over the IP layer (IANA protocol number: 189).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_190 protocol (IANA Unassigned Internet Protocol Number 190) is found over the IP layer (IANA protocol number: 190).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_191 protocol (IANA Unassigned Internet Protocol Number 191) is found over the IP layer (IANA protocol number: 191).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_192 protocol (IANA Unassigned Internet Protocol Number 192) is found over the IP layer (IANA protocol number: 192).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_193 protocol (IANA Unassigned Internet Protocol Number 193) is found over the IP layer (IANA protocol number: 193).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_194 protocol (IANA Unassigned Internet Protocol Number 194) is found over the IP layer (IANA protocol number: 194).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_195 protocol (IANA Unassigned Internet Protocol Number 195) is found over the IP layer (IANA protocol number: 195).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_196 protocol (IANA Unassigned Internet Protocol Number 196) is found over the IP layer (IANA protocol number: 196).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_197 protocol (IANA Unassigned Internet Protocol Number 197) is found over the IP layer (IANA protocol number: 197).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_198 protocol (IANA Unassigned Internet Protocol Number 198) is found over the IP layer (IANA protocol number: 198).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_199 protocol (IANA Unassigned Internet Protocol Number 199) is found over the IP layer (IANA protocol number: 199).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_200 protocol (IANA Unassigned Internet Protocol Number 200) is found over the IP layer (IANA protocol number: 200).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_201 protocol (IANA Unassigned Internet Protocol Number 201) is found over the IP layer (IANA protocol number: 201).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_202 protocol (IANA Unassigned Internet Protocol Number 202) is found over the IP layer (IANA protocol number: 202).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_203 protocol (IANA Unassigned Internet Protocol Number 203) is found over the IP layer (IANA protocol number: 203).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_204 protocol (IANA Unassigned Internet Protocol Number 204) is found over the IP layer (IANA protocol number: 204).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_205 protocol (IANA Unassigned Internet Protocol Number 205) is found over the IP layer (IANA protocol number: 205).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_206 protocol (IANA Unassigned Internet Protocol Number 206) is found over the IP layer (IANA protocol number: 206).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_207 protocol (IANA Unassigned Internet Protocol Number 207) is found over the IP layer (IANA protocol number: 207).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_208 protocol (IANA Unassigned Internet Protocol Number 208) is found over the IP layer (IANA protocol number: 208).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_209 protocol (IANA Unassigned Internet Protocol Number 209) is found over the IP layer (IANA protocol number: 209).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_210 protocol (IANA Unassigned Internet Protocol Number 210) is found over the IP layer (IANA protocol number: 210).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_211 protocol (IANA Unassigned Internet Protocol Number 211) is found over the IP layer (IANA protocol number: 211).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_212 protocol (IANA Unassigned Internet Protocol Number 212) is found over the IP layer (IANA protocol number: 212).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_213 protocol (IANA Unassigned Internet Protocol Number 213) is found over the IP layer (IANA protocol number: 213).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_214 protocol (IANA Unassigned Internet Protocol Number 214) is found over the IP layer (IANA protocol number: 214).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_215 protocol (IANA Unassigned Internet Protocol Number 215) is found over the IP layer (IANA protocol number: 215).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_216 protocol (IANA Unassigned Internet Protocol Number 216) is found over the IP layer (IANA protocol number: 216).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_217 protocol (IANA Unassigned Internet Protocol Number 217) is found over the IP layer (IANA protocol number: 217).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_218 protocol (IANA Unassigned Internet Protocol Number 218) is found over the IP layer (IANA protocol number: 218).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_219 protocol (IANA Unassigned Internet Protocol Number 219) is found over the IP layer (IANA protocol number: 219).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_220 protocol (IANA Unassigned Internet Protocol Number 220) is found over the IP layer (IANA protocol number: 220).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_221 protocol (IANA Unassigned Internet Protocol Number 221) is found over the IP layer (IANA protocol number: 221).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_222 protocol (IANA Unassigned Internet Protocol Number 222) is found over the IP layer (IANA protocol number: 222).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_223 protocol (IANA Unassigned Internet Protocol Number 223) is found over the IP layer (IANA protocol number: 223).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_224 protocol (IANA Unassigned Internet Protocol Number 224) is found over the IP layer (IANA protocol number: 224).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_225 protocol (IANA Unassigned Internet Protocol Number 225) is found over the IP layer (IANA protocol number: 225).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_226 protocol (IANA Unassigned Internet Protocol Number 226) is found over the IP layer (IANA protocol number: 226).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_227 protocol (IANA Unassigned Internet Protocol Number 227) is found over the IP layer (IANA protocol number: 227).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_228 protocol (IANA Unassigned Internet Protocol Number 228) is found over the IP layer (IANA protocol number: 228).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_229 protocol (IANA Unassigned Internet Protocol Number 229) is found over the IP layer (IANA protocol number: 229).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_230 protocol (IANA Unassigned Internet Protocol Number 230) is found over the IP layer (IANA protocol number: 230).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_231 protocol (IANA Unassigned Internet Protocol Number 231) is found over the IP layer (IANA protocol number: 231).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_232 protocol (IANA Unassigned Internet Protocol Number 232) is found over the IP layer (IANA protocol number: 232).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_233 protocol (IANA Unassigned Internet Protocol Number 233) is found over the IP layer (IANA protocol number: 233).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_234 protocol (IANA Unassigned Internet Protocol Number 234) is found over the IP layer (IANA protocol number: 234).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_235 protocol (IANA Unassigned Internet Protocol Number 235) is found over the IP layer (IANA protocol number: 235).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_236 protocol (IANA Unassigned Internet Protocol Number 236) is found over the IP layer (IANA protocol number: 236).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_237 protocol (IANA Unassigned Internet Protocol Number 237) is found over the IP layer (IANA protocol number: 237).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_238 protocol (IANA Unassigned Internet Protocol Number 238) is found over the IP layer (IANA protocol number: 238).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_239 protocol (IANA Unassigned Internet Protocol Number 239) is found over the IP layer (IANA protocol number: 239).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_240 protocol (IANA Unassigned Internet Protocol Number 240) is found over the IP layer (IANA protocol number: 240).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_241 protocol (IANA Unassigned Internet Protocol Number 241) is found over the IP layer (IANA protocol number: 241).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_242 protocol (IANA Unassigned Internet Protocol Number 242) is found over the IP layer (IANA protocol number: 242).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_243 protocol (IANA Unassigned Internet Protocol Number 243) is found over the IP layer (IANA protocol number: 243).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_244 protocol (IANA Unassigned Internet Protocol Number 244) is found over the IP layer (IANA protocol number: 244).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_245 protocol (IANA Unassigned Internet Protocol Number 245) is found over the IP layer (IANA protocol number: 245).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_246 protocol (IANA Unassigned Internet Protocol Number 246) is found over the IP layer (IANA protocol number: 246).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_247 protocol (IANA Unassigned Internet Protocol Number 247) is found over the IP layer (IANA protocol number: 247).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_248 protocol (IANA Unassigned Internet Protocol Number 248) is found over the IP layer (IANA protocol number: 248).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_249 protocol (IANA Unassigned Internet Protocol Number 249) is found over the IP layer (IANA protocol number: 249).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_250 protocol (IANA Unassigned Internet Protocol Number 250) is found over the IP layer (IANA protocol number: 250).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_251 protocol (IANA Unassigned Internet Protocol Number 251) is found over the IP layer (IANA protocol number: 251).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The UNASSIGNED_IP_PROT_252 protocol (IANA Unassigned Internet Protocol Number 252) is found over the IP layer (IANA protocol number: 252).
Family: | Network Service |
Over: | ip |
Revision: | 2 |
Risk level: | 1 |
Tag: | Not Used |
The Unidata Local Data Manager (LDM) is a collection of cooperating programs that select, capture, manage, and distribute arbitrary data products. The system is designed for event-driven data distribution, and is currently used in the Unidata Internet Data Distribution(IDD) project. The LDM system includes network client and server programs and their shared protocols.
UPnP, Universal Plug and Play, is a communication protocol designed to facilitate the exchange of information between different devices within a computer network.
iTunes communicates with the iPhone using something called usbmux, this is a system for multiplexing several connections.
The uti protocol (UTI) is found over the IP layer (IANA protocol number: 120).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
utime is a Linux system call that changes the access and modification times of the inode specified by filename to the actime and modtime fields of times respectively.
Unix-to-Unix Copy (UUCP) is a suite of computer programs and protocols allowing remote execution of commands and transfer of files, email and netnews between computers. Specifically, a command named uucp is one of the programs in the suite; it provides a user interface for requesting file copy operations.
Path Service is part of UUCP (Unix To Unix Copy Protocol) suite. It fills the need of people to determine mailbox addresses for hosts that are not part of the ARPA-Internet but can be reached by one or more relay hosts.
Rlogin is a part of UUCP (Unix-to-Unix Copy), a suite of computer programs and protocols allowing remote execution of commands and transfer of files, email and netnews between computers.
A universally unique identifier (UUID) is an identifier standard used in software construction, standardized by the Open Software Foundation (OSF) as part of the Distributed Computing Environment (DCE). UUIDGEN is a program that generates a unique UUID for each system.
V5UA is a transport mechanism for V5.2 messages in an IP network, through SCTP.
Family: | Network Service |
Over: | sctp |
Revision: | 7 |
Risk level: | 2 |
Tag: | Network Layer Protocols |
The wb_expak protocol (WIDEBAND EXPAK) is found over the IP layer (IANA protocol number: 79).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The wb_mon protocol (WIDEBAND Monitoring) is found over the IP layer (IANA protocol number: 78).
Family: | Network Service |
Over: | ip |
Revision: | 18 |
Risk level: | 1 |
Tag: | Not Used |
The WebSocket Protocol, as described in IETF RFC6455. Important: this protocol won't be classified if some known Web application or service was detected and classified over http instead.
VEMMI is an international standard defining the user interface and client/server protocol for on-line multimedia interactive services. VEMMI allows to create on-line multimedia and hypermedia services that could be accessed from any user owning a PC or Mac personal computer running a VEMMI client software, using any network (Internet, ISDN, videotex etc.) to access the multimedia server.