Transport Mode; Tunnel Mode. Return information for an individual endpoint with epkey. String detailing what changed, either as free-form text or serialized JSON. SonicGuard.com has the largest selection of SonicWall Products & Solutions available online, Call us Today! May be sent in the same operation with. Refer to Retrieve Users for an explanation of the object's keys. You can reach him on, Explore real-time issues getting addressed by experts. Please refer to your The users in the group will not be able to authenticate. Blank if the device has never activated Duo Mobile or if the platform does not support it. Return events where authentication was denied because the end user's location was restricted. Requires "Grant write resource" API permission. The key for users to report fraud, or empty if any key should be pressed to authenticate. If you have any queries, let us know by commenting in the below section. Reports the security agents present on the endpoint as detected by the Duo Device Health app. Return records that have a 13 character Unix timestamp in milliseconds of maxtime or earlier. Requires "Grant administrators" API permission. Firewalls automatically create the Automatic NAT. Object limits: 100 phones per user; 100 users per phone. Dashes and spaces are ignored. Learn more about a variety of infosec topics in our library of informative eBooks. We do not own, endorse or have the copyright of any brand/logo/name in any manner. This will be different for each request and must be re-generated each time. Return events where the authentication factor was the, Return events where the effective authentication factor was an. Requires "Grant settings" API permission. A given API integration may apply a network restriction to itself via API; use a different API integration to apply the network restriction, or edit the API application in the Duo Admin Panel GUI. SonicOS Enhanced firmware versions 4.0 and higher includes L2 (Layer 2) Bridge Mode, a new method of unobtrusively integrating a SonicWall security appliance into any Ethernet network. or firewall. A list of test users who see draft branding (if configured) instead of live branding when using Duo SSO or Duo Universal Prompt. Requests to this endpoint now fail with the following response: See Retrieve WebAuthn Credentials by User ID. One of: "Not Tampered", "Tampered", or "Unknown". Requires "Grant read log" API permission. The phone must be able to receive SMS messages and its platform must be one on which Duo Mobile can be activated. The SonicWall NSa 2650 is designed to address the needs of growing small organizations, branch offices and school campuses. This API no longer allows listing all U2F tokens or deletion of U2F tokens. Unit Balance: IFV + Chrono Legionaire now destroys things more slowly. NGFWs perform deeper inspections compared to stateful inspections executed by the first and second-generation firewalls. Invalid or missing parameters, the role assigned may not be restricted by an administrative unit, or the provided email address is already in use by another administrator. Returned for events with type=bypass_status. select team 1. Have questions? Returns the modified single user object. The v2 handler provides new filtering and querying capabilities unavailable in the legacy v1 handler. If result is "SUCCESS" then one of: "Allow unenrolled user", "Allowed by policy", "Bypass user", "Remembered device", "Trusted location", "Trusted network", "User approved", "Valid passcode". It does not provide encryption. It provides only Integrity and Authenticity. This controls whether or not usernames should be altered before trying to match them to a user account. Dreadnaughts can now break bridges with missiles. 3 We moved the Clan Abbreviations in the Custom Match player Lobby a bit to Viswanath is a passionate content writer of Mindmajix. Requires "Grant read resource" API permission. Create a link to the activation form for a new administrator with email address email. Use the metadata information returned to change the paging parameters for your request. Requires "Grant read resource" API permission. -enabled devices such as IP cameras, phones and printers, the TZ300P and TZ600P provide PoE/PoE+ power. The administrator's. IPMI 2.0 Cipher Zero Authentication Bypass Scanner. The last time the Duo Device Health app performed a device health check, as a Unix timestamp. Requires "Grant write resource" API permission. This method will fail if the phone's type or platform are Unknown. Example response for a Duo Beyond plan customer. Network administrators need a common set of risk intelligence and centralized orchestration that allows the security to dynamically adapt as a risk is revealed anywhere, not just in our network, but also anywhere in the world. IP Spoofing can evade the firewall for introducing malicious actions and content to our network. Specifying incorrect paging parameters results in a 400 invalid parameters response. All API methods use your API hostname, The Desolator will no longer continue to shoot the ground over and over and keep building up radiation. They are assigned byIANAfor specific service upon application by a requesting entity. Included an icon table that displays most icons and what they mean in Westwood Online. Return the single phone with phone_id. Structures no longer flash a frame of animation during placement. No administrator was found with the given. One of: en_US (English), cs_CZ (Czech), de_DE (German), es_ES (Spanish - Spain), es_419 (Spanish - Latin America), fi_FI (Finnish), fr_FR (French), hi_IN (Hindi), id_ID (Indonesian), it_IT (Italian), ja_JP (Japanese), ko_KR (Korean), nb_NO (Norwegian - Bokml), pl_PL (Polish), pt_BR (Portuguese - Brazil), sv_SE (Swedish), th_TH (Thai), tr_TR (Turkish), vi_VN (Vietnamese), or zh_hans_CN (Chinese - Simplified). For example, a space is replaced with "%20" and an at-sign ("@") becomes "%40". The type of authenticator used for offline access. Default: An integer that indicates how many passcodes to send at one time, up to 10. Transparent Mode enables the SonicWall security appliance to bridge the WAN subnet onto an internal interface. From a secured network point-of-view, it is the only node that we expose to the outside world, and thus, it is very vulnerable to attack. Transport of NMEA 0183 sentences over TCP or UDP, GE Intelligent Platforms Proficy HMI/SCADA CIMPLICITY WebView, VoiceIP-ACS UMP default device provisioning endpoint, VoiceIP-ACS UMP default device provisioning endpoint (SSL), TLS-enabled Rsyslog (default by convention), Jungle Disk (this port is opened by the Jungle Disk Monitor service on the localhost), Listen port used by the Octopus Deploy Tentacle deployment agent, metasys ( Johnson Controls Metasys java AC control environment ), RiCcI, Remote Configuration Interface (Redhat Linux), Super Dancer Online Extreme(SDO-X)CiB Net Station Malaysia Server. Provide secure access to any app from a singledashboard. Must be one of "active", "disabled", or "bypass". It is a feature of the CheckPoint firewall, which we use for making the secure connection between the CheckPoint firewall components. This is only enforced on password creation and reset; existing passwords will not be invalidated. included an advanced setting for advanced users that can be used if all else Packet Filtering Firewall: Packet Filtering Firewall identifies packets and blocks useless packets, and creates network traffic release. Returned for, The unique attribute value that identifies the endpoint's associated user in the management system. A comma-separated list of up to two custom external links shown to users in the Universal Prompt. default. The endpoint's operating system build number. A phone with a smartphone platform but no number is a tablet. even if the user has a Cloning Vat. Default: Automated calls will appear to come from this number. Only the 1000 earliest events will be returned; you may need to call this multiple times with mintime to page through the entire log. This QR code uses the same activation code as. Requires "Grant administrators" API permission. This value is provided in the metadata in the form of a 13 character date string in milliseconds and the event txid. If you know the countries from which your users expect to authenticate with phone callback we recommend adjusting this down from the default to match the most expensive expected country to help avoid misuse, using the values from the. Administrator passwords must have at least twelve characters, and may also require a mix of character types depending on your Admin Password Policy settings. 1 Fix to unlock the buttons when changing lobbies in Westwood Online. It provides only Integrity and Authenticity. Support is complete and transparent, including the following features: To return to the automatic mode, remove the port number from the "port number" edit box. This API is automatically available to paying Duo Beyond, Duo Access, and Duo MFA plan customers and new customers with an Access or Beyond trial. Returns a paged list of groups. I configure the Sonicwall ports in the wan zone as a PPPoE connection and try to connect with no luck. One or more integration_key values to assign integrations to the new administrative unit. An updated description of the administrative unit. Success. Phone number for the new administrator; E.164 format recommended (i.e. Authentication is a mechanism of deciding the identity of the user who is seeking to access the system. This is only enforced on password creation and reset; existing passwords will not be invalidated. Return events where authentication was denied because the device was invalid. and it will center the screen around that team. The SonicWall Reassembly-Free Deep Packet Inspection (RFDPI) is a singlepass, low latency inspection system that performs stream-based, bi-directional traffic analysis at high speed without proxying or buffering to effectively uncover intrusion attempts and malware downloads while identifying application We can view the CheckPoint results in the Test Result window. Verify the identities of all users withMFA. One of: "Owner", "Administrator", "Application Manager", "User Manager", "Help Desk", "Billing", "Phishing Manager", or "Read-only". Username aliases for the user. If the packet does not match, it indicates that the Packet is a UDP packet or TCP-SYN packet. Requires "Grant administrators" API permission. A comma-separated list of IP addresses, IP ranges, or CIDRs specifying the networks allowed to access this API integration. you are running Red Alert 2TM in a Windows 98 machine that has 2 or more 833-335-0426. Requires "Grant write resource" API permission. "Space Bar" now also goes to "Ally under Attack" EVA event. one of: "authentication" or "enrollment". One of: Both "DOMAIN\username" and "
[email protected]" will be normalized to "username" when logging in. Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. SonicGuard.com has the largest selection of SonicWall Products & Solutions available online, Call us Today! 4. NAT (Network Address Translation) and Firewall support (Notice: See Default: The number of passcodes to send at one time, up to 10. The response may not include all location parameters. Return events where authentication was denied because of an invalid management certificate collection state. Stateful inception has replaced static packet filtering. The security measures of SIC assure the safety of: We create the ICA(Internal Certificate Authority) during the Security Management Server Installation process. 2 or more predefined starting spots. -. Following are the main components of the CheckPoint Solution: Attackers use IP Spoofing to make the IP address of a packet seem to be from an authentication source. If no leading plus sign is provided then it is assumed to be a United States number and an implicit "+1" country code is prepended. Shown in Duo SSO and Duo Universal Prompt. Particularly useful for Korean television shows and tournaments. CSV string of codes to use. Requires "Grant read resource" API permission. Requires "Grant read information" API permission. If not set, Help Desk admins may change bypass code expiration from the default 60 minutes after creation if, Permits Help Desk administrators to send or resend enrollment emails to users. Return events where authentication was denied because the approval device did not have disk encryption enabled. Retrieve information about a group. The below resolution is for customers using SonicOS 6.2 and earlier firmware. Invalid or missing parameters or PNG data. A base64 encoded background image in PNG format. Disclaimer: All the course names, logos, and certification titles we use are their respective owners' property. A comma-separated list of up to two custom external links shown to users in the Universal Prompt. Commonly used for Internet radio streams such as, FreemakeVideoCapture service (part of Freemake Video Downloader), Nortel Contivity Router Firewall User Authentication (FWUA) default port number, Cisco Systems Unified Call Manager Intercluster, Default port for most Endless Online-based servers, HELM Web Host Automation Windows Control Panel. The group's authentication status. These come from the request parameters (the URL query string for GET and DELETE requests or the request body for POST requests). Find many great new & used options and get the best deals for Nike Kyrie 4 Low Kay Yow at the best online prices at eBay! To configure the Modem in Bridge mode just select the Wan Service type to " Bridging " and keep rest all settings default, then go to the final steps through clicking the "Next" button. No value if authentication was successful or authentication denial was not due to out-of-date software. Review the API Details to see how to construct your first API request. Access Mode MPoA/Static IP. If username is provided, the list will either contain a single user (if a match was found) or no users. Return events where authentication was denied because the end user explicitly marked "fraudulent". Refer to Retrieve Phones for an explanation of the object's keys. Use the. It requires valid IP addresses for all computers connected to the interface in Transparent Mode on your network, but allows remote access to authenticated users. An integration's integration_key or the key value for an application returned in the authentication log output. Now players can destroy a unit flying over an Iron Curtained building. Access Mode MPoA/Static IP. Specify a type and serial number to look up a single hardware token. 6. Connections from the Internal networks to the external network. One of: "Owner", "Administrator", "Application Manager", "User Manager", "Help Desk", "Billing", "Phishing Manager", or "Read-only". games when the host gets disconnected from his ISP but is able to connection you can now play against each other or against other 10. The first locale and message text in the list matches the default language specified in global Settings and is also shown in the traditional web prompt and in the Duo Device Health app. It may take a bit for the server to return the player's rank. 26. One or more group_id values to assign groups to the new administrative unit. Developers can write applications that programmatically read their Duo account's authentication logs, The full name of the administrator. Set to false to prevent User Managers from applying "Bypass" status. If there are no errors, a PNG image is returned instead of JSON and the Content-Type header is image/png. We also use NAT for connecting the internet with the Private IP Address. Users deleted via the API are immediately and permanently removed from Duo. A CSS hex color shown as the hash symbol (#) followed by three or six hexadecimal digits, which represents the color appearing behind the user interface and any transparent background image. The U2F token's registration identifier. Clear the number of failed login attempts for the administrator with admin_id. If username is not provided, the list will contain all users. Create a new administrator. Want access security that's both effective and easy to use? Defaults to false if not specified. The aim of next-generation firewalls is to include more layers of the OSI model, improving the filtering of network traffic that is dependent on the packet contents. Return events where authentication was denied because the passcode was invalid. Change the name, enrollment policy, greeting, and/or notes of the integration with integration key integration_key, or reset its secret key. They also have professionals who expect to be able to access work applications and data from anywhere, at any time, and on the same device, they use to manage their professional lives. Returns the custom logo displayed in the Duo authentication prompt and Duo Mobile. From the main menu, The real name (or full name) of this user. The Admin API application can read information about resource objects such as end users and devices. One of, Legacy parameter; no effect if specified. Note that attempting to set to true for admins with the "Owner" role results in a failure response. Returns a paged list of all administrative units if no parameters specified. This text is displayed in the Comment column of the Interface table. They control the TCP handshaking between the packets for determining whether the requested session is legal or not. Shows whether the endpoint is a Duo managed endpoint. One of: "Configured", "Disabled", or "Unknown". Fortinet vs Sonicwall - Whats the Difference? 1. Refer to, The integration was modified successfully. Designing functional elements of the system will work with the least volume of system privilege. Requires "Grant applications" API permission. You can unsubscribe at any time from the Preference Center. See. Same as Retrieve Administrator Authentication Factors. The attempt will be accepted when there is a matching WAN optimization passive rule. In Server Mode, FortiMail, operate as a full-featured email server rather than just a mail relay agent. After the completion of packet translation through the exit interface, it will carry out the route lookup. Click Next to continue.Each connection has an Actiontec C1000a dsl modem that is configured as a transparent bridge. Restez inform de lactualit de lANRT et du secteur des tlcommunications, en vous inscrivant notre newsletter. An integer indicating the minimum number of characters that an administrator's Duo Admin Panel password must contain. Returns metadata information for all bypass codes. The username alias used to log in. Assign the integration with integration_key to the administrative unit with admin_unit_id. 4. The type of phone. In addition, some response information is available only with Duo Beyond. The recommended maximum length for installation_msg is 80 characters. To fetch all results, call repeatedly with the offset parameter as long as the result metadata has a next_offset value. IPSec provides Integrity, Confidentiality, Authenticity, and Anti Replay Protection. The model version for the risk-based authentication trust assessment. Standards-based SSL for secure channel creation. Download & Edit, Get Noticed by Top Employers! default. Requires "Grant write resource" API permission. The administrator object is also returned (see. We use NAT for mapping Private IP addresses with Public IP addresses and Public IP addresses with Private IP addresses. For instance, Duo may make available a beta feature involving extra information returned by an API endpoint. Delete the integration with integration_key from the system. The time in minutes to expire and invalidate SMS passcodes, up to 16,777,215. This logo customization is superseded by Custom Branding for Duo Beyond, Access, and MFA plan customers. The lists do not show all contributions to every state ballot measure, or each independent expenditure committee formed to support or Let us know how we can make it better. Roles other than "Owner" are effective only if the customer edition includes the Administrative Roles feature. Changes synchronized from Directory Sync will have a username of the form (example) "AD Sync: name of directory.". Must begin with http or https. 23579111317181920FTP()21FTP()22SSH23telnet(),Tiny Telnet Server2425SMTP27NSW FE29MSG ICP31MSG,Master ParadiseHackersParadise3335373839414243who is44MPM()4546()47NI FTP4849TACACS5051IMP()5253dns5455ISI565758596061NI6263whois++6465TACACS66Oracle SQL*NET676869707172737475767778TCP7980http,,Executor81HOST28283ML8485ML86Micro Focus Cobol8788Kerberros89SU/MIT telnet()90DNSIX 91MIT Dover929394Tivoli96DIXIE9798TAC99ncx99100101NIC 102103Genesis 1051063COM-TSMUX107Telnet108SNA 109POP2,110POP3,111SUNRPC112McIDAS 113TCP114115116ANSA REX 117UUCP 118SQL 119NEWSUSENET121BO jammerkillahV122SMAKY123128GSS X129130Cisco131Cisco132Cisco133134INGRES-135DCOM136137NETBIOS138NETBIOS139NETBIOS140EMFIS141EMFIS143Interim144UMA145UAAC149AED 512150SQL()-152156SQL()158PC159NSS-160SGMP-161162SNMP163CMIP/TCP 164CMIP/TCP 166Sirius169170177xX-windows178NextStep Window 179180181184OC185-KIS186KIS 187189190191Prospero 192OSU 193Spider 194197198200IBM201AppleTalk(Mac)202AppleTalk(Mac)Name Binding203AppleTalk(Mac)204AppleTalk(Mac)205AppleTalk(Mac)206AppleTalk(Mac)207AppleTalk(Mac)208AppleTalk(Mac)209210ANSI()Z39.50211Texas Instruments 914C/G213IPX()218Netix219Unisys ARPs220 v3223224masq241 (224-241)245246257258Yak Winsock 259260261IIOP TLS/SSL266SCSI()on ST267Tobit David268Tobit David281282CableA/X286FXP308Novastor313Magenta318PKIX333Texar344Prospero345Perf346Zebra347Fatmen348Cabletron358Shrink359362SRS363RSVP372373Legend374Legend376AmigaEnvoy377NEC378NEC379TIA/EIA/IS-99380TIA/EIA/IS-99381hp()382hp()383hp()384385IBM386ASA.387Appletalk.389395396Novell(Novell)Netware(Novell)over IP400401402Genie406408Prospero409Prospero.410DEC()411MT412413414415B423IBM424IBM425427434ip435ip443TLS/SSLHTTP444445Microsoft-DS446DDM-447DDM-448DDM-456HACKERS PARADISE458apple quick time459ampr-rcmd464k469470scx-472ljk-481Ph487489nest-491go-499ISO ILL500InternetLsass509510FirstClass512513514cmd515spooler516518519unix520525526529530531532533534MegaMedia537542543Kerberos()v4/v5544krcmd546DHCPv6 547DHCPv6 552554Real Time Stream555PhAse1.0Stealth SpyIniKiller556563TLS/SSL564plan 9565whoami566streettalk567banyan-rpc()568DPA569MSN570demon()571udemon()572573banyan-574FTP581Bundle Discovery 582SCC583Philips584585IMAP4+SSL (Use 993 instead)586587589Eye595CAB597PTC598SCO3599Aeolon Core600Sun IPC()601604606Cray608-/ 609npmp-610npmp-611npmp-gui( )612HMMP613HMMP614SSL()shell()615Internet616SCO(Unix)617SCO619Compaq()EVM620SCO623ASF624Crypto631IPP (Internet)633(Sterling)637641repcmd647DHCP()Failover648(RRP)649Cadview-3d666Attack FTPSatanz Backdoor808ccproxy http/gopher/ftp (over http)1001SilencerWebEx1011Doly1024,yai1025inetinfo.exe()netspy1026inetinfo.exe()102710301031BBN IAD1033103410361070Psyber StreamStreaming Audio107110741080SocksIPINTERNET11101125120312041206Anthony1222SNI R&D12331234SubSeven2.0Ultors Trojan1243SubSeven1.0/1.91245VodooGabanBusNetBusVodoo1273EMC-1289JWalk1290WinJa1333()(svchost.exe)1334(svchost.exe)13351336(svchost.exe)13491350137113721374EPI1376IBM-1377Cichlid1378Elan1380Telesis13811386CheckSum 1387(rundll32.exe)13881389139013911392139313941395PC1396DVL139713981399Cadkey1433MicrosoftSQL1434MicrosoftSQL1492FTP99CMP1509Psyber Streaming Server1512Microsoft Windows1524SHELL1600Shivka-Burka1645170121731NetMeeting1801Microsoft1807SpySender1900ddos19121981ShockRave1999BackDoor,yai2000GirlFriend 1.3Millenium 1.02001Millenium 1.0Trojan Cow,20012003GNU 2023Pass Ripper2049NFS2115Bugs2140Deep Throat 1.0/3.0The Invasor2500RPC25042565Striker2583Wincrash 2.02801Phineas Phucker28473024WinCrash3128squid http3129Master Paradise3150The Invasor,deep throat3210SchoolBus3306MySQL3333Prosiak3389WINDOWS 20003456inetinfo.exe()VAT3457VAT3527Microsoft3700Portal of Doom3996RemoteAnything4000QQ4060RemoteAnything4092WinCrash4133NUTS Bootp4134NIFTY-Serve HMI4141Workflow414241434145VVR4321Who Is4333sql434943504351PLCY4453NSS4454NSS4455PR4456PR4457PR4480Proxy+ HTTP4500Lsass4547Lanner4555RSIP4590ICQTrojan467247524800Icona4801Icona4802Icona4848App-Admin HTTP4849App-Admin HTTPS4950IcqTrojan50005000blazer5Sockets de Troie50005001Sockets de Troie50015006wsm5007wsmssl5022mice50505051ITA5052ITA5137MyCTS5150Ascend5154BZFlag5190America-Online()5191AmericaOnline1()5192AmericaOnline2()5193AmericaOnline3()5222Jabber5225HP()5226HP()5232SGI5250i52643Com152653Com25269Jabber5306Sun MC5321Sockets de Troie53215400Blade Runner5401Blade Runner5402Blade Runner54055409Salient5410Salient5415NS5416SNS5417SNS5421254235427SCO-PEER-TTA(Unix)5432PostgreSQL5550xtcp5569Robo-Hack5599560056015631pcANYWHERE()5632pcANYWHERE()5673JACL5675V5UA5676RA567856795720MS-5729Openmail5730Steltor's5731netscape()suiteware5732netscape()suiteware5742WinCrash1.035745fcopy-5746fcopys-5755OpenMail()5757OpenMail()X.5005766OpenMail ()NewMail5767OpenMail ()()5768OpenMail() CMTS5777DALI580058015802HTTP, d5803HTTP, d590005901159022590336000X Window 6001X Window 6002X Window 6003X Window 6004X Window 6005X Window 6006X Window 6007X Window 6008X Window 6009X Window 6456SKIP6471LVision6505BoKS6506BoKS6507BoKS Dir,6508BoKS Dir,6509MGCS-MFP6510MCER6566SANE6580Parsec6581Parsec6582Parsec6588AnalogX HTTP6631Mitchell6667Internet6668Internet6670Deep Throat6671Deep Throat 3.06699Napster(MP3)6701KTI/ICAD6788SMC-HTTP6789SMC-HTTPS6841Netmo6842Netmo HTTP6883DeltaSource6939Indoctrination6969GatecrasherPriority6970real7000Remote Grab7002& 70037004AFS/Kerberos700570067007Basic7008-70097011Talon7012Talon7013Microtalon7014Microtalon7015Talon7020DP7021DP7100X71217300NetMonitor7301NetMonitor7306NetMonitorNetSpy1.07307NetMonitor7308NetMonitor7323Sygate75117588Sun7597Quaz76267633PMDF7674iMQ SSL7675iMQ7676Giscier7720Med7743Sakura7789ICKiller7797Propel7798Propel8000QQ8001VCOM8007Apache(iis)jServ1.x8008HTTP Alternate8009Apache(iis)JServ1.38010Wingate8011way2.48022OA-8080WWW8081ICECap8082BlackIce()8118Privoxy HTTP8121Apollo8122Apollo8181Imail8225831183518416eSpeech Session8417eSpeech RTP847386688786Message8787Message8954Cumulus9000CS9001ETL9002id9021Pangolin9022PrivateArk9023-19024-29025-39026-49101Bacula9102Bacula9103Bacula9111DragonIDS9217FSC92811928229346C9400Incommand 1.09401Incommand 1.09402Incommand 1.095949595Ping Discovery9800WebDav9801Sakura-29802WebDAV Source TLS/SSL9872Portal of Doom9873Portal of Doom9874Portal of Doom9875Portal of Doom9899InIkiller99099911SYPECom9989iNi-Killer9990OSM Applet9991OSM1000010001SCP1000510008Octopus10067iNi-Killer10113NetIQ10115NetIQ10116NetIQVoIP10167iNi-Killer11000SennaSpy1111311233Progenic trojan12076Telecommando12223Hack'99 KeyLogger12345NetBus1.60/1.70GabanBus12346NetBus1.60/1.70GabanBus12361Whack-a-mole13223PowWow Tribal Voice13224PowWow Tribal Voice16959Subseven16969Priority170271919120000Millennium20001Millennium20034NetBus Pro21554GirlFriend22222Prosiak2344423456Evil FTPUgly FTP25793Vocaltec26262K3-26263K326274Delta27374Subseven 2.130100NetSphere30129Masters Paradise30303Socket2330999Kuang31337BO(Back Orifice)31338BO(Back Orifice)DeepBO31339NetSpy DK31666BOWhack31789Hack-a-tack32770sun solaris RPC33333Prosiak3343434324Tiny Telnet ServerBigGluckTN36865KastenX38201Galaxy739681TurboNote40412The Spy40421Masters Paradise40422Masters Paradise40423Masters Paradise40426Masters Paradise40843CSCC 43210SchoolBus 1.0/2.043190IP-PROVISION44321PCP(pmcd)44322PCP(pmcd)4433444442ColdFusion44443ColdFusion44445Happypig45576E47262Delta47624Direct Play47806ALC48003Nimbus50505Sockets de Troie50766Fore53001Remote Windows Shutdown54320bo200054321SchoolBus 1.0/2.061466Telecommando65000Devil 1.0365301PC Anywhere.