Looking for information on Protocol TCP 135? This page will attempt to provide you with as much port information as possible on TCP Port 135.
TCP Port 135 may use a defined protocol to communicate depending on the application. A protocol is a set of formalized rules that explains how data is communicated over a network. Think of it as the language spoken between computers to help them communicate more efficiently.
Protocol HTTP for example defines the format for communication between internet browsers and web sites. Another example is the IMAP protocol that defines the communication between IMAP email servers and clients or finally, the SSL protocol which states the format to use for encrypted communications.
TCP Port 135
Here is what we know about protocol TCP Port 135. If you have information on TCP port 135 that is not reflected on this page, simply leave a comment and we’ll update our information.
PORT 135 – Information
- Port Number: 135
- TCP / UDP: TCP
- Delivery: Yes
- Protocol / Name: loc-srv,epmap
- Port Description: DCE endpoint resolution. Common on Unix hosts for certain x-displays, remote perfmon, etc.
- Virus / Trojan: No
Tip! Use our free Digital Footprint and Firewall Test to help verify you are not infected.
Side note: TCP port 135 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered on port 135 in the same order in which they were sent. Guaranteed communication over port 135 is the key difference between TCP and UDP. UDP port 135 would not have guaranteed communication in the same way as TCP.
Because protocol TCP port 135 was flagged as a virus (colored red) does not mean that a virus is using port 135, but that a Trojan or Virus has used this port in the past to communicate.
TCP 135 – Disclaimer
We do our best to provide you with accurate information on PORT 135 and work hard to keep our database up to date. This is a free service and accuracy is not guaranteed. We do our best to correct any errors and welcome feedback!
The Best Line of Defense
Port 135 is used in a manner that is similar to Sun’s UNIX use of port 111. The SCM server running on the user’s computer opens port 135 and listens for incoming requests from clients wishing to locate the ports where DCOM services can be found on that machine. Port 111 is affiliated with port 135; furthermore, these ports along with the wreckless “NetBIOS Trio” of ports (137-139) under no circumstance should not be given access to servers and/or destop/notebook computers
It is always best to take your offence/defense to the forefront, (e.g. A better than average router that is compatable with your current OS, XP with SP2 Vista with all SP’s or Windows 7) for the blocking of any dns, IP, or ports. ( Usually your ISP will have blocked 135 for the user, while there are certain ISP’s that may choose differently) There are several users that will opt to use their Security Software. This can turn out to be the opening of a ‘Pandora’s Box’, dependant upon the user’s choice of Security Software, a hacker can breach the wall in the user’s system.(This is a whole new topic, which has taken me off point, (port 135 comment sharing) The RPC Endpoint Mapper (e.g. DCOM) uses port 135. DCOM is an Active X. I would like to suggest to those who are not familiar with DCOM, to do a little research on it. Yes, DCOM is useful.
Hacker tools such as “epdump” (Endpoint Dump) has the ability to immediately identify every DCOM-related server/service running on the user’s hosting computer and match them up with known exploits against those services. Again, a whole different topic that needs to be addressed.
In Summation: Stealth 135 along with 137-139 at the forefront, (the aforementioned above) A good NAT router/switch will help if you decide to use your Security Software. If not at the forefront, a hacker has the ability to fetch the router’s “MAC Address” OUCH! There are thousands of ports, and % wise, these can be used for trojans as well. (e.g. 135 is one of many) One last note. DCOM can be turned off; however, Symantec’s Norton Security programs depend on DCOM for its “Safe Web browsing.
Best Regards, Qwintek System Technologies LLC (& IT Security Management)