List of Quality of Experience applications

This Orion Platform topic applies only to the following products:

ACMNAMNOMNPM

This page lists SolarWinds' Quality of Experience pre-configured applications. QoE uses Procera Networks NAVL library to identify pre-built application protocols (see www.proceranetworks.com/solutions/pro-id - now http://sandvine.com ) (© 2016 Procera Networks, available at /www.proceranetworks.com, now http://sandvine.com obtained on January 10, 2017.)

This information applies to SolarWinds products with Orion Platform 2016.2 and later, such as NPM 12.0 and later.

1 GUID Name Description Category Risk Level Productivity Rating
2 050PLUS 050Plus Logging in or making calls with the 050Plus application. Messaging Minimal Risk Mostly Social
3 12306CN 12306.cn 12306.cn is the only China Railway customer service center Web Services No Risk Mostly Business
4 126COM 126.com 126.com is a free webmail service of Netease Mail Minimal Risk Mostly Business
5 17173 17173.com General browsing, interaction, and game play on the social gaming network 17173.com Social Networking Minimal Risk Mostly Social
6 2345COM 2345.com General browsing of navigation portal 2345.com Web Services No Risk Both Business and Social
7 247INC [24]7 Inc Data and advertisements hosted by [24]7 Inc. Web Services No Risk Both Business and Social
8 247MEDIA 24/7 Media Ads hosted by 24/7 Media technology and the Real Media group. Web Services No Risk Both Business and Social
9 33ACROSS 33Across Traffic generated by 33Across to collect anonymous information about users visiting specific websites. Web Services No Risk All Social
10 39NET 39.net 39.net is China's leading health web portal Web Services No Risk Mostly Business
11 3COMTSMX 3COM-TSMUX 3COM-TSMUX Queuing Protocol Networking No Risk Mostly Business
12 4399COM 4399.com General browsing and game play on Chinese casual gaming website 4399.com Games No Risk All Social
13 4SHARED 4Shared A file sharing service that provides search functions, allows users to upload and download files to their accounts and share links with other people. File Transfer Data Leaks/ Malware All Social
14 51COM 51.com General browsing, game play, posting and viewing dating profiles and videos, and point redemption on Chinese web portal 51.com Web Services Minimal Risk All Social
15 56COM 56.com General browsing and streaming media from Chinese video sharing website 56.com Web Services Evades Detection/ Bypasses All Social
16 58COM 58.com.cn Classified ad and media traffic generated by browsing 58.com.cn. Web Services No Risk All Social
17 914CG 914CG Texas Instruments 914C/G Terminal Networking No Risk Both Business and Social
18 ABOUT about.com English source for original information and advice Web Services No Risk Both Business and Social
19 ACAS ACA Services DEC's Application Control Architecture Services Networking No Risk All Business
20 ACI ACI Application Communication Interface Networking No Risk Both Business and Social
21 ACRNEMA ACR-NEMA A standard for handling, storing, printing, and transmitting information in medical imaging. File Transfer Minimal Risk Mostly Business
22 ACTIVDIR Active Directory Microsoft Active Directory Networking No Risk All Business
23 ACTVSYNC ActiveSync ActiveSync Notifications, IANA port 1034/tcp and 1034/udp Networking No Risk Both Business and Social
24 AD_BKUP AD Backup Microsoft Active Directory Backup Service. Networking No Risk All Business
25 AD_DRS AD DRS Microsoft Active Directory Replication Services. Networking No Risk All Business
26 AD_DSAOP AD DSAOP Active Directory DSAOP services Networking Minimal Risk All Business
27 AD_DSROL AD DSROL Microsoft Active Directory Domain Services helps administrators securely manage users, computers, and other devices on the network and facilitates resource sharing and collaboration between users. Networking No Risk All Business
28 AD_FRS AD File Replication Service Microsoft Active Directory File Replication Services used to replicate files and changes between domain controllers Networking Minimal Risk All Business
29 AD_NSP AD NSP Microsoft Active Directory Name Service Provider Networking No Risk All Business
30 AD_RSTOR AD Restore Microsoft Active Directory Restore Service. Networking No Risk All Business
31 AD_XDS AD XDS Microsoft Active Directory Extended Directory Service allows AD to be extended to store custom data that is of interest for the enterprise. Networking No Risk All Business
32 ADCONION Adconion User online behaviour data gathered by Adconion Media Group, digital distribution platform operators. Web Services No Risk All Social
33 ADDTHIS AddThis User analytics and content sharing through addthis.com Web Services No Risk Both Business and Social
34 ADFLY Adf.ly General site browsing and usage of URL shortening service from Adf.ly Web Services Minimal Risk Both Business and Social
35 ADFONIC adfonic Mobile web and app inventory from advertising buying platform adfonic. Web Services No Risk Both Business and Social
36 ADGEAR adgear Visiting websites that host their ads using adgear Web Services No Risk Both Business and Social
37 ADIFYCOP Adify Visiting websites that use Adify to generate ad traffic. Web Services No Risk Both Business and Social
38 ADJUGLER AdJuggler Visiting websites that use AdJuggler to generate ads. Web Services No Risk Both Business and Social
39 ADMARVEL AdMarvel Visiting websites that use AdMarvel to generate ads. Web Services No Risk Both Business and Social
40 ADMASTER AdMaster Visiting web pages that use Admaster to generate ads. Web Services No Risk Mostly Business
41 ADMELD Admeld Accessing web pages that use the Admeld service to generate ads Web Services No Risk Mostly Social
42 ADMETA Admeta Traffic generated by web pages using Admeta to generate ads. Web Services No Risk Mostly Business
43 ADMIN5 Admin5 General browsing of Chinese webmaster information site Admin5. Web Services No Risk Mostly Business
44 ADMOB AdMob Traffic generated by web pages using AdMob to generate ads. Web Services Minimal Risk Mostly Business
45 ADNSTRM adnStream General site browsing and streaming media from Spanish video streaming site adnStream Streaming Media Possible Misuse All Social
46 ADOBANAL Adobe Analytics Traffic going to Adobe Analytics websites such as scene7.com, demdex.net, omtrdc.net, and 2o7.net. Web Services No Risk All Business
47 ADOBE Adobe Adobe, Adobe Connect and Adobe Updates Web Services No Risk Both Business and Social
48 ADOMETRY Adometry traffic generated by web sites using Adometry to generate ads Web Services No Risk Mostly Business
49 ADOTUBE Ado Tube In-stream video traffic from advertising company Ado tube Web Services No Risk Mostly Business
50 ADREADY Adready Traffic generated by web sites using Adready to generate ads. Web Services No Risk Mostly Business
51 ADRIVE Adrive.com An online cloud storage service Web Services Possible Misuse Both Business and Social
52 ADROLL AdRoll Embedded ad traffic from advertisement retargeting company Adroll Web Services No Risk Both Business and Social
53 ADSAGE Adsage Traffic generated by web sites using Adsage to generate ads. Web Services No Risk Mostly Business
54 ADSAME AdSame Internet advertising content through Chinese digital marketing company AdSame Web Services No Risk Mostly Business
55 ADTECH ADTECH Traffic generated from web sites using ADTECH to generate ads Web Services No Risk Mostly Business
56 ADTEGRTY Adtegrity Traffic generated by web sites using Adtegrity to generate ads Web Services No Risk Mostly Business
57 ADVERTIS Advertising Visiting websites that host their ads using advertise.com Web Services No Risk Mostly Social
58 ADXPOSE AdXpose Traffic generated by web sites using AdXpose to generate ads Web Services No Risk Mostly Business
59 ADXTRACK AD-X Tracking Application tracking and attributes data from analytics provider AD-X Tracking Web Services No Risk Mostly Business
60 AED512 AED512 AED 512 Emulation Service Networking No Risk Both Business and Social
61 AFP AFP A network protocol that offers file services for Mac OS X and original Mac OS. In Mac OS X, AFP is one of several file services supported including Server Message Block (SMB), Network File System (NFS), File Transfer Protocol (FTP), and WebDAV. AFP currently supports Unicode file names, POSIX and access control list permissions, resource forks, named extended attributes, and advanced file locking File Transfer No Risk Both Business and Social
62 AFREECA afreecaTV General browsing and streaming media from the television streaming service afreecaTV Streaming Media Data Leaks/ Malware All Social
63 AGGRKNOW Aggregate Knowledge Traffic generated by web sites using Aggregate Knowledge to generate ads Web Services No Risk Mostly Business
64 AH AH AH (Authentication Header) is a member of the IPsec protocol suite, guaranteeing connectionless integrity and data origin authentication of IP packets. VPN and Tunneling No Risk Both Business and Social
65 AIZHAN Aizhan.com Aizhan.com is a Chinese website that assists webmasters Web Services No Risk Both Business and Social
66 AKAMAI Akamai Generated by accessing web pages that host their media with Akamai. Web Services No Risk Mostly Social
67 AKAMAINS Akamai NetSession Traffic generated by Akamai NetSession interaface app that handles downloads of files from services that use it. File Transfer Minimal Risk Mostly Social
68 ALIAS Alias Port 1187/tcp and 1187/udp Networking No Risk Both Business and Social
69 ALIBABA Alibaba Browsing, using the search options and viewing prices on the website Alibaba.com Web Services No Risk All Business
70 ALIWW Aliwangwang Traffic generated from the Aliwangwang instant messaging application. Messaging Minimal Risk Both Business and Social
71 ALIYUN Aliyun.com General browsing and interaction on the Chinese site aliyun.com Web Services No Risk Both Business and Social
72 ALLEGRO Allegro.pl Traffic generated by browsing and shopping on allegro.pl. Web Services No Risk Mostly Social
73 AMAZON Amazon Amazon online retail service Web Services No Risk Mostly Social
74 AMAZONWS Amazon Web Services Accessing media that is hosted in the Amazon Cloud Web Services Minimal Risk All Business
75 AMEBA ameba General browsing and game play on ameba sites. Web Services No Risk All Social
76 AMOBEE Amobee Advertisement traffic to and from amobee.com Web Services No Risk All Social
77 ANDROID Android Visiting and browsing the Android website. Web Services No Risk Both Business and Social
78 ANET ANET ATEXSSTR Networking No Risk Both Business and Social
79 ANSANTFY ANSA Notify ANSA REX Notify Networking No Risk Both Business and Social
80 ANSATRDR ANSA REX Trader ANSA REX Trader Networking No Risk Both Business and Social
81 ANSWERS Answers.com Internet-based knowledge exchange Web Services No Risk Both Business and Social
82 AOL_IM AIM AIM is an instant messaging and presence application that enables users to conduct person-to-person instant messaging, chatroom messaging, peer-to-peer file sharing and facebook support, among other features. Messaging Evades Detection/ Bypasses Both Business and Social
83 AOLADS AOL Ads Advertising traffic to and from advertising.aol.com Web Services No Risk Both Business and Social
84 APNS APNS A service that Apple uses to open a constantly open IP connection to forward notifications from its servers to Apple devices Messaging Minimal Risk Both Business and Social
85 APPLE Apple Apple website and host/network services traffic Networking Minimal Risk Both Business and Social
86 APPLEMAP Apple Maps Browsing and searching locations and getting directions on Apple's online mapping service Apple Maps Web Services No Risk Both Business and Social
87 APPLEUPD Apple Update A software tool by Apple Computer that installs the latest version of Apple software. File Transfer Minimal Risk Both Business and Social
88 APPLGUI Applejuice GUI Represents the traffic between a host running an Applejuice GUI and a host running the Applejuice Core File Transfer Possible Misuse All Social
89 APPLJUCE Applejuice Applejuice is a semi-centralized peer-to-peer file sharing network similar to the original eDonkey network. File Transfer Evades Detection/ Bypasses All Social

90

APPLSHAR

AppleShare

AppleShare IP WebAdmin

Networking

No Risk

Both Business and Social

91

APPNEXUS

AppNexus

Visiting websites that host advertisements using AppNexus.

Web Services

No Risk

All Social

92

APTEAN

Aptean

Traffic related to Aptean suite of enterprise software

Web Services

No Risk

Both Business and Social

93

ARCHIVE

The Internet Archive

General browsing, audio and video streaming, blogging, text and software downloads from the Internet Archive website

Web Services

No Risk

Both Business and Social

94

ARCISDMS

ARCISDMS

Protocol for service type Arcisdms registered with IANA on Port 262 tcp/udp

Networking

No Risk

Both Business and Social

95

ARES

Ares

General browsing, interactions, and file transfers on the open source peer-to-peer file sharing application Ares Galaxy.

File Transfer

Minimal Risk

All Social

96

ARIEL

Ariel

Ariel for Windows from Infotrieve. With commercially available hardware and Ariel software, you can scan articles, photos, and other documents directly; transmit the electronic images to other Ariel workstations anywhere in the world, using either FTP or e-mail; and convert them to PDF for easy patron delivery.

Networking

Possible Misuse

Both Business and Social

97

ARNS

ARNS

Port 384/tcp and 384/udp

Networking

No Risk

Both Business and Social

98

ASA

ASA

Port 386/tcp and 386/udp

Networking

No Risk

Both Business and Social

99

ASK

Ask.com

General browsing and interaction on question answering search engine Ask.com

Web Services

No Risk

Mostly Social

100

ASTRAWEB

Astraweb

A Usenet/newsgroup service provider.

File Transfer

Data Leaks/ Malware

All Social

101

ATLASSOL

Atlas Solutions

Accessing web content that uses Atlas Solutions for hosting ads and other media.

Web Services

Minimal Risk

All Social

102

ATOM

Atom

Atom is a web content syndication system similar to RSS.

Web Services

No Risk

Both Business and Social

103

AUDIT

AUDIT

Unisys Audit SITP

Networking

No Risk

Both Business and Social

104

AUDITD

auditd

Linux audit logging

File Transfer

Possible Misuse

Mostly Business

105

AUDSCIEN

AudienceScience

Visiting websites that use AudienceScience to host advertisements.

Web Services

No Risk

All Social

106

AURORA

Aurora

A link layer communications protocol for use on point-to-point serial links. Developed by Xilinx, it is intended for use in high- speed (tens of gigabits/second or more) connections internally in a computer.

Networking

No Risk

Both Business and Social

107

AUTOHOME

Autohome.com.cn

Traffic generated by reading articles on autohome.com.cn

Web Services

No Risk

Mostly Social

108

AVCTPRXY

Avocent

Avocent Proxy Protocol

Proxy

No Risk

Both Business and Social

109

AVG

AVG

AVG Antivirus/Security software download and updates.

File Transfer

No Risk

Mostly Business

110

AVIRA

Avira

Avira Antivirus/Security software download and updates.

File Transfer

No Risk

Mostly Business

111

AVOIDR

Avoidr

Use of foursquare location-based technology with mobile app Avoidr to locate and avoid people

Web Services

No Risk

All Social

112

BABYLON

Babylon

General browsing and interaction with the online translation website Babylon.com

Web Services

Minimal Risk

Both Business and Social

113

BACKBLZE

BackBlaze

An online backup tool that allows Windows and Mac OS X users to back up their data to an offsite data center.

File Transfer

Possible Misuse

Both Business and Social

114

BADOO

badoo

General browsing, interaction, messaging, and posting on social networking site badoo.com

Social Networking

No Risk

All Social

115

BAIDU

Baidu

Using Baidu's search tools, viewing videos, viewing news, and using the maps tool.

Web Services

Possible Misuse

Mostly Social

116

BAIDUHI

BaiduHi

Traffic generated by instant messaging with other users on BaiduHi.

Messaging

Possible Misuse

Mostly Social

117

BARNSNBL

Barnes and Noble

Barnes and Noble offers books, ebooks, DVDs, music, toys, and games

Web Services

No Risk

Both Business and Social

118

BATTLNET

Battle.net

A premium gaming service provided by Blizzard Entertainment.

Games

Possible Misuse

All Social

119

BAZAARVC

Bazaar Voice

Using online services which use Bazaar Voice to collect user data.

Web Services

No Risk

Both Business and Social

120

BDEFNDER

BitDefender

BitDefender Antivirus/Security software download and updates.

File Transfer

No Risk

Mostly Business

121

BEBO

Bebo

A social networking website where users can post blogs, photographs, music, videos and questionnaires to which other users may answer.

Social Networking

Data Leaks/ Malware

All Social

122

BEETPH

BEETPH

BEETPH (Bound End-to-End Tunnel) is a new mode for IPsec ESP. The new mode augments the existing ESP tunnel and transport modes. For end-to-end tunnels, the new mode provides limited tunnel mode semantics without the regular tunnel mode overhead. The mode is intended to support new uses of ESP, including mobility and multi-address multi-homing.

VPN and Tunneling

No Risk

Both Business and Social

123

BET365

Bet365

Online gambling website

Games

No Risk

All Social

124

BFTP

BFTP

BFTP (Background File Transfer Program)

File Transfer

Minimal Risk

Both Business and Social

125

BGMP

BGMP

Border Gateway Multicast Protocol

Networking

No Risk

Both Business and Social

126

BGP

BGP

BGP (Border Gateway Protocol) is the protocol backing the core routing decisions on the Internet.

Networking

No Risk

Both Business and Social

127

BH611

BH611

Protocol for service type bh611 registered with IANA on Port 354 tcp/udp

Networking

No Risk

Both Business and Social

128

BHEVENT

BHEVENT

Protocol for service type bhevent registered with IANA on Port 357 tcp/udp

Networking

No Risk

Both Business and Social

129

BHFHS

BHFHS

Protocol for service type bhfhs registered with IANA on Port 248 tcp/udp

Networking

No Risk

Both Business and Social

130

BHMDS

BHMDS

Protocol for service type bhmds registered with IANA on Port 310 tcp/udp

Networking

No Risk

Both Business and Social

131

BIGUPLOD

BigUpload

Secure uploading, transferring, and file sharing service provider.

File Transfer

Data Leaks/ Malware

Mostly Social

132

BILDDE

Bild.de

General browsing on German tabloid website Bild.de

Web Services

No Risk

Mostly Social

133

BING

Bing

Bing is Microsoft's Internet search engine.

Web Services

No Risk

Both Business and Social

134

BINGBOT

Bingbot

Microsoft web-crawler for the Bing search engine

Web Services

No Risk

Both Business and Social

135

BITTORRE

Bittorrent

A peer-to-peer file sharing protocol used for transferring large amounts of data.

File Transfer

Evades Detection/ Bypasses

All Social

136

BIZO

bizo.com

Advertising traffic to and from bizo.com

Web Services

No Risk

Both Business and Social

137

BJNP

BJNP

Canon printers use this specific BJNP" protocol for document printing and network communication."

Networking

No Risk

Mostly Business

138

BJNPDISC

BJNP Discovery

Discovering network devices with the BJNP protocol.

Networking

No Risk

Both Business and Social

139

BLAZEFS

BlazeFS

Blaze File Server is a remote file sharing system designed specifically for Macs. Once it's running, Blaze is transparent to the user and to the client application: It appears as if users are accessing files on a local hard drive.

File Transfer

Minimal Risk

Both Business and Social

140

BLCKJACK

Blackjack

Port 1025/tcp and 1025/udp

Networking

No Risk

Both Business and Social

141

BLIDM

BLIDM

Britton-Lee IDM (Integrated Database Manager)

Database

No Risk

Both Business and Social

142

BLOGGER

Blogger

A blog publishing service owned by Google, formerly known as BlogSpot.

Web Services

No Risk

Mostly Social

143

BLOKUS

Blokus

General browsing and game play of online board strategy game Blokus

Games

Minimal Risk

All Social

144

BLOOMBRG

Bloomberg

General browsing of business news and financial information site Bloomberg

Web Services

No Risk

Mostly Business

145

BLUEKAI

Bluekai

Visiting a website that hosts ads using Bluekai.

Web Services

No Risk

All Social

146

BLUELITH

BlueLithium

Online advertising traffic from Bluelithium

Web Services

No Risk

Both Business and Social

147

BNET

Bnet

Port 415/tcp and 415/udp

Networking

No Risk

Both Business and Social

148

BOBIEDGE

Business Objects BI Edge

Connecting to a BusinessObjects or a Crystal Enterprise server with a client such as a web browser.

Collaboration

Minimal Risk

All Business

149

BOOKING

Booking.com

General browsing and interaction on online accommodation reservation site Booking.com

Web Services

No Risk

Both Business and Social

150

BOXCARIO

Boxcar.io

General web traffic for the boxcar.io website.

Social Networking

Minimal Risk

All Social

151

BOXNET

Box.net

General browsing and file transfers on file storage site Box.net

File Transfer

Evades

Detection/ Bypasses

Both Business and Social

152

BRCDN

BRCDN

Visiting websites that use BRCDN to host media or ads.

Web Services

No Risk

All Social

153

BRGHTTLK

Brighttalk

Online webinar and video provider

Web Services

Minimal Risk

Both Business and Social

154

BRIGHTRL

Bright Roll

General brightroll.com advertisement and web traffic.

Web Services

No Risk

Both Business and Social

155

BRILIG

brilig

General advertisement traffic from brilig.com

Web Services

No Risk

Both Business and Social

156

BROSOFT

Brothersoft.com

Brothersoft.com is a free software download website.

File Transfer

Minimal Risk

Both Business and Social

157

BRSRVR

BRSRVR

Visiting websites that use BRSRVR to host ads and other media content.

Web Services

No Risk

All Social

158

BVMEDIA

BV! Media

General BV! Media advertisement traffic

Web Services

No Risk

Both Business and Social

159

C2DM

C2DM

A service that provides a mechanism that servers can use to tell mobile applications to contact the server directly to fetch updated application or user data. It handles queuing of messages and delivery to target applications.

Messaging

Minimal Risk

Both Business and Social

160

CA_CERT

CA Certificate

Certification authority (CA) issues digital certificates which certifies the ownership of a public key for message encryption

Networking

No Risk

Both Business and Social

161

CAILIC

CAIlic

Computer Associates Int'l License Server

Networking

No Risk

Both Business and Social

162

CAP

CAP

Port 1026/tcp and 1026/udp

Networking

No Risk

Both Business and Social

163

CARAYTEC

caraytech

General advertisement and web traffic from caraytech

Web Services

No Risk

Both Business and Social

164

CASALE

Casale

Advertising traffic to and from Casale Media.

Web Services

No Risk

Both Business and Social

165

CBLPRTAX

Cableport AX

Protocol for service type Cable Port A/X registered with IANA on Port 282 tcp/udp

Networking

No Risk

Both Business and Social

166

CBS

cbs.com

General browsing, interaction, and streaming media from the American television broadcasting website cbs.com

Web Services

No Risk

Both Business and Social

167

CBSINTER

cbsinteractive.com

General browsing of the information and entertainment website cbsinteractive.com

Web Services

Minimal Risk

Mostly Social

168

CDC

CDC

Certificate Distribution Center

Networking

No Risk

Both Business and Social

169

CFDPTKT

CFDPTKT

Coherent File Distribution Protocol

File Transfer

Possible Misuse

Mostly Social

170

CHANGO

Chango

General advertisement and web traffic from chango.com

Web Services

No Risk

Both Business and Social

171

CHARGEN

Chargen

A device or software that produces static or animated text (such as crawls and rolls) for keying into a video stream. Modern character generators are computer-based, and can generate graphics as well as text.

Network Monitoring

Minimal Risk

Mostly Social

172

CHINACOM

china.com

General browsing, loading images and stories on the Chinese social media site china.com

Web Services

Minimal Risk

All Social

173

CHINAREN

Chinaren.com

General browsing and interaction on the Chinese alumni social networking site Chinaren.com

Social Networking

Possible Misuse

All Social

174

CHINAUMA

chinauma

General chinauma.com advertisement and web traffic.

Web Services

No Risk

All Social

175

CHNANEWS

China News

Visiting China News and streaming videos from the website.

Web Services

No Risk

Mostly Social

176

CHRTBEAT

Chart Beat

General chartbeat.com advertisement and web traffic.

Web Services

No Risk

Both Business and Social

177

CIFS

CIFS

CIFS (Common Internet File System) is used to provide shared access to directories, files, printers, serial ports, and miscellaneous communications between nodes on a network.

File Transfer

No Risk

All Business

178

CISCOFNA

Cisco FNATIVE

Used for Cisco Proprietary Protocols on Cisco Catalyst Network Analysis Modules.

Networking

No Risk

Mostly Business

179

CISCOSYS

Cisco SYSMAINT

Cisco SYSMAINT

Networking

No Risk

Mostly Business

180

CISCOTNA

Cisco TNATIVE

Cisco TNATIVE

Networking

No Risk

Mostly Business

181

CL1

CL1

Network Innovations CL/1

Networking

No Risk

Both Business and Social

182

CLARIZEN

Clarizen

General browsing, interaction, and file posting on project management site clarizen.com.

Collaboration

No Risk

All Business

183

CLASSMTE

Classmates

Web-based social network based on high school yearbooks

Social Networking

Possible Misuse

All Social

184

CLDAP

CLDAP

The Connectionless Lightweight Directory Access Protocol (CLDAP) is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network using UDP.

Database

No Risk

Mostly Business

185

CLIKBOTH

Clickbooth

General clickbooth.com advertisement and web traffic.

Web Services

No Risk

Both Business and Social

186

CLIKTALE

ClickTale

Browsing clicktale.com and associated domains.

Web Services

Minimal Risk

Both Business and Social

187

CLOANTO

CLOANTO

The cloanto.net infrastructure provides redundant hosting, email and telecommunications services.

Networking

No Risk

Both Business and Social

188

CLOUDFLR

CloudFlare

Visiting websites that use CloudFlare to generate ads

Web Services

Minimal Risk

Both Business and Social

189

CLRCASE

Clearcase

A software tool for revision control (e.g. configuration management, SCM) of source code and other software development assets. It is developed by the Rational Software division of IBM. ClearCase forms the base of revision control for many large and medium sized businesses and can handle projects with hundreds or thousands of developers.

Networking

No Risk

Both Business and Social

190

CLUBBOX

Clubbox

site http://www.clubbox.co.kr/

File Transfer

Evades Detection/ Bypasses

Mostly Social

191

CMIP

CMIP

Common Management Information Protocol

Network Monitoring

No Risk

Mostly Business

192

CMPRSNET

CompressNET

CompressNET is a commercial WAN compression protocol.

Networking

No Risk

Mostly Business

193

CNET

CNET

Online forum for technology news, reviews, teaching videos, product pricing, free downloads, and newsletters

Web Services

Minimal Risk

Both Business and Social

194

CNETDWLD

CNET Download

Internet download directory websites launched in 1996 as a part of CNET.

Web Services

No Risk

Both Business and Social

195

CNN

CNN

General browsing and streaming media from US Cable news channel CNN web and mobile sites

Web Services

No Risk

Both Business and Social

196

CNZZ

CNZZ

Visiting websites that use CNZZ to generate ads

Web Services

No Risk

Both Business and Social

197

CODAAUTH

Coda Auth

Coda Authentication Service, part of Coda filesystem services, developed by Carnegie Mellon University. Protocol for service type codaauth2 registered with IANA on Port 370 tcp/udp

Networking

No Risk

Both Business and Social

198

COGNITIV

Cognitive Match

Visiting websites that use Cognitive Match to generate ads

Web Services

Minimal Risk

Mostly Social

199

COMM

DeNA Comm

DeNA Comm voice calls and text chats.

Messaging

Data Leaks/ Malware

All Social

200

COMMJUNC

Commission

Junction

Visiting websites that use Commission Junction to generate ads.

Web Services

No Risk

All Social

201

COMPETE

Compete

Visiting websites that use Compete to gather information about users search and site behavior.

Web Services

No Risk

All Social

202

COMPUWAR

Compuware

Visiting websites that use Compuware to generate ads

Web Services

No Risk

Both Business and Social

203

COMSCM

COMSCM

SCM Microsystems is a leading provider of solutions for secure access, secure identity and secure exchange.

Networking

No Risk

Both Business and Social

204

COMSCORE

comScore

Visising a web site which uses comScore to collect data about users browsing the page.

Web Services

No Risk

Mostly Social

205

COMVAULT

Commvault

Enterprise data backup and storage management software.

File Transfer

No Risk

Mostly Business

206

CONCUR

Concur

General browsing and interaction with travel and business management site concur.com

Web Services

Minimal Risk

Mostly Business

207

CONDUIT

Conduit

Browsing the Conduit websites (Wibiya, Mobile, Conduit) and using their features.

Web Services

Possible Misuse

Both Business and Social

208

CONEXTRA

Connextra

Visiting websites that use Connextra to generate ads

Web Services

No Risk

Both Business and Social

209

CONNXITY

Connexity

Visiting websites that use Connexity to generate ads

Web Services

No Risk

Both Business and Social

210

CONSTANT

Constant Contact

General browsing and interaction on email marketing site constantcontact.com .

Web Services

No Risk

Both Business and Social

211

CONTNET

Contnet

Visiting websites that use Contnet to generate ads

Web Services

No Risk

Mostly Business

212

CONTXWEB

Contextweb

Visiting websites that use Contextweb to generate ads.

Web Services

No Risk

Mostly Business

213

CORALCDN

Coral CDN

Peer to peer content distribution traffic from the Coral Content Distribution Network website

Web Services

No Risk

Both Business and Social

214

CORAUDIN

Core Audience

Visiting websites that use Core Audience to generate ads

Web Services

No Risk

Both Business and Social

215

CORBA

CORBA

Common Object Request Broker Architecture (CORBA) is a standard defined by the Object Management Group (OMG) that enables software components written in multiple computer languages and running on multiple computers to work together (i.e., it supports multiple platforms). Domino Internet Inter-ORB Protocol (DIIOP) is CORBA over IIOP for Lotus Domino. DIIOP allows external programs to attach to, and manipulate Domino databases. DIIOP is frequently used to allow Java-based and other non CORBA programs to connect to Lotus Domino.

Networking

No Risk

Both Business and Social

216

CORERJD

corerjd

Protocol for service type corerjd registered with IANA on Port 284 tcp/udp

Networking

No Risk

Both Business and Social

217

COVIA

Covia CI

Covia Communications Integrator

Networking

No Risk

All Business

218

CPXINTAC

CPX Interactive

Visiting websites that use CPX Interactive to generate ads

Web Services

No Risk

Mostly Business

219

CR_LIST

CR List

Certificate Revocation List is a list of certificates that have been revoked

Networking

No Risk

Both Business and Social

220

CRAIGSLI

Craigslist

Popular online classifieds

Web Services

Minimal Risk

Mostly Social

221

CRITEO

Criteo

Visiting websites that use Criteo to generate ads

Web Services

No Risk

Mostly Business

222

CROWDSCI

Crowd Science

Visiting websites that use Crowd Science to generate ads

Web Services

Minimal Risk

Mostly Business

223

CRS

MS CRS

Port 507/tcp and 507/udp

Networking

No Risk

Both Business and Social

224

CSCODRP

Cisco DRP

(DRP) Director Response Protocol enables Cisco's DistributedDirector product to query routers (DRP Server Agents) in the field for Border Gateway Protocol (BGP) and Interior Gateway Protocol (IGP) routing table metrics between distributed servers and clients.

Networking

No Risk

All Business

225

CSCOGDP

Cisco GDP

The Gateway Discovery Protocol (GDP) allows hosts to dynamically detect the arrival of new routers as well as determine when a router goes down.

Networking

No Risk

All Business

226

CSCOSLA

Cisco SLA

Allows for delivery of time based network and services performance data used in monitoring Service Level Agreements (SLAs).

Network Monitoring

No Risk

Mostly Business

227

CSDN

Csdn.net

Traffic generated by browsing news articles on Chinese technology new site csdn.net

Web Services

No Risk

All Social

228

CSISGWP

CSISGWP

Port 348/tcp and 348/udp

Networking

No Risk

Both Business and Social

229

CSNETNS

CSNET-NS

CSNET Mailbox Nameserver

Networking

No Risk

Both Business and Social

230

CTF

CTF

DECnet-Plus Common Trace Facility is used to collect and display information about specific protocol exchanges between systems.

Network Monitoring

No Risk

Mostly Business

231

CTRXCGP

Citrix CGP

Citrix Common Gateway Protocol.

Remote Access

No Risk

All Business

232

CTRXGOTO

Citrix GoToMeeting Platform

Hosting GoToMeeting, or similar sessions based on the GoToMeeting platform. Includes voice, video, and limited crowd management functions.

Collaboration

Minimal Risk

Mostly Business

233

CTRXICA

Citrix ICA

ICA (Independent Computing Architecture) is a proprietary protocol for an application server system, designed by Citrix Systems.

Remote Access

No Risk

All Business

234

CTRXIMA

Citrix IMA

The Citrix IMA (Independent Management Architeture) protocol is used for server-to-server communication in performing functions such as licensing and server load updates, all of which occur behind the scenes.

Remote Access

No Risk

All Business

235

CTRXJEDI

Citrix Jedi

Citrix Online streaming connection protocol for streaming real time data.

Collaboration

Minimal Risk

Mostly Business

236

CTRXLIC

Citrix Licensing

Citrix Licensing traffic

Remote Access

No Risk

All Business

237

CTRXONLN

Citrix Online

Citrix Online services, including GoToMyPC, GoToMeeting, GoToWebinar, and GoToTraining.

Collaboration

Possible Misuse

Mostly Business

238

CTRXRTMP

Citrix RTMP

Citrix streaming

Remote Access

Minimal Risk

All Business

239

CTRXSLGW

Citrix SLG

Citrix SLG (Storage Link Gateway) enables automated discovery and one-click access to native storage services using any of the leading storage architectures and protocols, including DAS, NAS, SAN, iSCSI, and Fibre Channel.

Remote Access

No Risk

All Business

240

CVCHOSTD

CVCHOSTD

Port 442/tcp and 442/udp

Networking

No Risk

Both Business and Social

241

CXENSE

cXense

Visiting websites that use cXense to generate ads

Web Services

No Risk

Mostly Business

242

CYWORLD

Cyworld

General web traffic for cyworld.com.

Social Networking

Minimal Risk

All Social

243

DAILYM

Daily Mail

Traffic generated by browsing the articles and viewing media on British newspaper site dailymail.co.uk.

Web Services

Minimal Risk

All Social

244

DALYMOTN

Dailymotion

A video sharing service website.

Streaming Media

Data Leaks/ Malware

All Social

245

DASP

DASP

This protocol is designed to provide an unordered, reliable, secure session for full-duplex datagram exchange that can be implemented for low power wireless networks and low cost devices.

Networking

No Risk

Both Business and Social

246

DATALOGX

Datalogix

Visiting websites that use Datalogix to generate ads

Web Services

No Risk

Mostly Business

247

DATEITO

Datei.to

General browsing and file transfers from file hosting service Datei.to

File Transfer

Evades Detection/ Bypasses

Mostly Social

248

DATEXASN

DATEX-ASN

An application profile specification and uses protocols to address the Application Layer (Layer 7 of the OSI Reference Model), the Presentation Layer (Layer 6 of the OSI Reference Model) and defines the Session Layer (Layer 5 of the OSI Reference Model) as null.

Networking

No Risk

Both Business and Social

249

DAUM

Daum.net

Browsing, searching, and streaming media on Korean website daum.net

Web Services

No Risk

All Social

250

DAYTIME

Daytime

A service in the Internet Protocol Suite, defined in 1983 in RFC 867. It is intended for testing and measurement purposes in computer networks.

Network Monitoring

Evades Detection/ Bypasses

Mostly Social

251

DBASE

dBase

dBase was the first widely used database management system (DBMS) for microcomputers. A major upgrade was released as dBASE III, and ported to a wider variety of platforms, adding UNIX, and VMS.

Database

No Risk

Both Business and Social

252

DBLCLICK

Doubleclick

Visiting web pages that use Doubleclick to generate ads.

Web Services

No Risk

All Social

253

DCAP

DCAP

An application layer protocol used between workstations and routers to transport SNA/NetBIOS traffic over TCP sessions.

Networking

No Risk

Both Business and Social

254

DCCP

DCCP

DCCP (Datagram Congestion Control Protocol) is a transport protocol used for congestion control. Applications include Internet telephony and video/audio streaming.

Networking

No Risk

Both Business and Social

255

DCERPC

DCE/RPC

Distributed Computing Environment / Remote Procedure Calls, is the remote procedure call system developed for the Distributed Computing Environment (DCE).

Networking

No Risk

Mostly Business

256

DCINSIDE

dcinside.com

General browsing and interaction with Korean photography focused website dcinside.com

Web Services

No Risk

All Social

257

DCP

DCP

An application level protocol optimized for the integration, monitoring and control of devices on a network.

Network Monitoring

No Risk

Mostly Business

258

DCSTORM

DC Storm

Visiting websites that use DC Storm to generate ads

Web Services

No Risk

Mostly Business

259

DECAUTH

DEC Auth

DEC Auth

Networking

No Risk

Both Business and Social

260

DECDEBUG

DEC Debug

Decladebug is a source code debugger targeted at debugging software on the local machine or a remote Digital Unix box.

Networking

No Risk

Both Business and Social

261

DECVMS

DECVMS

Port 441/tcp and 441/udp

Networking

No Risk

Both Business and Social

262

DELICIUS

Delicious

General browsing and interaction with the social bookmarking website Delicious

Web Services

No Risk

All Social

263

DELL

Dell

Dell official site

Web Services

No Risk

Mostly Business

264

DENA

DeNA websites

Traffic generated by browsing DeNA Comm website and some other sites that belong to DeNA

Messaging

Data Leaks/ Malware

All Social

265

DEOS

DEOS

Port 76/tcp and 76/udp

Database

No Risk

Mostly Business

266

DEPOFILE

Deposit Files

Online file storage service

File Transfer

Data Leaks/ Malware

Both Business and Social

267

DEVNTART

DeviantART

General browsing, interaction, and shopping on online artwork community site deviantART

Web Services

No Risk

All Social

268

DHCP

DHCP

DHCP (Dynamic Host Configuration Protocol) is an auto configuration protocol used for assigning IP addresses.

Networking

No Risk

Mostly Business

269

DHCPV6

DHCPv6

DHCP (Dynamic Host Configuration Protocol) for IPv6

Networking

No Risk

Mostly Business

270

DIAMETER

Diameter

An authentication, authorization, and accounting protocol for computer networks.

Networking

No Risk

All Business

271

DICTION

Dictionary.com

Traffic generated by browsing articles and looking up definitions of words on dictionary.com.

Web Services

No Risk

Both Business and Social

272

DIGG

Digg

General browsing and interaction on social news website digg

Web Services

No Risk

Mostly Social

273

DIRECT

Direct

Direct

Networking

No Risk

Both Business and Social

274

DISCARD

Discard

A service in the Internet Protocol Suite defined in RFC 863. It is intended for testing, debugging, and measurement purposes.

Network Monitoring

No Risk

Mostly Social

275

DIVSHARE

divShare

General browsing and file transfers from media sharing website divShare

File Transfer

Possible Misuse

Both Business and Social

276

DIXIE

DIXIE

A lightweight Directory Assistance Protocol

Networking

No Risk

Mostly Social

277

DLS

DLS

DLS (Directory Location Service) provides information on the location(addresses) and protocols needed to access white pages name servers.

Networking

No Risk

Both Business and Social

278

DNACML

DNA-CML

Port 436/tcp and 436/udp

Networking

No Risk

Both Business and Social

279

DNS

DNS

Querying a DNS server over TCP or UDP.

Networking

Data Leaks/ Malware

Both Business and Social

280

DNSIX

DNSIX

Department of Defense Intelligence Information System Network Security for Information Exchange (DNSIX) is a collection of security requirements for networking defined by the U.S. Defense Intelligence Agency.

Networking

No Risk

Mostly Business

281

DOCSTOC

Docstoc

Electronic business document repository and online store

File Transfer

Minimal Risk

Mostly Business

282

DOMNTOOL

domaintools.com

Internet domain name intelligence service

Web Services

No Risk

Mostly Business

283

DOOF

doof

General browsing and streaming games from online gaming site doof.

Games

No Risk

All Social

284

DOTOMI

Dotomi

Visiting websites that use Dotomi to generate ads

Web Services

No Risk

Mostly Business

285

DPSI

DPSI

Desktop Paging Software, Inc.

Networking

Possible Misuse

Both Business and Social

286

DRAWBRDG

Drawbridge

Visiting websites that use Drawbridge to generate ads

Web Services

No Risk

Mostly Business

287

DRCTCONN

DirectConnect

File sharing through p2p via internet hubs

File Transfer

Minimal Risk

Mostly Social

288

DROPBOX

Dropbox

An online file hosting/sharing service.

File Transfer

Possible Misuse

Both Business and Social

289

DSFGW

DSFGW

Port 438/tcp and 438/udp

Networking

No Risk

Both Business and Social

290

DSP

DSP

Display Support Protocol

Networking

No Risk

Both Business and Social

291

DSP3270

DSP3270

Display Systems Protocol

Networking

No Risk

Both Business and Social

292

DSSETUP

DSSETUP

Microsoft Active Directory's Directory Services Setup.

Networking

No Risk

All Business

293

DTAG

DTAG

Deutsche Telekom AG (abbreviated DTAG) is a telecommunications company headquartered in Bonn, Germany. It is the largest telecommunications company in Europe.

Networking

No Risk

Both Business and Social

294

DTK

DTK

Deception Toolkit, A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities

Networking

No Risk

Both Business and Social

295

DYNAINTR

Dynamic Intranet

General browsing and interaction on intranet site Dynamic Intranet

Web Services

No Risk

Both Business and Social

296

DYNGATE

DynGate

A firewall router that allows TeamViewer to route a TCP/IP connection over an HTTP tunnel

VPN and Tunneling

No Risk

Mostly Business

297

DYNMILOG

Dynamic Logic

Visiting websites that use Dynamic Logic to generate ads

Web Services

No Risk

Mostly Business

298

EARTHCAM

EarthCam

General browsing and interaction on earthcam.com

Web Services

Minimal Risk

Mostly Social

299

EASTMONY

Eastmoney

General browsing and interaction on Chinese financial portal eastmoney.com

Web Services

Minimal Risk

Mostly Social

300

EBAY

eBay

An online auction and shopping website.

Web Services

No Risk

Mostly Social

301

EBUDDY

eBuddy

Browsing the eBuddy website, sending messages, using voice and video chat.

Messaging

Minimal Risk

Mostly Social

302

EBUDYXMS

eBuddy XMS

Sending messages using the eBuddy XMS application

Messaging

No Risk

Mostly Social

303

ECHO

Echo

A service in the Internet Protocol Suite defined in RFC 862. It was originally proposed for testing and measurement of round-trip times in IP networks.

Network Monitoring

Evades Detection/ Bypasses

Mostly Social

304

EDITGRID

Editgrid

General browsing and interaction with online spreadsheet site editgrid

Web Services

No Risk

Mostly Business

305

EDONKEY

eDonkey

eDonkey/eMule peer-to-peer file sharing.

File Transfer

Evades

Detection/ Bypasses

All Social

306

EFFECTMS

Effective Measure

Visiting web pages that use Effective Measure to generate ads.

Web Services

No Risk

Mostly Business

307

EGP

EGP

EGP (Exterior Gateway Protocol) is an obsolete routing protocol for the Internet.

Networking

No Risk

Both Business and Social

308

EHOW

eHow

General browsing, interaction, and watching videos on how-to instruction site eHow

Web Services

No Risk

Mostly Social

309

EMBLNDT

EMBLNDT

Port 394/tcp and 394/udp

Networking

No Risk

Both Business and Social

310

EMFIS

EMFIS

EMFIS Service

Networking

No Risk

Both Business and Social

311

ENETCN

enet.com.cn

A web portal for IT people in China

Web Services

No Risk

Mostly Business

312

ENGAGBDR

Engage BDR

Visiting web pages that use Engage BDR to generate ads

Web Services

No Risk

Mostly Business

313

ENOVANCE

eNovance

Visiting web pages that use eNovance to generate ads

Web Services

No Risk

Mostly Business

314

ENVATO

Envato

Envato is an Australian based, privately held company that provides tutorial sites that teach people skills in a variety of creative areas as well as providing a means to sell their digital goods via a family of online marketplaces.

Web Services

No Risk

Both Business and Social

315

EPMAP

Epmap

Microsoft EPMAP (End Point Mapper), also known as DCE/RPC Locator service, is used to remotely manage services.

Networking

Possible Misuse

All Business

316

EQADS

EQ Ads

Visiting webpages that use EQ Ads to generate ads

Web Services

No Risk

Mostly Business

317

ERPC

ERPC

Encore Expedited Remote Procedure Call

Remote Access

Data Leaks/ Malware

Both Business and Social

318

ESET

Eset

Eset Antivirus/ Security software download and updates.

File Transfer

No Risk

Mostly Business

319

ESPN

ESPN

Browsing sports news articles, watching highlight videos, and sports fantasy league participation on the American sports site ESPN.com and affiliated websites.

Web Services

No Risk

All Social

320

ESRO

ESRO

The Efficient Short Remote Operations service is a Remote Procedure Call service.

Networking

No Risk

Both Business and Social

321

ETAO

etao.com

Browsing links and searching with the site eato.com.

Web Services

Possible Misuse

Both Business and Social

322

ETOS

ETOS

Port 377/378/tcp and 377/378/udp

Networking

No Risk

Both Business and Social

323

ETSY

Etsy

General browsing, interaction, and shopping on e-commerce website Etsy

Web Services

No Risk

Both Business and Social

324

EVERNOTE

Evernote

Traffic generated via visiting the evernote website or syncing information from the applications to and from their cloud.

Web Services

Minimal Risk

Both Business and Social

325

EVIDON

Evidon

Visiting a website that uses Evidon to collect user analytics.

Web Services

No Risk

All Social

326

EVONY

Evony

General browsing, forum interaction, and game play of flash- based online gaming site Evony

Games

No Risk

All Social

327

EXCHAGOL

Exchange Online

Traffic associated with Exchange Online, such as visiting outlook.com.

Mail

No Risk

Mostly Business

328

EXCHANGE

Exchange

Microsoft Exchange services.

Mail

Minimal Risk

Mostly Business

329

EXELATE

eXelate Media

Visiting websites that use eXelate Media to generate ads.

Web Services

No Risk

All Social

330

EXPONINT

Exponential

Interactive

Visiting websites that use Exponential Interactive to generate ads.

Web Services

No Risk

Both Business and Social

331

EXTRTORR

Extratorrent.com

The World's Largest BitTorrent System

File Transfer

Evades Detection/ Bypasses

All Social

332

EYERETRN

eyeReturn

Visiting websites that use eyeReturn to collect user analytics.

Web Services

No Risk

Both Business and Social

333

FACEBOOK

Facebook

Facebook is a social networking service.

Social Networking

Evades Detection/ Bypasses

Mostly Social

334

FACETIME

FaceTime

Video conferencing between supported Apple mobile devices and Macintosh computers using the Facetime application

Streaming Media

Minimal Risk

Mostly Social

335

FARMVILE

Farmville

A real-time farm simulation game developed by Zynga, available as an application on the social-networking website Facebook and as an App on the Apple iPhone.

Games

No Risk

All Social

336

FASP

FASP

FASP (Fast and Secure Protocol) is a high speed secure file transfer protocol

File Transfer

Possible Misuse

Mostly Business

337

FATMEN

Fatmen

Port 347/tcp and 347/udp

Networking

No Risk

Both Business and Social

338

FB_EVENT

Facebook Event

Creating/editing Facebook events

Social Networking

Minimal Risk

Mostly Social

339

FB_MSGS

Facebook Messages

Facebook E-mail and Instant Messaging

Social Networking

Minimal Risk

Mostly Social

340

FB_POST

Facebook Post

Interactions with Facebook walls

Social Networking

Minimal Risk

Mostly Social

341

FB_SRCH

Facebook Search

Searching within Facebook's website

Social Networking

Minimal Risk

Mostly Social

342

FB_VDCHT

Facebook Video Chat

Facebook Video Chat

Social Networking

Possible Misuse

Mostly Social

343

FB_VIDEO

Facebook Video

Facebook streaming video and video upload

Social Networking

Possible Misuse

Mostly Social

344

FBOOKAPP

Facebook Apps

Add ons developed for Facebook, generally games, puzzles, gifts, classifieds etc.

Social Networking

Evades Detection/ Bypasses

Mostly Social

345

FC2

FC2.com

Traffic generated by browsing or using the services on fc2.com

Web Services

No Risk

Both Business and Social

346

FEDERATD

Federated Media

Visiting websites that use Federated Media to generate ad traffic.

Web Services

No Risk

Both Business and Social

347

FILEMAKR

FileMaker

A computer software company formed in 1998 from the vestiges of Claris as a wholly owned subsidiary of Apple Inc. FileMaker develops, supports and markets two relational database programs; FileMaker and Bento. Filemaker is available for both Mac OS X and Microsoft Windows operating systems and is aimed towards business use, or home users with high-end needs. Bento, aimed at the home user or basic small business user, is a Mac OS X application with additional versions available for the iPhone and iPad.

Networking

No Risk

Both Business and Social

348

FILERCX

Filer.cx

A file hosting service that provides free web space for documents, pictures, music and movies.

File Transfer

Data Leaks/ Malware

Mostly Social

349

FILESERV

FileServe

General browsing and file transfers from file hosting services FileServe.com

File Transfer

Evades Detection/ Bypasses

Both Business and Social

350

FILESONC

Filesonic

General browsing and file transfers from data storage website Filesonic

File Transfer

Possible Misuse

Both Business and Social

351

FILESTBE

FilesTube

A file search engine that searches various file sharing and uploading sites like rapidshare, megaupload, mediafire, hotfile, netload, filesonic, 4shared.

File Transfer

Possible Misuse

All Social

352

FINGER

Finger

A simple network protocol for the exchange of human-oriented status and user information.

Network Monitoring

Minimal Risk

Mostly Social

353

FIX

FIX

Communication between network devices using the FIX protocol.

Networking

No Risk

All Business

354

FLASH

Adobe Flash

Streaming videos, site and application interaction, using browser plugin Adobe Flash

Streaming Media

Minimal Risk

Both Business and Social

355

FLICKR

Flickr

An image hosting and video hosting website, web services suite, and online community.

Web Services

Possible Misuse

All Social

356

FLIXSTER

Flixster

A social movie site allowing users to share movie ratings, discover new movies and meet others with similar movie taste. The site has expanded to include a Facebook app, a MySpace app, and an app for Bebo and Orkut

Social Networking

Minimal Risk

All Social

357

FLURRY

Flurry

Data collection traffic of different mobile applications from the company Flurry, Inc.

Web Services

No Risk

Both Business and Social

358

FOGBUGZ

Fogbugz

FogCreek Software's online project management tool.

Web Services

No Risk

All Business

359

FORBES

Forbes

General browsing of business magazine website Forbes.com

Web Services

No Risk

Mostly Business

360

FOURSQR

foursquare

Check-ins, browsing, and searching on the mobile application or website foursquare.

Social Networking

No Risk

All Social

361

FOXNEWS

Fox News

Visiting the Fox News website and streaming videos.

Web Services

Minimal Risk

Both Business and Social

362

FOXSPORT

FOX Sports

General browsing and streaming videos from sports news site foxsports.com, and affiliated sites.

Web Services

Minimal Risk

Mostly Social

363

FPROT

F-Prot

F-Prot Antivirus/Security software download and updates.

File Transfer

No Risk

Mostly Business

364

FREEDIC

The Free Dictionary

Traffic generated by looking for word definitions, viewing articles, or playing games on thefreedictionary.com.

Web Services

No Risk

Both Business and Social

365

FREEETV

freeetv

General browsing and streaming media from TV website freeetv.com

Streaming Media

Data Leaks/ Malware

All Social

366

FREEFR

Free

General browsing on French Internet Service Provider website Free.fr

Web Services

No Risk

All Social

367

FREEGATE

Freegate

Browsing the internet via the Freegate proxy application.

Proxy

Data Leaks/ Malware

Mostly Social

368

FREENET

Freenet

Traffic generated by the freenet browsing application.

File Transfer

Evades Detection/ Bypasses

Both Business and Social

369

FREWHEEL

Freewheel Media

Visiting websites that use Freewheel Media to generate ads.

Web Services

No Risk

Both Business and Social

370

FRING

Fring

Control and messaging flow traffic for mobile messaging application Fring

Messaging

Possible Misuse

Both Business and Social

371

FRINGAV

Fring A/V

Audio and video flow traffic for mobile messaging application Fring

Streaming Media

Data Leaks/ Malware

Both Business and Social

372

FRLANCER

Freelancer

Browsing and posting on the Freelancer website.

Web Services

Minimal Risk

All Business

373

FRNDFEED

FriendFeed

FriendFeed is a real-time feed aggregator from social media sites.

Social Networking

Minimal Risk

Mostly Social

374

FRNDSTER

Friendster

Friendster is a social networking service.

Social Networking

Possible Misuse

All Social

375

FTP

FTP

FTP (File Transfer Protocol) is used to transfer files from a file server to a local machine.

File Transfer

Possible Misuse

Both Business and Social

376

FTPCTRL

FTP Control

FTP (File Transfer Protocol) Control is used to manage FTP Data transfers from a file server to a local machine.

File Transfer

Possible Misuse

Both Business and Social

377

FTPDATA

FTP Data

File Transfer Protocol data flow

File Transfer

Possible Misuse

Both Business and Social

378

FTPS

FTPS

FTP control over TLS/SSL.

File Transfer

Possible Misuse

Both Business and Social

379

FTPSDATA

FTPSDATA

FTP data over TLS/SSL

File Transfer

Possible Misuse

Both Business and Social

380

FUNSHION

Funshion

Browsing Funshion videos, shopping, and online games.

Web Services

No Risk

All Social

381

FUNSHVID

Funshion Video

Streaming movies, TV, and live video streams from Funshion website.

Streaming Media

Minimal Risk

All Social

382

FXP

FXP

File eXchange Protocol provides a method of data transfer which uses the FTP protocol to transfer data from one remote server to another (inter-server) without routing this data through the client's connection.

File Transfer

No Risk

Both Business and Social

383

GACP

GACP

Gateway Access Control Protocol

Networking

No Risk

Mostly Business

384

GANJI

Ganji

Classified ad and media traffic generated by browsing ganji.com.

Web Services

No Risk

All Social

385

GCM

Google Cloud

Messaging

An Android client application retrieving messages sent to it by its server through the Google Cloud Messaging service.

Web Services

No Risk

Both Business and Social

386

GENIE

Genie

An old network management/diagnostic protocol,

Networking

No Risk

Both Business and Social

387

GENRAD

GENRAD

Protocol for service type GENRAD-MUX registered with IANA on Port 176 tcp/udp

Networking

No Risk

Both Business and Social

388

GIGANEWS

Giganews

A popular Usenet/newsgroup service provider.

File Transfer

Data Leaks/ Malware

All Social

389

GIST

GIST

General Internet Signalling Transport

Networking

No Risk

Both Business and Social

390

GLYPEPRX

GlypeProxy

Glype Proxy is a free web-based proxy script written in PHP.

Proxy

Possible Misuse

All Social

391

GMAIL

gmail

Logging in and sending/receiving emails on Google's web email service Gmail.

Mail

No Risk

Both Business and Social

392

GNUTELLA

Gnutella

A large peer-to-peer file-sharing network.

File Transfer

Evades Detection/ Bypasses

All Social

393

GOAL

goal.com

General browsing, interaction and streaming videos from international soccer news website goal.com.

Web Services

Minimal Risk

Mostly Social

394

GOGOBOX

GoGoBox

Browsing, using the online store, and playing online games on the website gogobox.com

Web Services

No Risk

All Social

395

GOMREMOT

GOM Remote

Using mobile application to remotely control PC applications GOM Audio and GOM Media Player

Remote Access

Data Leaks/ Malware

Mostly Social

396

GOMTVCOM

GOMTV.com

General browsing, interaction, and streaming media on Korean streaming media site GOMTV.com

Streaming Media

Data Leaks/ Malware

Mostly Social

397

GOMTVNET

GOMTV.net

General browsing, watching videos, and league and player stat tracking on Korean e-sports site GOMTV.net

Streaming Media

Data Leaks/ Malware

Mostly Social

398

GOOGADS

Google Ads

Visiting websites that use Google Ads to generate user specific advertisements.

Web Services

No Risk

Both Business and Social

399

GOOGANAL

Google Analytics

Google service that tracks and generates details web statistics.

Web Services

No Risk

Mostly Business

400

GOOGAPIS

Google APIs

Google Application Programming Interfaces that support the development of web applications that leverage Google services.

Web Services

No Risk

Both Business and Social

401

GOOGAPP

Google App Engine

Google App Engine lets you run your web applications using Google's infrastructure.

Web Services

No Risk

Both Business and Social

402

GOOGCNDR

Google Calendar

A free time-management web application offered by Google.

Web Services

No Risk

Mostly Business

403

GOOGDESK

Google Desktop

Google's Desktop search and desktop gadget software.

Web Services

Minimal Risk

Both Business and Social

404

GOOGDOCS

Google Drive

Loading and editing files on Google's word processing and document storage site Google Drive.

Web Services

No Risk

Mostly Business

405

GOOGERTH

Google Earth

Search locations for maps, topography, and first person views on Google's global mapping application Google Earth

Web Services

Minimal Risk

Mostly Social

406

GOOGLBT

Googlebot

Googlebot Web Crawler

Web Services

No Risk

Both Business and Social

407

GOOGLE

Google

Internet searching on Google's search engine site google.com (or international equivalent) and/or encrypted traffic from other Google services.

Web Services

No Risk

Both Business and Social

408

GOOGMAPS

Google Maps

Browsing and searching locations and getting directions on Google's online mapping service Google Maps

Web Services

No Risk

Both Business and Social

409

GOOGPLAY

Google Play

Downloading apps, music, movies, TV shows, books on Android phone application store Google Play

Web Services

No Risk

Both Business and Social

410

GOOGPLUS

Google +

Connecting to friends, posting messages, pictures, and videos, newsfeeds and game play on Google's social networking service Google +

Social Networking

Minimal Risk

All Social

411

GOOGSAFE

Google Safe Browsing

Google service that protects users from known phishing and malware sites

Web Services

No Risk

Both Business and Social

412

GOOGTRAN

Google Translate

Translating websites and selected text on Google's translation service Google Translate.

Web Services

No Risk

Both Business and Social

413

GOOGVIDO

Google Video

A free video sharing website and also a video search engine from Google Inc.

Streaming Media

Minimal Risk

Mostly Social

414

GOONEJP

goo.ne.jp

goo.ne.jp is a Japanese web portal

Web Services

No Risk

Mostly Social

415

GOPHER

Gopher

A TCP/IP Application layer protocol designed for distributing, searching, and retrieving documents over the Internet.

Web Services

No Risk

Mostly Social

416

GOTOMEET

GoToMeeting

Using features of the GoToMeeting platform specific to GoToMeeting alone. Scheduling meetings, account management, and starting the GoToMeeting-specific client through the web.

Collaboration

Minimal Risk

Mostly Business

417

GOTOMYPC

Citrix GoToMyPC

Using GoToMyPC to remotely control a PC that has the hosting software installed.

Collaboration

Minimal Risk

Mostly Business

418

GOTOTRNG

Citrix GoToTraining

Using GoToTraining-specific features of the GoToMeeting platform within a GoToTraining session, including participant testing and course-material sharing.

Collaboration

Minimal Risk

Mostly Business

419

GOTOWBNR

Citrix GoToWebinar

Using GoToWebinar-specific features of the GoToMeeting platform within a GoToWebinar session, including Q&A, Panel management, and crowd management functions.

Collaboration

Minimal Risk

Mostly Business

420

GPFS

GPFS

IBM General Parallel File System is a high-performance shared- disk clustered file system.

File Transfer

No Risk

All Business

421

GPITNP

Genesis PPP

Genesis Point-to-Point Trans Net

Networking

No Risk

Both Business and Social

422

GRE

GRE

GRE (Generic Route Encapsulation Protocol) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocol packet types inside IP tunnels, creating a virtual point-to-point link to various brands of routers at remote points over an Internet Protocol (IP) internetwork.

VPN and Tunneling

No Risk

Both Business and Social

423

GROUPON

Groupon

General browsing and use of the features of the coupon deal website Groupon

Web Services

No Risk

Both Business and Social

424

GRPWISE

Groupwise

A messaging and collaborative software platform from Novell that supports email, calendaring, personal information management, instant messaging, and document management.

Collaboration

No Risk

All Business

425

GRVSHRK

Grooveshark

Online music search engine and streaming service

Streaming Media

Minimal Risk

All Social

426

GSIFTP

GSIFTP

FTP enhanced to use GSI security.

File Transfer

Possible Misuse

Mostly Business

427

GSSLIC

Gss License

Gss X License Verification

Networking

No Risk

Both Business and Social

428

GTALK

Google Talk

Sending audio and video files, voice and text messaging with Google's messaging service Google Talk.

Messaging

Minimal Risk

Mostly Social

429

GTALKAUD

Google Talk Audio

Making an audio call or message using Google's messaging service Google Talk.

Streaming Media

Minimal Risk

Both Business and Social

430

GTALKFIL

Google Talk File Transfer

Sending a file over Google's messaging service Google Talk.

File Transfer

Possible Misuse

Both Business and Social

431

GTALKGAD

Google Talk Gadget

Flash based Google Talk IM client.

Messaging

Minimal Risk

Mostly Social

432

GTALKVID

Google Talk Video

Making a video call using Google Talk or Google Talk mobile.

Streaming Media

Minimal Risk

Both Business and Social

433

GTP_C

GPRS Tunneling Protocol Control

Protocol used within the GPRS core network for signaling between gateway and serving GPRS support nodes. It allows session activation, deactivation, adjustment of quality of service parameters, and session updates to check for new subscribers.

Networking

No Risk

Both Business and Social

434

GTP_P

GPRS Tunneling Protocol Prime

GTP protocol used for carrying charging data from the charging data function to the charging gateway function. Generally, from many individual network elements to a centralized computer that delivers the charging data to the network operator's billing centre.

Networking

No Risk

Both Business and Social

435

GTP_U

GPRS Tunneling Protocol User

Protocol used for carrying user data with the GPRS core network and between the radio access network and the core network.

Networking

No Risk

Both Business and Social

436

GUARDIAN

the guardian

General browsing and streaming audio and video from British new website the guardian

Web Services

Minimal Risk

Mostly Social

437

H225

H.225

In the family of H.323 VoIP protocols

Streaming Media

No Risk

Both Business and Social

438

H245

H.245

H.245 is a control channel protocol used with[in] e.g. H.323 and H.324 communication sessions.

Streaming Media

No Risk

Both Business and Social

439

H248

H.248

Megaco (officially H.248) is an implementation of the Media Gateway Control Protocol architecture for controlling VoIP gateways.

Streaming Media

Possible Misuse

Both Business and Social

440

H323

H.323

H.323 VoIP call signalling and control

Streaming Media

No Risk

Both Business and Social

441

HAMACHI

Hamachi

A hosted VPN service that lets you securely extend LAN-like networks to distributed teams.

VPN and Tunneling

Evades Detection/ Bypasses

Both Business and Social

442

HAO123

Hao123.com

Traffic generated by performing web searches on hao123.com.

Web Services

No Risk

Mostly Social

443

HASSLE

Hassle

HASSLE is a networking application that allows to execute remote jobs that have a transfer component built in. HASSLE is flexible as it only transfers the data and the parameters. The execution at the remote site is automatically accomplished via a code generator.

Networking

No Risk

Both Business and Social

444

HBCI

FinTS

A bank-independent protocol developed for online banking in the European market, used by German banks. Formerly HBCI (Home Banking Computer Interface)

Networking

No Risk

All Business

445

HDAP

HDAP

Microsoft HDA Protocol

Networking

No Risk

Both Business and Social

446

HEMS

HEMS

HEMS protocol

Networking

No Risk

Both Business and Social

447

HI5

hi5

General browsing and interaction with social gaming website hi5.com

Social Networking

Minimal Risk

All Social

448

HIVESTOR

HiveStor

HiveStor Distributed File System

File Transfer

No Risk

Mostly Social

449

HL7

HL7

Health Level 7 Medical information exchange is a standard for exchanging information between medical applications.

Collaboration

No Risk

All Business

450

HOOTSUIT

HootSuite

General browsing and interaction on the social media management website HootSuite

Web Services

Minimal Risk

Both Business and Social

451

HOPSTER

Hopster

An application that tunnels other applications in order to bypass firewalls.

Proxy

Possible Misuse

All Social

452

HOSTNAME

Hostname

NIC Host Name Server

Networking

No Risk

Both Business and Social

453

HOTFILE

Hotfile

Online file hosting/sharing.

File Transfer

Evades Detection/ Bypasses

All Social

454

HOTSPTSH

Hotspot Shield

The setup and running of a vpn tunnel using Hotspot Shield's application on PC, Android, or iPhone.

VPN and Tunneling

Minimal Risk

Both Business and Social

455

HOWARDFM

HowardForums

Visiting and browsing the Howard Forums website.

Web Services

No Risk

Mostly Social

456

HP

HP Website

HP.com offers company news and information on Hewlett-Packard

Web Services

No Risk

Mostly Business

457

HPPERF

HP Perf

The Performance Data Collector for HP OpenVMS (TDC) gathers performance data for OpenVMS systems. By default, TDC periodically collects and stores data in a file. Subsequently, user applications can retrieve and analyze data from the file.

Networking

No Risk

Both Business and Social

458

HPVMM

HP VMM

HP Virtual Machine Manager (VMM)

Remote Access

No Risk

All Business

459

HTTPMGT

HTTPMGT

Protocol for service type http-mgmt registered with IANA on Port 280 tcp/udp

Networking

No Risk

Both Business and Social

460

HTTPTNNL

HTTP Tunnel

HTTP traffic which has been tunnelled using the CONNECT method.

Web Services

No Risk

Both Business and Social

461

HUBPAGES

HubPages

Visiting and browsing the HubPages website.

Web Services

Minimal Risk

Both Business and Social

462

HULU

Hulu

Hulu online video streaming.

Streaming Media

Minimal Risk

All Social

463

HUPU

hupu.com

General browsing and streaming media from the sports news website Hupu.com

Web Services

No Risk

Mostly Social

464

HUSHMAIL

Hushmail.com

Browsing, logon, and emailing on webmail site Hushmail.com

Mail

Minimal Risk

Both Business and Social

465

HYPERG

Hyper-G

A publishing system with hypertext features more advanced than those available with the Hypertext Transfer Protocol and today's Web browser.

Networking

No Risk

Both Business and Social

466

HYVES

Hyves

General browsing and interaction on the Dutch social media website Hyves.

Social Networking

No Risk

All Social

467

IASD

IASD

Port 432/tcp and 432/udp

Networking

No Risk

Both Business and Social

468

IBM

IBM

Website for International Business Machines corporation

Web Services

No Risk

Mostly Business

469

IBMAPP

IBM APP

Protocol for service type IBM Application registered with IANA on Port 385 tcp/udp

Networking

No Risk

Both Business and Social

470

IBMOPC

IBM OPC

OPC automatically plans, controls, and monitors your production workload to maximize and optimize throughput, but lets you intervene manually when required.

Networking

No Risk

Both Business and Social

471

ICAD

ICAD

This was a Knowledge-Based Engineering (KBE) system that was based upon the Lisp programming language. ICAD had an open architecture that can utilize all the power and flexibility of the underlying language.

Networking

No Risk

Both Business and Social

472

ICALL

iCall

Sending messages, voice or video chat, and mobile to landline phone calls with messaging application iCall.

Messaging

Minimal Risk

Mostly Social

473

ICLOUD

iCloud

Apple's cloud data storage and computing service

File Transfer

Possible Misuse

Both Business and Social

474

ICP

ICP

Intelligent Communication Protocol, IANA port 1112/tcp and 1112/udp

Networking

No Risk

Both Business and Social

475

ICQ

ICQ

ICQ is an instant messaging computer program.

Messaging

Evades Detection/ Bypasses

Both Business and Social

476

IDENT

Ident

Ident is a protocol that helps identify the user of a particular TCP connection.

Networking

Evades Detection/ Bypasses

Mostly Social

477

IDP

IDP

IDP (Internet Datagram Protocol) is a close descendant of PUP's internetwork protocol, and roughly corresponds to the Internet Protocol (IP) layer in TCP/IP.

Networking

No Risk

Both Business and Social

478

IFENG

Ifeng.com

Traffic generated from reading articles and viewing media on ifeng.com.

Web Services

No Risk

Both Business and Social

479

IFILE

ifile.it

General browsing and file transfers from online backup service ifile.it

File Transfer

Evades Detection/ Bypasses

Both Business and Social

480

IGN

IGN

Browsing and watching videos on the IGN website.

Web Services

Minimal Risk

All Social

481

IKEA

IKEA

General browsing and merchandise purchasing from online store Ikea.com

Web Services

No Risk

Both Business and Social

482

IMAP

IMAP

IMAP (Internet Message Access Protocol) is an Internet standard protocol for accessing email on a remote server.

Mail

Evades

Detection/ Bypasses

Both Business and Social

483

IMDB

IMDb

General browsing and interaction on the IMDb website.

Web Services

No Risk

Mostly Social

484

IMESH

iMesh

A media and file sharing client with online social network features.

File Transfer

Evades Detection/ Bypasses

All Social

485

IMGAMES

IMGames

Protocol for service type IMGames registered with IANA on Port 1077 tcp/udp

Games

No Risk

Both Business and Social

486

IMGSHACK

ImageShack

General browsing and file transfers from image hosting website ImageShack

File Transfer

Minimal Risk

Both Business and Social

487

IMGUR

Imgur

Photo sharing web site

Web Services

Minimal Risk

Mostly Social

488

IMGVENUE

Image Venue

Free Image Hosting for bloggers, message board users, and eBay sellers.

Web Services

No Risk

Both Business and Social

489

IMO

imo.im

Text and voice IM through instant messenger service imo.im

Messaging

Data Leaks/ Malware

All Social

490

IMPRVDIG

Improve Digital

Visiting a website that uses Improve Digital to display ads.

Web Services

No Risk

All Social

491

IMSP

IMSP

Port 406/tcp and 406/udp

Networking

No Risk

Both Business and Social

492

INBSNESS

InBusiness

TCP Port 244 was used to connect to the administrative functions on the Dayna Communications InBusiness line of small office network equipment.

Networking

No Risk

Both Business and Social

493

INCOM

In.com

General browsing and interaction on Indian web portal In.com

Web Services

Minimal Risk

All Social

494

INFONLNE

Infonline

Visiting websites that use IVWbox to generate ads and collect information about users visiting that website.

Web Services

No Risk

All Social

495

INFOSEEK

InfoSeek

This was a very popular search engine originally operated by the Infoseek Corporation. Infoseek was bought by The Walt Disney Company in 1998, and the technology was merged with that of the Disney-acquired Starwave to form the Go.com network. Since then it has been replaced with Yahoo! search and is no longer in use.

Web Services

No Risk

Both Business and Social

496

INFOSTOR

Infostore

Microsoft Exchange Information Store

Mail

No Risk

All Business

497

INGRSNET

INGRES-NET

IngresNET service

Database

No Risk

Mostly Business

498

INNOVATI

Innovation Interactive

Visiting websites that use Innovation Interactive to generate ads or collect information about users.

Web Services

No Risk

All Social

499

INSKIN

Inskin Media

Visiting websites that use Inskin Media to generate ad traffic and gather user metrics.

Web Services

No Risk

Both Business and Social

500

INSTAGRM

Instagram

Using Instagram to view and share pictures and videos on social media platforms.

Social Networking

No Risk

All Social

501

INSTAIMG

Instagram Images

Viewing images with the Instagram application.

Web Services

No Risk

Mostly Social

502

INSTAVID

Instagram Video

Streaming videos with the Instagram application.

Streaming Media

Minimal Risk

Mostly Social

503

INTEGLAD

Integral Ad Science

Browsing a website that uses Integral Ad Science to generate ad traffic and gather user metrics.

Web Services

No Risk

Both Business and Social

504

INTERCLK

InterClick

Visiting websites that use InterClick to generate ad traffic.

Web Services

No Risk

Both Business and Social

505

IPCOMP

IPComp

IPComp (IP Payload Compression Protocol) is a low level compression protocol for IP datagrams defined in RFC 3173.

VPN and Tunneling

No Risk

Both Business and Social

506

IPERCEPT

IPerceptions

Visiting a website which uses IPerceptions to collect user information.

Web Services

No Risk

All Social

507

IPIP

IPIP

An IP tunneling protocol that encapsulates one IP packet in another IP packet.

VPN and Tunneling

No Risk

Both Business and Social

508

IPLAYER

BBC iPlayer

In-stream video and audio traffic from a television application developed by BBC

Streaming Media

Possible Misuse

All Social

509

IPSEC

IPsec

IPsec (Internet Protocol Security) is an end-to-end security scheme commonly used for VPNs.

VPN and Tunneling

Minimal Risk

Mostly Business

510

IRC

IRC

IRC (Internet Relay Chat) is a popular form of real-time Internet text messaging.

Messaging

Minimal Risk

Both Business and Social

511

IS99

IS-99

Port 379/380/tcp and 379/380/udp

Networking

No Risk

Both Business and Social

512

ISAKMP

ISAKMP

A protocol defined by RFC 2408 for establishing Security Associations (SA) and cryptographic keys in an Internet environment. ISAKMP only provides a framework for authentication and key exchange and is designed to be key exchange independent

Networking

No Risk

Both Business and Social

513

ISCHAT

ISCHAT

(Now known as ATG Live Help) ATG Live Help is an integrated set of live voice, chat, and email response services that enable online businesses to deliver just-in-time, personalized, interactive assistance to each visitor.

Messaging

No Risk

All Business

514

ISIGL

ISI Graphics

ISI Graphics Language

Networking

No Risk

Mostly Business

515

ISOIP

ISOIP

ISO Internetworking Protocol

Networking

Possible Misuse

Both Business and Social

516

ISOTSAP

ISO-TSAP

ISO-TSAP

Networking

No Risk

Both Business and Social

517

ISTOCKPT

iStockPhoto

Traffic generated by browsing or purchasing images on istockphoto.com.

Web Services

No Risk

Mostly Business

518

IT168

IT168.com

General browsing of the Chinese social media site IT168.com

Web Services

Minimal Risk

Mostly Social

519

ITUNES

iTunes

Apple's media player and online store.

Streaming Media

Minimal Risk

All Social

520

IVPIP

mck-ivpip

MCK, now Citel's VoIP extender ipvip protocol.

Streaming Media

No Risk

All Business

521

JANGO

Jango

Browsing and streaming music from the Jango website.

Streaming Media

Minimal Risk

All Social

522

JARGON

JARGON

Jargon protocol

Networking

No Risk

Both Business and Social

523

JAVARMI

Java RMI

A Java application programming interface that performs the object-oriented equivalent of remote procedure calls (RPC).

Networking

No Risk

Both Business and Social

524

JAVAUPDT

Java Update

Updating the Java Runtime Environment

Web Services

Data Leaks/ Malware

Both Business and Social

525

JONDO

Jondo

Browsing the JonDo website and browsing the internet while being connected via JonDo proxy servers.

Proxy

Possible Misuse

Both Business and Social

526

KAIXIN

Kaixin

Browsing the Kaixin social media website.

Social Networking

No Risk

All Social

527

KAKAO

Kakao

The Kakao Talk application being used to participate in chat, add friends, share media with friends, or make calls.

Messaging

Possible Misuse

Mostly Social

528

KAKAOAUD

Kakao Audio

The Kakao Talk application being used to make calls.

Messaging

Possible Misuse

Mostly Social

529

KASPRSKY

Kaspersky

Kaspersky Antivirus/Security software download and updates.

File Transfer

No Risk

Mostly Business

530

KATORRNT

KAT

A torrent download site

File Transfer

Evades Detection/ Bypasses

All Social

531

KAZAA

Kazaa

Started as a peer-to-peer file sharing application using the FastTrack protocol, now running as a music subscription service.

File Transfer

Evades Detection/ Bypasses

All Social

532

KBLOCK

Kblock

K-Block protects unattended logged-in terminals from unauthorized access in OpenVMS environments.

Networking

No Risk

Both Business and Social

533

KERBEROS

Kerberos

Kerberos is a network authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography.

Networking

No Risk

Mostly Business

534

KFTP

KFTP

File Transfer Protocol with Kerberos authentication and encryption.

File Transfer

Possible Misuse

Both Business and Social

535

KFTPDATA

KFTPDATA

File Transfer Protocol with Kerberos authentication and encryption.

File Transfer

Possible Misuse

Both Business and Social

536

KIS

KIS

Protocol for service type KIS Protocol registered with IANA on Port 186 tcp/udp

Networking

No Risk

Both Business and Social

537

KNETCMP

KNETCMP

KNET/VM Command/Message Protocol

Networking

No Risk

Both Business and Social

538

KOMLI

Komli

Visiting a website that uses Komli to generate ads.

Web Services

No Risk

All Social

539

KOOLIM

Kool IM

General browsing, interaction, and chatting on the web messaging site Kool IM.

Messaging

No Risk

Mostly Social

540

KOOORA

Kooora.com

Traffic generated by reading articles and viewing media on kooora.com

Web Services

No Risk

Mostly Social

541

KRUX

Krux

Visiting a website that uses Krux to create user specific ads.

Web Services

No Risk

All Social

542

KRYPTLAN

Kryptolan

Port 398/tcp and 398/udp

Networking

No Risk

Both Business and Social

543

KTELNET

Ktelnet

Telnet with Kerberos authentication and encryption.

Remote Access

No Risk

Mostly Business

544

KUGOU

Kugou

Android and PC, or from browsing to http://www.kugou.com. Includes Music, Music Videos, and Browsing.

Streaming Media

Possible Misuse

All Social

545

KVM

KVM

KVM (Keyboard/Video/Mouse) over IP Management Service

Networking

No Risk

Mostly Business

546

KWDB

KWDB

Remote Kernel debugger communication

Remote Access

No Risk

Both Business and Social

547

L2TP

L2TP

A tunneling protocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy.

VPN and Tunneling

No Risk

Mostly Business

548

LAMAINT

LA-Maint

IMP Logical Address maintenance

Networking

No Risk

Both Business and Social

549

LASTFM

Last.fm

A social networking music streaming site.

Streaming Media

Minimal Risk

All Social

550

LATIMES

LA Times

Browsing and watching videos on the LA Times website.

Web Services

Minimal Risk

Both Business and Social

551

LDAP

LDAP

LDAP (Lightweight Directory Access Protocol) is a protocol for reading and editing directories over an IP network.

Database

No Risk

Mostly Business

552

LEADBOLT

LeadBolt

Visiting websites that use LeadBolt to generate ad traffic

Web Services

No Risk

Both Business and Social

552

LEBNCOIN

Leboncoin

leboncoin.fr created by Spir Communication is a variation of the site Swedish Blocket. This is a site of online sales, allowing the publication of advertisements for sale of any items, they are accessible by everyone.

Web Services

Possible Misuse

Mostly Social

554

LEGENT

Legent

Protocols for service type legent‐1 (Legent Corporation) registered on IANA on Port 373 tcp/udp and service type legent‐2 (Legent Corporation) registered on IANA Port 374 tcp/udp

Networking

No Risk

Both Business and Social

555

LETITBIT

Letitbit

General browsing and file transfers on the file hosting site letitbit.net

File Transfer

Possible Misuse

Both Business and Social

556

LIMELGHT

Limelight

Using an online service wh