Submit a ticketCall us
Home > Success Center > Network Performance Monitor (NPM) > List of Quality of Experience (QoE) applications

List of Quality of Experience (QoE) applications

Table of contents
Created by Interspire Import, last modified by Erin Stenzel on Jan 30, 2018

Views: 7,725 Votes: 2 Revisions: 29

Overview

This article lists SolarWinds' Quality of Experience pre-configured applications. QoE uses Procera Networks NAVL library to identify pre-built application protocols (see https://www.proceranetworks.com/solutions/pro-id ) (© 2016 Procera Networks, available at https://www.proceranetworks.com, obtained on January 10, 2017.)

 

Note: This information is also available in the attached PDF.

 

Environment

NPM 11.0 and later

Detail

 

1

GUID

Name

Description

Category

Risk Level

Productivity Rating

2

050PLUS

050Plus

Logging in or making calls with the 050Plus application.

Messaging

Minimal Risk

Mostly Social

3

12306CN

12306.cn

12306.cn is the only China Railway customer service center

Web Services

No Risk

Mostly Business

4

126COM

126.com

126.com is a free webmail service of Netease

Mail

Minimal Risk

Mostly Business

5

17173

17173.com

General browsing, interaction, and game play on the social gaming network 17173.com

Social Networking

Minimal Risk

Mostly Social

6

2345COM

2345.com

General browsing of navigation portal 2345.com

Web Services

No Risk

Both Business and Social

7

247INC

[24]7 Inc

Data and advertisements hosted by [24]7 Inc.

Web Services

No Risk

Both Business and Social

8

247MEDIA

24/7 Media

Ads hosted by 24/7 Media technology and the Real Media group.

Web Services

No Risk

Both Business and Social

9

33ACROSS

33Across

Traffic generated by 33Across to collect anonymous information about users visiting specific websites.

Web Services

No Risk

All Social

10

39NET

39.net

39.net is China's leading health web portal

Web Services

No Risk

Mostly Business

11

3COMTSMX

3COM-TSMUX

3COM-TSMUX Queuing Protocol

Networking

No Risk

Mostly Business

12

4399COM

4399.com

General browsing and game play on Chinese casual gaming website 4399.com

Games

No Risk

All Social

13

4SHARED

4Shared

A file sharing service that provides search functions, allows users to upload and download files to their accounts and share links with other people.

File Transfer

Data Leaks/ Malware

All Social

14

51COM

51.com

General browsing, game play, posting and viewing dating profiles and videos, and point redemption on Chinese web portal 51.com

Web Services

Minimal Risk

All Social

15

56COM

56.com

General browsing and streaming media from Chinese video sharing website 56.com

Web Services

Evades Detection/ Bypasses

All Social

16

58COM

58.com.cn

Classified ad and media traffic generated by browsing 58.com.cn.

Web Services

No Risk

All Social

17

914CG

914CG

Texas Instruments 914C/G Terminal

Networking

No Risk

Both Business and Social

18

ABOUT

about.com

English source for original information and advice

Web Services

No Risk

Both Business and Social

19

ACAS

ACA Services

DEC's Application Control Architecture Services

Networking

No Risk

All Business

20

ACI

ACI

Application Communication Interface

Networking

No Risk

Both Business and Social

21

ACRNEMA

ACR-NEMA

A standard for handling, storing, printing, and transmitting information in medical imaging.

File Transfer

Minimal Risk

Mostly Business

22

ACTIVDIR

Active Directory

Microsoft Active Directory

Networking

No Risk

All Business

23

ACTVSYNC

ActiveSync

ActiveSync Notifications, IANA port 1034/tcp and 1034/udp

Networking

No Risk

Both Business and Social

24

AD_BKUP

AD Backup

Microsoft Active Directory Backup Service.

Networking

No Risk

All Business

25

AD_DRS

AD DRS

Microsoft Active Directory Replication Services.

Networking

No Risk

All Business

26

AD_DSAOP

AD DSAOP

Active Directory DSAOP services

Networking

Minimal Risk

All Business

27

AD_DSROL

AD DSROL

Microsoft Active Directory Domain Services helps administrators securely manage users, computers, and other devices on the network and facilitates resource sharing and collaboration between users.

Networking

No Risk

All Business

28

AD_FRS

AD File Replication Service

Microsoft Active Directory File Replication Services used to replicate files and changes between domain controllers

Networking

Minimal Risk

All Business

29

AD_NSP

AD NSP

Microsoft Active Directory Name Service Provider

Networking

No Risk

All Business

30

AD_RSTOR

AD Restore

Microsoft Active Directory Restore Service.

Networking

No Risk

All Business

31

AD_XDS

AD XDS

Microsoft Active Directory Extended Directory Service allows AD to be extended to store custom data that is of interest for the enterprise.

Networking

No Risk

All Business

32

ADCONION

Adconion

 

User online behaviour data gathered by Adconion Media Group, digital distribution platform operators.

 

Web Services

No Risk

All Social

33

ADDTHIS

AddThis

User analytics and content sharing through addthis.com

Web Services

No Risk

Both Business and Social

34

ADFLY

Adf.ly

General site browsing and usage of URL shortening service from Adf.ly

Web Services

Minimal Risk

Both Business and Social

35

ADFONIC

adfonic

Mobile web and app inventory from advertising buying platform adfonic.

Web Services

No Risk

Both Business and Social

36

ADGEAR

adgear

Visiting websites that host their ads using adgear

Web Services

No Risk

Both Business and Social

37

ADIFYCOP

Adify

Visiting websites that use Adify to generate ad traffic.

Web Services

No Risk

Both Business and Social

38

ADJUGLER

AdJuggler

Visiting websites that use AdJuggler to generate ads.

Web Services

No Risk

Both Business and Social

39

ADMARVEL

AdMarvel

Visiting websites that use AdMarvel to generate ads.

Web Services

No Risk

Both Business and Social

40

ADMASTER

AdMaster

Visiting web pages that use Admaster to generate ads.

Web Services

No Risk

Mostly Business

41

ADMELD

Admeld

Accessing web pages that use the Admeld service to generate ads

Web Services

No Risk

Mostly Social

42

ADMETA

Admeta

Traffic generated by web pages using Admeta to generate ads.

Web Services

No Risk

Mostly Business

43

ADMIN5

Admin5

General browsing of Chinese webmaster information site Admin5.

Web Services

No Risk

Mostly Business

44

ADMOB

AdMob

Traffic generated by web pages using AdMob to generate ads.

Web Services

Minimal Risk

Mostly Business

45

ADNSTRM

adnStream

General site browsing and streaming media from Spanish video streaming site adnStream

Streaming Media

Possible Misuse

All Social

46

ADOBANAL

Adobe Analytics

Traffic going to Adobe Analytics websites such as scene7.com, demdex.net, omtrdc.net, and 2o7.net.

Web Services

No Risk

All Business

47

ADOBE

Adobe

Adobe, Adobe Connect and Adobe Updates

Web Services

No Risk

Both Business and Social

48

ADOMETRY

Adometry

traffic generated by web sites using Adometry to generate ads.

Web Services

No Risk

Mostly Business

49

ADOTUBE

Ado Tube

In-stream video traffic from advertising company Ado tube

Web Services

No Risk

Mostly Business

50

ADREADY

Adready

Traffic generated by web sites using Adready to generate ads.

Web Services

No Risk

Mostly Business

51

ADRIVE

Adrive.com

An online cloud storage service

Web Services

Possible Misuse

Both Business and Social

52

ADROLL

AdRoll

Embedded ad traffic from advertisement retargeting company Adroll

Web Services

No Risk

Both Business and Social

53

ADSAGE

Adsage

Traffic generated by web sites using Adsage to generate ads.

Web Services

No Risk

Mostly Business

54

ADSAME

AdSame

Internet advertising content through Chinese digital marketing company AdSame

Web Services

No Risk

Mostly Business

55

ADTECH

ADTECH

Traffic generated from web sites using ADTECH to generate ads

Web Services

No Risk

Mostly Business

56

ADTEGRTY

Adtegrity

Traffic generated by web sites using Adtegrity to generate ads

Web Services

No Risk

Mostly Business

57

ADVERTIS

Advertising

Visiting websites that host their ads using advertise.com

Web Services

No Risk

Mostly Social

58

ADXPOSE

AdXpose

Traffic generated by web sites using AdXpose to generate ads

Web Services

No Risk

Mostly Business

59

ADXTRACK

AD-X Tracking

Application tracking and attributes data from analytics provider AD-X Tracking

Web Services

No Risk

Mostly Business

60

AED512

AED512

AED 512 Emulation Service

Networking

No Risk

Both Business and Social

61

AFP

AFP

A network protocol that offers file services for Mac OS X and original Mac OS. In Mac OS X, AFP is one of several file services supported including Server Message Block (SMB), Network File System (NFS), File Transfer Protocol (FTP), and WebDAV. AFP currently supports Unicode file names, POSIX and access control list permissions, resource forks, named extended attributes, and advanced file locking

File Transfer

No Risk

Both Business and Social

62

AFREECA

afreecaTV

General browsing and streaming media from the television streaming service afreecaTV

Streaming Media

Data Leaks/ Malware

All Social

63

AGGRKNOW

Aggregate

Knowledge

Traffic generated by web sites using Aggregate Knowledge to generate ads

Web Services

No Risk

Mostly Business

64

AH

AH

AH (Authentication Header) is a member of the IPsec protocol suite, guaranteeing connectionless integrity and data origin authentication of IP packets.

VPN and Tunneling

No Risk

Both Business and Social

65

AIZHAN

Aizhan.com

Aizhan.com is a Chinese website that assists webmasters

Web Services

No Risk

Both Business and Social

66

AKAMAI

Akamai

Generated by accessing web pages that host their media with Akamai.

Web Services

No Risk

Mostly Social

67

AKAMAINS

Akamai NetSession

Traffic generated by Akamai NetSession interaface app that handles downloads of files from services that use it.

File Transfer

Minimal Risk

Mostly Social

68

ALIAS

Alias

Port 1187/tcp and 1187/udp

Networking

No Risk

Both Business and Social

69

ALIBABA

Alibaba

Browsing, using the search options and viewing prices on the website Alibaba.com

Web Services

No Risk

All Business

70

ALIWW

Aliwangwang

Traffic generated from the Aliwangwang instant messaging application.

Messaging

Minimal Risk

Both Business and Social

71

ALIYUN

Aliyun.com

General browsing and interaction on the Chinese site aliyun.com

Web Services

No Risk

Both Business and Social

72

ALLEGRO

Allegro.pl

Traffic generated by browsing and shopping on allegro.pl.

Web Services

No Risk

Mostly Social

73

AMAZON

Amazon

Amazon online retail service

Web Services

No Risk

Mostly Social

74

AMAZONWS

Amazon Web Services

Accessing media that is hosted in the Amazon Cloud

Web Services

Minimal Risk

All Business

75

AMEBA

ameba

General browsing and game play on ameba sites.

Web Services

No Risk

All Social

76

AMOBEE

Amobee

Advertisement traffic to and from amobee.com

Web Services

No Risk

All Social

77

ANDROID

Android

Visiting and browsing the Android website.

Web Services

No Risk

Both Business and Social

78

ANET

ANET

ATEXSSTR

Networking

No Risk

Both Business and Social

79

ANSANTFY

ANSA Notify

ANSA REX Notify

Networking

No Risk

Both Business and Social

80

ANSATRDR

ANSA REX Trader

ANSA REX Trader

Networking

No Risk

Both Business and Social

81

ANSWERS

Answers.com

Internet-based knowledge exchange

Web Services

No Risk

Both Business and Social

82

AOL_IM

AIM

AIM is an instant messaging and presence application that enables users to conduct person-to-person instant messaging, chatroom messaging, peer-to-peer file sharing and facebook support, among other features.

Messaging

Evades Detection/ Bypasses

Both Business and Social

83

AOLADS

AOL Ads

Advertising traffic to and from advertising.aol.com

Web Services

No Risk

Both Business and Social

84

APNS

APNS

A service that Apple uses to open a constantly open IP connection to forward notifications from its servers to Apple devices

Messaging

Minimal Risk

Both Business and Social

85

APPLE

Apple

Apple website and host/network services traffic

Networking

Minimal Risk

Both Business and Social

86

APPLEMAP

Apple Maps

Browsing and searching locations and getting directions on Apple's online mapping service Apple Maps

Web Services

No Risk

Both Business and Social

87

APPLEUPD

Apple Update

A software tool by Apple Computer that installs the latest version of Apple software.

File Transfer

Minimal Risk

Both Business and Social

88

APPLGUI

Applejuice GUI

Represents the traffic between a host running an Applejuice GUI and a host running the Applejuice Core

File Transfer

Possible Misuse

All Social

89

APPLJUCE

Applejuice

Applejuice is a semi-centralized peer-to-peer file sharing network similar to the original eDonkey network.

File Transfer

Evades Detection/ Bypasses

All Social

90

APPLSHAR

AppleShare

AppleShare IP WebAdmin

Networking

No Risk

Both Business and Social

91

APPNEXUS

AppNexus

Visiting websites that host advertisements using AppNexus.

Web Services

No Risk

All Social

92

APTEAN

Aptean

Traffic related to Aptean suite of enterprise software

Web Services

No Risk

Both Business and Social

93

ARCHIVE

The Internet Archive

General browsing, audio and video streaming, blogging, text and software downloads from the Internet Archive website

Web Services

No Risk

Both Business and Social

94

ARCISDMS

ARCISDMS

Protocol for service type Arcisdms registered with IANA on Port 262 tcp/udp

Networking

No Risk

Both Business and Social

95

ARES

Ares

General browsing, interactions, and file transfers on the open source peer-to-peer file sharing application Ares Galaxy.

File Transfer

Minimal Risk

All Social

96

ARIEL

Ariel

Ariel for Windows from Infotrieve. With commercially available hardware and Ariel software, you can scan articles, photos, and other documents directly; transmit the electronic images to other Ariel workstations anywhere in the world, using either FTP or e-mail; and convert them to PDF for easy patron delivery.

Networking

Possible Misuse

Both Business and Social

97

ARNS

ARNS

Port 384/tcp and 384/udp

Networking

No Risk

Both Business and Social

98

ASA

ASA

Port 386/tcp and 386/udp

Networking

No Risk

Both Business and Social

99

ASK

Ask.com

General browsing and interaction on question answering search engine Ask.com

Web Services

No Risk

Mostly Social

100

ASTRAWEB

Astraweb

A Usenet/newsgroup service provider.

File Transfer

Data Leaks/ Malware

All Social

101

ATLASSOL

Atlas Solutions

Accessing web content that uses Atlas Solutions for hosting ads and other media.

Web Services

Minimal Risk

All Social

102

ATOM

Atom

Atom is a web content syndication system similar to RSS.

Web Services

No Risk

Both Business and Social

103

AUDIT

AUDIT

Unisys Audit SITP

Networking

No Risk

Both Business and Social

104

AUDITD

auditd

Linux audit logging

File Transfer

Possible Misuse

Mostly Business

105

AUDSCIEN

AudienceScience

Visiting websites that use AudienceScience to host advertisements.

Web Services

No Risk

All Social

106

AURORA

Aurora

A link layer communications protocol for use on point-to-point serial links. Developed by Xilinx, it is intended for use in high- speed (tens of gigabits/second or more) connections internally in a computer.

Networking

No Risk

Both Business and Social

107

AUTOHOME

Autohome.com.cn

Traffic generated by reading articles on autohome.com.cn

Web Services

No Risk

Mostly Social

108

AVCTPRXY

Avocent

Avocent Proxy Protocol

Proxy

No Risk

Both Business and Social

109

AVG

AVG

AVG Antivirus/Security software download and updates.

File Transfer

No Risk

Mostly Business

110

AVIRA

Avira

Avira Antivirus/Security software download and updates.

File Transfer

No Risk

Mostly Business

111

AVOIDR

Avoidr

Use of foursquare location-based technology with mobile app Avoidr to locate and avoid people

Web Services

No Risk

All Social

112

BABYLON

Babylon

General browsing and interaction with the online translation website Babylon.com

Web Services

Minimal Risk

Both Business and Social

113

BACKBLZE

BackBlaze

An online backup tool that allows Windows and Mac OS X users to back up their data to an offsite data center.

File Transfer

Possible Misuse

Both Business and Social

114

BADOO

badoo

General browsing, interaction, messaging, and posting on social networking site badoo.com

Social Networking

No Risk

All Social

115

BAIDU

Baidu

Using Baidu's search tools, viewing videos, viewing news, and using the maps tool.

Web Services

Possible Misuse

Mostly Social

116

BAIDUHI

BaiduHi

Traffic generated by instant messaging with other users on BaiduHi.

Messaging

Possible Misuse

Mostly Social

117

BARNSNBL

Barnes&Noble

Barnes&Noble offers books, ebooks, DVDs, music, toys, and games

Web Services

No Risk

Both Business and Social

118

BATTLNET

Battle.net

A premium gaming service provided by Blizzard Entertainment.

Games

Possible Misuse

All Social

119

BAZAARVC

Bazaar Voice

Using online services which use Bazaar Voice to collect user data.

Web Services

No Risk

Both Business and Social

120

BDEFNDER

BitDefender

BitDefender Antivirus/Security software download and updates.

File Transfer

No Risk

Mostly Business

121

BEBO

Bebo

A social networking website where users can post blogs, photographs, music, videos and questionnaires to which other users may answer.

Social Networking

Data Leaks/ Malware

All Social

122

BEETPH

BEETPH

BEETPH (Bound End-to-End Tunnel) is a new mode for IPsec ESP. The new mode augments the existing ESP tunnel and transport modes. For end-to-end tunnels, the new mode provides limited tunnel mode semantics without the regular tunnel mode overhead. The mode is intended to support new uses of ESP, including mobility and multi-address multi-homing.

VPN and Tunneling

No Risk

Both Business and Social

123

BET365

Bet365

Online gambling website

Games

No Risk

All Social

124

BFTP

BFTP

BFTP (Background File Transfer Program)

File Transfer

Minimal Risk

Both Business and Social

125

BGMP

BGMP

Border Gateway Multicast Protocol

Networking

No Risk

Both Business and Social

126

BGP

BGP

BGP (Border Gateway Protocol) is the protocol backing the core routing decisions on the Internet.

Networking

No Risk

Both Business and Social

127

BH611

BH611

Protocol for service type bh611 registered with IANA on Port 354 tcp/udp

Networking

No Risk

Both Business and Social

128

BHEVENT

BHEVENT

Protocol for service type bhevent registered with IANA on Port 357 tcp/udp

Networking

No Risk

Both Business and Social

129

BHFHS

BHFHS

Protocol for service type bhfhs registered with IANA on Port 248 tcp/udp

Networking

No Risk

Both Business and Social

130

BHMDS

BHMDS

Protocol for service type bhmds registered with IANA on Port 310 tcp/udp

Networking

No Risk

Both Business and Social

131

BIGUPLOD

BigUpload

Secure uploading, transferring, and file sharing service provider.

File Transfer

Data Leaks/ Malware

Mostly Social

132

BILDDE

Bild.de

General browsing on German tabloid website Bild.de

Web Services

No Risk

Mostly Social

133

BING

Bing

Bing is Microsoft's Internet search engine.

Web Services

No Risk

Both Business and Social

134

BINGBOT

Bingbot

Microsoft web-crawler for the Bing search engine

Web Services

No Risk

Both Business and Social

135

BITTORRE

Bittorrent

A peer-to-peer file sharing protocol used for transferring large amounts of data.

File Transfer

Evades Detection/ Bypasses

All Social

136

BIZO

bizo.com

Advertising traffic to and from bizo.com

Web Services

No Risk

Both Business and Social

137

BJNP

BJNP

Canon printers use this specific BJNP" protocol for document printing and network communication."

Networking

No Risk

Mostly Business

138

BJNPDISC

BJNP Discovery

Discovering network devices with the BJNP protocol.

Networking

No Risk

Both Business and Social

139

BLAZEFS

BlazeFS

Blaze File Server is a remote file sharing system designed specifically for Macs. Once it's running, Blaze is transparent to the user and to the client application: It appears as if users are accessing files on a local hard drive.

File Transfer

Minimal Risk

Both Business and Social

140

BLCKJACK

Blackjack

Port 1025/tcp and 1025/udp

Networking

No Risk

Both Business and Social

141

BLIDM

BLIDM

Britton-Lee IDM (Integrated Database Manager)

Database

No Risk

Both Business and Social

142

BLOGGER

Blogger

A blog publishing service owned by Google, formerly known as BlogSpot.

Web Services

No Risk

Mostly Social

143

BLOKUS

Blokus

General browsing and game play of online board strategy game Blokus

Games

Minimal Risk

All Social

144

BLOOMBRG

Bloomberg

General browsing of business news and financial information site Bloomberg

Web Services

No Risk

Mostly Business

145

BLUEKAI

Bluekai

Visiting a website that hosts ads using Bluekai.

Web Services

No Risk

All Social

146

BLUELITH

BlueLithium

Online advertising traffic from Bluelithium

Web Services

No Risk

Both Business and Social

147

BNET

Bnet

Port 415/tcp and 415/udp

Networking

No Risk

Both Business and Social

148

BOBIEDGE

Business Objects BI Edge

Connecting to a BusinessObjects or a Crystal Enterprise server with a client such as a web browser.

Collaboration

Minimal Risk

All Business

149

BOOKING

Booking.com

General browsing and interaction on online accommodation reservation site Booking.com

Web Services

No Risk

Both Business and Social

150

BOXCARIO

Boxcar.io

General web traffic for the boxcar.io website.

Social Networking

Minimal Risk

All Social

151

BOXNET

Box.net

General browsing and file transfers on file storage site Box.net

File Transfer

Evades

Detection/ Bypasses

Both Business and Social

152

BRCDN

BRCDN

Visiting websites that use BRCDN to host media or ads.

Web Services

No Risk

All Social

153

BRGHTTLK

Brighttalk

Online webinar and video provider

Web Services

Minimal Risk

Both Business and Social

154

BRIGHTRL

Bright Roll

General brightroll.com advertisement and web traffic.

Web Services

No Risk

Both Business and Social

155

BRILIG

brilig

General advertisement traffic from brilig.com

Web Services

No Risk

Both Business and Social

156

BROSOFT

Brothersoft.com

Brothersoft.com is a free software download website.

File Transfer

Minimal Risk

Both Business and Social

157

BRSRVR

BRSRVR

Visiting websites that use BRSRVR to host ads and other media content.

Web Services

No Risk

All Social

158

BVMEDIA

BV! Media

General BV! Media advertisement traffic

Web Services

No Risk

Both Business and Social

159

C2DM

C2DM

A service that provides a mechanism that servers can use to tell mobile applications to contact the server directly to fetch updated application or user data. It handles queuing of messages and delivery to target applications.

Messaging

Minimal Risk

Both Business and Social

160

CA_CERT

CA Certificate

Certification authority (CA) issues digital certificates which certifies the ownership of a public key for message encryption

Networking

No Risk

Both Business and Social

161

CAILIC

CAIlic

Computer Associates Int'l License Server

Networking

No Risk

Both Business and Social

162

CAP

CAP

Port 1026/tcp and 1026/udp

Networking

No Risk

Both Business and Social

163

CARAYTEC

caraytech

General advertisement and web traffic from caraytech

Web Services

No Risk

Both Business and Social

164

CASALE

Casale

Advertising traffic to and from Casale Media.

Web Services

No Risk

Both Business and Social

165

CBLPRTAX

Cableport AX

Protocol for service type Cable Port A/X registered with IANA on Port 282 tcp/udp

Networking

No Risk

Both Business and Social

166

CBS

cbs.com

General browsing, interaction, and streaming media from the American television broadcasting website cbs.com

Web Services

No Risk

Both Business and Social

167

CBSINTER

cbsinteractive.com

General browsing of the information and entertainment website cbsinteractive.com

Web Services

Minimal Risk

Mostly Social

168

CDC

CDC

Certificate Distribution Center

Networking

No Risk

Both Business and Social

169

CFDPTKT

CFDPTKT

Coherent File Distribution Protocol

File Transfer

Possible Misuse

Mostly Social

170

CHANGO

Chango

General advertisement and web traffic from chango.com

Web Services

No Risk

Both Business and Social

171

CHARGEN

Chargen

A device or software that produces static or animated text (such as crawls and rolls) for keying into a video stream. Modern character generators are computer-based, and can generate graphics as well as text.

Network Monitoring

Minimal Risk

Mostly Social

172

CHINACOM

china.com

General browsing, loading images and stories on the Chinese social media site china.com

Web Services

Minimal Risk

All Social

173

CHINAREN

Chinaren.com

General browsing and interaction on the Chinese alumni social networking site Chinaren.com

Social Networking

Possible Misuse

All Social

174

CHINAUMA

chinauma

General chinauma.com advertisement and web traffic.

Web Services

No Risk

All Social

175

CHNANEWS

China News

Visiting China News and streaming videos from the website.

Web Services

No Risk

Mostly Social

176

CHRTBEAT

Chart Beat

General chartbeat.com advertisement and web traffic.

Web Services

No Risk

Both Business and Social

177

CIFS

CIFS

CIFS (Common Internet File System) is used to provide shared access to directories, files, printers, serial ports, and miscellaneous communications between nodes on a network.

File Transfer

No Risk

All Business

178

CISCOFNA

Cisco FNATIVE

Used for Cisco Proprietary Protocols on Cisco Catalyst Network Analysis Modules.

Networking

No Risk

Mostly Business

179

CISCOSYS

Cisco SYSMAINT

Cisco SYSMAINT

Networking

No Risk

Mostly Business

180

CISCOTNA

Cisco TNATIVE

Cisco TNATIVE

Networking

No Risk

Mostly Business

181

CL1

CL1

Network Innovations CL/1

Networking

No Risk

Both Business and Social

182

CLARIZEN

Clarizen

General browsing, interaction, and file posting on project management site clarizen.com.

Collaboration

No Risk

All Business

183

CLASSMTE

Classmates

Web-based social network based on high school yearbooks

Social Networking

Possible Misuse

All Social

184

CLDAP

CLDAP

The Connectionless Lightweight Directory Access Protocol (CLDAP) is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network using UDP.

Database

No Risk

Mostly Business

185

CLIKBOTH

Clickbooth

General clickbooth.com advertisement and web traffic.

Web Services

No Risk

Both Business and Social

186

CLIKTALE

ClickTale

Browsing clicktale.com and associated domains.

Web Services

Minimal Risk

Both Business and Social

187

CLOANTO

CLOANTO

The cloanto.net infrastructure provides redundant hosting, email and telecommunications services.

Networking

No Risk

Both Business and Social

188

CLOUDFLR

CloudFlare

Visiting websites that use CloudFlare to generate ads

Web Services

Minimal Risk

Both Business and Social

189

CLRCASE

Clearcase

A software tool for revision control (e.g. configuration management, SCM) of source code and other software development assets. It is developed by the Rational Software division of IBM. ClearCase forms the base of revision control for many large and medium sized businesses and can handle projects with hundreds or thousands of developers.

Networking

No Risk

Both Business and Social

190

CLUBBOX

Clubbox

site http://www.clubbox.co.kr/

File Transfer

Evades Detection/ Bypasses

Mostly Social

191

CMIP

CMIP

Common Management Information Protocol

Network Monitoring

No Risk

Mostly Business

192

CMPRSNET

CompressNET

CompressNET is a commercial WAN compression protocol.

Networking

No Risk

Mostly Business

193

CNET

CNET

Online forum for technology news, reviews, teaching videos, product pricing, free downloads, and newsletters

Web Services

Minimal Risk

Both Business and Social

194

CNETDWLD

CNET Download

Internet download directory websites launched in 1996 as a part of CNET.

Web Services

No Risk

Both Business and Social

195

CNN

CNN

General browsing and streaming media from US Cable news channel CNN web and mobile sites

Web Services

No Risk

Both Business and Social

196

CNZZ

CNZZ

Visiting websites that use CNZZ to generate ads

Web Services

No Risk

Both Business and Social

197

CODAAUTH

Coda Auth

Coda Authentication Service, part of Coda filesystem services, developed by Carnegie Mellon University. Protocol for service type codaauth2 registered with IANA on Port 370 tcp/udp

Networking

No Risk

Both Business and Social

198

COGNITIV

Cognitive Match

Visiting websites that use Cognitive Match to generate ads

Web Services

Minimal Risk

Mostly Social

199

COMM

DeNA Comm

DeNA Comm voice calls and text chats.

Messaging

Data Leaks/ Malware

All Social

200

COMMJUNC

Commission

Junction

Visiting websites that use Commission Junction to generate ads.

Web Services

No Risk

All Social

201

COMPETE

Compete

Visiting websites that use Compete to gather information about users search and site behavior.

Web Services

No Risk

All Social

202

COMPUWAR

Compuware

Visiting websites that use Compuware to generate ads

Web Services

No Risk

Both Business and Social

203

COMSCM

COMSCM

SCM Microsystems is a leading provider of solutions for secure access, secure identity and secure exchange.

Networking

No Risk

Both Business and Social

204

COMSCORE

comScore

Visising a web site which uses comScore to collect data about users browsing the page.

Web Services

No Risk

Mostly Social

205

COMVAULT

Commvault

Enterprise data backup and storage management software.

File Transfer

No Risk

Mostly Business

206

CONCUR

Concur

General browsing and interaction with travel and business management site concur.com

Web Services

Minimal Risk

Mostly Business

207

CONDUIT

Conduit

Browsing the Conduit websites (Wibiya, Mobile, Conduit) and using their features.

Web Services

Possible Misuse

Both Business and Social

208

CONEXTRA

Connextra

Visiting websites that use Connextra to generate ads

Web Services

No Risk

Both Business and Social

209

CONNXITY

Connexity

Visiting websites that use Connexity to generate ads

Web Services

No Risk

Both Business and Social

210

CONSTANT

Constant Contact

General browsing and interaction on email marketing site constantcontact.com .

Web Services

No Risk

Both Business and Social

211

CONTNET

Contnet

Visiting websites that use Contnet to generate ads

Web Services

No Risk

Mostly Business

212

CONTXWEB

Contextweb

Visiting websites that use Contextweb to generate ads.

Web Services

No Risk

Mostly Business

213

CORALCDN

Coral CDN

Peer to peer content distribution traffic from the Coral Content Distribution Network website

Web Services

No Risk

Both Business and Social

214

CORAUDIN

Core Audience

Visiting websites that use Core Audience to generate ads

Web Services

No Risk

Both Business and Social

215

CORBA

CORBA

Common Object Request Broker Architecture (CORBA) is a standard defined by the Object Management Group (OMG) that enables software components written in multiple computer languages and running on multiple computers to work together (i.e., it supports multiple platforms). Domino Internet Inter-ORB Protocol (DIIOP) is CORBA over IIOP for Lotus Domino. DIIOP allows external programs to attach to, and manipulate Domino databases. DIIOP is frequently used to allow Java-based and other non CORBA programs to connect to Lotus Domino.

Networking

No Risk

Both Business and Social

216

CORERJD

corerjd

Protocol for service type corerjd registered with IANA on Port 284 tcp/udp

Networking

No Risk

Both Business and Social

217

COVIA

Covia CI

Covia Communications Integrator

Networking

No Risk

All Business

218

CPXINTAC

CPX Interactive

Visiting websites that use CPX Interactive to generate ads

Web Services

No Risk

Mostly Business

219

CR_LIST

CR List

Certificate Revocation List is a list of certificates that have been revoked

Networking

No Risk

Both Business and Social

220

CRAIGSLI

Craigslist

Popular online classifieds

Web Services

Minimal Risk

Mostly Social

221

CRITEO

Criteo

Visiting websites that use Criteo to generate ads

Web Services

No Risk

Mostly Business

222

CROWDSCI

Crowd Science

Visiting websites that use Crowd Science to generate ads

Web Services

Minimal Risk

Mostly Business

223

CRS

MS CRS

Port 507/tcp and 507/udp

Networking

No Risk

Both Business and Social

224

CSCODRP

Cisco DRP

(DRP) Director Response Protocol enables Cisco's DistributedDirector product to query routers (DRP Server Agents) in the field for Border Gateway Protocol (BGP) and Interior Gateway Protocol (IGP) routing table metrics between distributed servers and clients.

Networking

No Risk

All Business

225

CSCOGDP

Cisco GDP

The Gateway Discovery Protocol (GDP) allows hosts to dynamically detect the arrival of new routers as well as determine when a router goes down.

Networking

No Risk

All Business

226

CSCOSLA

Cisco SLA

Allows for delivery of time based network and services performance data used in monitoring Service Level Agreements (SLAs).

Network Monitoring

No Risk

Mostly Business

227

CSDN

Csdn.net

Traffic generated by browsing news articles on Chinese technology new site csdn.net

Web Services

No Risk

All Social

228

CSISGWP

CSISGWP

Port 348/tcp and 348/udp

Networking

No Risk

Both Business and Social

229

CSNETNS

CSNET-NS

CSNET Mailbox Nameserver

Networking

No Risk

Both Business and Social

230

CTF

CTF

DECnet-Plus Common Trace Facility is used to collect and display information about specific protocol exchanges between systems.

Network Monitoring

No Risk

Mostly Business

231

CTRXCGP

Citrix CGP

Citrix Common Gateway Protocol.

Remote Access

No Risk

All Business

232

CTRXGOTO

Citrix GoToMeeting Platform

Hosting GoToMeeting, or similar sessions based on the GoToMeeting platform. Includes voice, video, and limited crowd management functions.

Collaboration

Minimal Risk

Mostly Business

233

CTRXICA

Citrix ICA

ICA (Independent Computing Architecture) is a proprietary protocol for an application server system, designed by Citrix Systems.

Remote Access

No Risk

All Business

234

CTRXIMA

Citrix IMA

The Citrix IMA (Independent Management Architeture) protocol is used for server-to-server communication in performing functions such as licensing and server load updates, all of which occur behind the scenes.

Remote Access

No Risk

All Business

235

CTRXJEDI

Citrix Jedi

Citrix Online streaming connection protocol for streaming real time data.

Collaboration

Minimal Risk

Mostly Business

236

CTRXLIC

Citrix Licensing

Citrix Licensing traffic

Remote Access

No Risk

All Business

237

CTRXONLN

Citrix Online

Citrix Online services, including GoToMyPC, GoToMeeting, GoToWebinar, and GoToTraining.

Collaboration

Possible Misuse

Mostly Business

238

CTRXRTMP

Citrix RTMP

Citrix streaming

Remote Access

Minimal Risk

All Business

239

CTRXSLGW

Citrix SLG

Citrix SLG (Storage Link Gateway) enables automated discovery and one-click access to native storage services using any of the leading storage architectures and protocols, including DAS, NAS, SAN, iSCSI, and Fibre Channel.

Remote Access

No Risk

All Business

240

CVCHOSTD

CVCHOSTD

Port 442/tcp and 442/udp

Networking

No Risk

Both Business and Social

241

CXENSE

cXense

Visiting websites that use cXense to generate ads

Web Services

No Risk

Mostly Business

242

CYWORLD

Cyworld

General web traffic for cyworld.com.

Social Networking

Minimal Risk

All Social

243

DAILYM

Daily Mail

Traffic generated by browsing the articles and viewing media on British newspaper site dailymail.co.uk.

Web Services

Minimal Risk

All Social

244

DALYMOTN

Dailymotion

A video sharing service website.

Streaming Media

Data Leaks/ Malware

All Social

245

DASP

DASP

This protocol is designed to provide an unordered, reliable, secure session for full-duplex datagram exchange that can be implemented for low power wireless networks and low cost devices.

Networking

No Risk

Both Business and Social

246

DATALOGX

Datalogix

Visiting websites that use Datalogix to generate ads

Web Services

No Risk

Mostly Business

247

DATEITO

Datei.to

General browsing and file transfers from file hosting service Datei.to

File Transfer

Evades Detection/ Bypasses

Mostly Social

248

DATEXASN

DATEX-ASN

An application profile specification and uses protocols to address the Application Layer (Layer 7 of the OSI Reference Model), the Presentation Layer (Layer 6 of the OSI Reference Model) and defines the Session Layer (Layer 5 of the OSI Reference Model) as null.

Networking

No Risk

Both Business and Social

249

DAUM

Daum.net

Browsing, searching, and streaming media on Korean website daum.net

Web Services

No Risk

All Social

250

DAYTIME

Daytime

A service in the Internet Protocol Suite, defined in 1983 in RFC 867. It is intended for testing and measurement purposes in computer networks.

Network Monitoring

Evades Detection/ Bypasses

Mostly Social

251

DBASE

dBase

dBase was the first widely used database management system (DBMS) for microcomputers. A major upgrade was released as dBASE III, and ported to a wider variety of platforms, adding UNIX, and VMS.

Database

No Risk

Both Business and Social

252

DBLCLICK

Doubleclick

Visiting web pages that use Doubleclick to generate ads.

Web Services

No Risk

All Social

253

DCAP

DCAP

An application layer protocol used between workstations and routers to transport SNA/NetBIOS traffic over TCP sessions.

Networking

No Risk

Both Business and Social

254

DCCP

DCCP

DCCP (Datagram Congestion Control Protocol) is a transport protocol used for congestion control. Applications include Internet telephony and video/audio streaming.

Networking

No Risk

Both Business and Social

255

DCERPC

DCE/RPC

Distributed Computing Environment / Remote Procedure Calls, is the remote procedure call system developed for the Distributed Computing Environment (DCE).

Networking

No Risk

Mostly Business

256

DCINSIDE

dcinside.com

General browsing and interaction with Korean photography focused website dcinside.com

Web Services

No Risk

All Social

257

DCP

DCP

An application level protocol optimized for the integration, monitoring and control of devices on a network.

Network Monitoring

No Risk

Mostly Business

258

DCSTORM

DC Storm

Visiting websites that use DC Storm to generate ads

Web Services

No Risk

Mostly Business

259

DECAUTH

DEC Auth

DEC Auth

Networking

No Risk

Both Business and Social

260

DECDEBUG

DEC Debug

Decladebug is a source code debugger targeted at debugging software on the local machine or a remote Digital Unix box.

Networking

No Risk

Both Business and Social

261

DECVMS

DECVMS

Port 441/tcp and 441/udp

Networking

No Risk

Both Business and Social

262

DELICIUS

Delicious

General browsing and interaction with the social bookmarking website Delicious

Web Services

No Risk

All Social

263

DELL

Dell

Dell official site

Web Services

No Risk

Mostly Business

264

DENA

DeNA websites

Traffic generated by browsing DeNA Comm website and some other sites that belong to DeNA

Messaging

Data Leaks/ Malware

All Social

265

DEOS

DEOS

Port 76/tcp and 76/udp

Database

No Risk

Mostly Business

266

DEPOFILE

Deposit Files

Online file storage service

File Transfer

Data Leaks/ Malware

Both Business and Social

267

DEVNTART

DeviantART

General browsing, interaction, and shopping on online artwork community site deviantART

Web Services

No Risk

All Social

268

DHCP

DHCP

DHCP (Dynamic Host Configuration Protocol) is an auto configuration protocol used for assigning IP addresses.

Networking

No Risk

Mostly Business

269

DHCPV6

DHCPv6

DHCP (Dynamic Host Configuration Protocol) for IPv6

Networking

No Risk

Mostly Business

270

DIAMETER

Diameter

An authentication, authorization, and accounting protocol for computer networks.

Networking

No Risk

All Business

271

DICTION

Dictionary.com

Traffic generated by browsing articles and looking up definitions of words on dictionary.com.

Web Services

No Risk

Both Business and Social

272

DIGG

Digg

General browsing and interaction on social news website digg

Web Services

No Risk

Mostly Social

273

DIRECT

Direct

Direct

Networking

No Risk

Both Business and Social

274

DISCARD

Discard

A service in the Internet Protocol Suite defined in RFC 863. It is intended for testing, debugging, and measurement purposes.

Network Monitoring

No Risk

Mostly Social

275

DIVSHARE

divShare

General browsing and file transfers from media sharing website divShare

File Transfer

Possible Misuse

Both Business and Social

276

DIXIE

DIXIE

A lightweight Directory Assistance Protocol

Networking

No Risk

Mostly Social

277

DLS

DLS

DLS (Directory Location Service) provides information on the location(addresses) and protocols needed to access white pages name servers.

Networking

No Risk

Both Business and Social

278

DNACML

DNA-CML

Port 436/tcp and 436/udp

Networking

No Risk

Both Business and Social

279

DNS

DNS

Querying a DNS server over TCP or UDP.

Networking

Data Leaks/ Malware

Both Business and Social

280

DNSIX

DNSIX

Department of Defense Intelligence Information System Network Security for Information Exchange (DNSIX) is a collection of security requirements for networking defined by the U.S. Defense Intelligence Agency.

Networking

No Risk

Mostly Business

281

DOCSTOC

Docstoc

Electronic business document repository and online store

File Transfer

Minimal Risk

Mostly Business

282

DOMNTOOL

domaintools.com

Internet domain name intelligence service

Web Services

No Risk

Mostly Business

283

DOOF

doof

General browsing and streaming games from online gaming site doof.

Games

No Risk

All Social

284

DOTOMI

Dotomi

Visiting websites that use Dotomi to generate ads

Web Services

No Risk

Mostly Business

285

DPSI

DPSI

Desktop Paging Software, Inc.

Networking

Possible Misuse

Both Business and Social

286

DRAWBRDG

Drawbridge

Visiting websites that use Drawbridge to generate ads

Web Services

No Risk

Mostly Business

287

DRCTCONN

DirectConnect

File sharing through p2p via internet hubs

File Transfer

Minimal Risk

Mostly Social

288

DROPBOX

Dropbox

An online file hosting/sharing service.

File Transfer

Possible Misuse

Both Business and Social

289

DSFGW

DSFGW

Port 438/tcp and 438/udp

Networking

No Risk

Both Business and Social

290

DSP

DSP

Display Support Protocol

Networking

No Risk

Both Business and Social

291

DSP3270

DSP3270

Display Systems Protocol

Networking

No Risk

Both Business and Social

292

DSSETUP

DSSETUP

Microsoft Active Directory's Directory Services Setup.

Networking

No Risk

All Business

293

DTAG

DTAG

Deutsche Telekom AG (abbreviated DTAG) is a telecommunications company headquartered in Bonn, Germany. It is the largest telecommunications company in Europe.

Networking

No Risk

Both Business and Social

294

DTK

DTK

Deception Toolkit, A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities

Networking

No Risk

Both Business and Social

295

DYNAINTR

Dynamic Intranet

General browsing and interaction on intranet site Dynamic Intranet

Web Services

No Risk

Both Business and Social

296

DYNGATE

DynGate

A firewall router that allows TeamViewer to route a TCP/IP connection over an HTTP tunnel

VPN and Tunneling

No Risk

Mostly Business

297

DYNMILOG

Dynamic Logic

Visiting websites that use Dynamic Logic to generate ads

Web Services

No Risk

Mostly Business

298

EARTHCAM

EarthCam

General browsing and interaction on earthcam.com

Web Services

Minimal Risk

Mostly Social

299

EASTMONY

Eastmoney

General browsing and interaction on Chinese financial portal eastmoney.com

Web Services

Minimal Risk

Mostly Social

300

EBAY

eBay

An online auction and shopping website.

Web Services

No Risk

Mostly Social

301

EBUDDY

eBuddy

Browsing the eBuddy website, sending messages, using voice and video chat.

Messaging

Minimal Risk

Mostly Social

302

EBUDYXMS

eBuddy XMS

Sending messages using the eBuddy XMS application

Messaging

No Risk

Mostly Social

303

ECHO

Echo

A service in the Internet Protocol Suite defined in RFC 862. It was originally proposed for testing and measurement of round-trip times in IP networks.

Network Monitoring

Evades Detection/ Bypasses

Mostly Social

304

EDITGRID

Editgrid

General browsing and interaction with online spreadsheet site editgrid

Web Services

No Risk

Mostly Business

305

EDONKEY

eDonkey

eDonkey/eMule peer-to-peer file sharing.

File Transfer

Evades

Detection/ Bypasses

All Social

306

EFFECTMS

Effective Measure

Visiting web pages that use Effective Measure to generate ads.

Web Services

No Risk

Mostly Business

307

EGP

EGP

EGP (Exterior Gateway Protocol) is an obsolete routing protocol for the Internet.

Networking

No Risk

Both Business and Social

308

EHOW

eHow

General browsing, interaction, and watching videos on how-to instruction site eHow

Web Services

No Risk

Mostly Social

309

EMBLNDT

EMBLNDT

Port 394/tcp and 394/udp

Networking

No Risk

Both Business and Social

310

EMFIS

EMFIS

EMFIS Service

Networking

No Risk

Both Business and Social

311

ENETCN

enet.com.cn

A web portal for IT people in China

Web Services

No Risk

Mostly Business

312

ENGAGBDR

Engage BDR

Visiting web pages that use Engage BDR to generate ads

Web Services

No Risk

Mostly Business

313

ENOVANCE

eNovance

Visiting web pages that use eNovance to generate ads

Web Services

No Risk

Mostly Business

314

ENVATO

Envato

Envato is an Australian based, privately held company that provides tutorial sites that teach people skills in a variety of creative areas as well as providing a means to sell their digital goods via a family of online marketplaces.

Web Services

No Risk

Both Business and Social

315

EPMAP

Epmap

Microsoft EPMAP (End Point Mapper), also known as DCE/RPC Locator service, is used to remotely manage services.

Networking

Possible Misuse

All Business

316

EQADS

EQ Ads

Visiting webpages that use EQ Ads to generate ads

Web Services

No Risk

Mostly Business

317

ERPC

ERPC

Encore Expedited Remote Procedure Call

Remote Access

Data Leaks/ Malware

Both Business and Social

318

ESET

Eset

Eset Antivirus/ Security software download and updates.

File Transfer

No Risk

Mostly Business

319

ESPN

ESPN

Browsing sports news articles, watching highlight videos, and sports fantasy league participation on the American sports site ESPN.com and affiliated websites.

Web Services

No Risk

All Social

320

ESRO

ESRO

The Efficient Short Remote Operations service is a Remote Procedure Call service.

Networking

No Risk

Both Business and Social

321

ETAO

etao.com

Browsing links and searching with the site eato.com.

Web Services

Possible Misuse

Both Business and Social

322

ETOS

ETOS

Port 377/378/tcp and 377/378/udp

Networking

No Risk

Both Business and Social

323

ETSY

Etsy

General browsing, interaction, and shopping on e-commerce website Etsy

Web Services

No Risk

Both Business and Social

324

EVERNOTE

Evernote

Traffic generated via visiting the evernote website or syncing information from the applications to and from their cloud.

Web Services

Minimal Risk

Both Business and Social

325

EVIDON

Evidon

Visiting a website that uses Evidon to collect user analytics.

Web Services

No Risk

All Social

326

EVONY

Evony

General browsing, forum interaction, and game play of flash- based online gaming site Evony

Games

No Risk

All Social

327

EXCHAGOL

Exchange Online

Traffic associated with Exchange Online, such as visiting outlook.com.

Mail

No Risk

Mostly Business

328

EXCHANGE

Exchange

Microsoft Exchange services.

Mail

Minimal Risk

Mostly Business

329

EXELATE

eXelate Media

Visiting websites that use eXelate Media to generate ads.

Web Services

No Risk

All Social

330

EXPONINT

Exponential

Interactive

Visiting websites that use Exponential Interactive to generate ads.

Web Services

No Risk

Both Business and Social

331

EXTRTORR

Extratorrent.com

The World's Largest BitTorrent System

File Transfer

Evades Detection/ Bypasses

All Social

332

EYERETRN

eyeReturn

Visiting websites that use eyeReturn to collect user analytics.

Web Services

No Risk

Both Business and Social

333

FACEBOOK

Facebook

Facebook is a social networking service.

Social Networking

Evades Detection/ Bypasses

Mostly Social

334

FACETIME

FaceTime

Video conferencing between supported Apple mobile devices and Macintosh computers using the Facetime application

Streaming Media

Minimal Risk

Mostly Social

335

FARMVILE

Farmville

A real-time farm simulation game developed by Zynga, available as an application on the social-networking website Facebook and as an App on the Apple iPhone.

Games

No Risk

All Social

336

FASP

FASP

FASP (Fast and Secure Protocol) is a high speed secure file transfer protocol

File Transfer

Possible Misuse

Mostly Business

337

FATMEN

Fatmen

Port 347/tcp and 347/udp

Networking

No Risk

Both Business and Social

338

FB_EVENT

Facebook Event

Creating/editing Facebook events

Social Networking

Minimal Risk

Mostly Social

339

FB_MSGS

Facebook Messages

Facebook E-mail and Instant Messaging

Social Networking

Minimal Risk

Mostly Social

340

FB_POST

Facebook Post

Interactions with Facebook walls

Social Networking

Minimal Risk

Mostly Social

341

FB_SRCH

Facebook Search

Searching within Facebook's website

Social Networking

Minimal Risk

Mostly Social

342

FB_VDCHT

Facebook Video Chat

Facebook Video Chat

Social Networking

Possible Misuse

Mostly Social

343

FB_VIDEO

Facebook Video

Facebook streaming video and video upload

Social Networking

Possible Misuse

Mostly Social

344

FBOOKAPP

Facebook Apps

Add ons developed for Facebook, generally games, puzzles, gifts, classifieds etc.

Social Networking

Evades Detection/ Bypasses

Mostly Social

345

FC2

FC2.com

Traffic generated by browsing or using the services on fc2.com

Web Services

No Risk

Both Business and Social

346

FEDERATD

Federated Media

Visiting websites that use Federated Media to generate ad traffic.

Web Services

No Risk

Both Business and Social

347

FILEMAKR

FileMaker

A computer software company formed in 1998 from the vestiges of Claris as a wholly owned subsidiary of Apple Inc. FileMaker develops, supports and markets two relational database programs; FileMaker and Bento. Filemaker is available for both Mac OS X and Microsoft Windows operating systems and is aimed towards business use, or home users with high-end needs. Bento, aimed at the home user or basic small business user, is a Mac OS X application with additional versions available for the iPhone and iPad.

Networking

No Risk

Both Business and Social

348

FILERCX

Filer.cx

A file hosting service that provides free web space for documents, pictures, music and movies.

File Transfer

Data Leaks/ Malware

Mostly Social

349

FILESERV

FileServe

General browsing and file transfers from file hosting services FileServe.com

File Transfer

Evades Detection/ Bypasses

Both Business and Social

350

FILESONC

Filesonic

General browsing and file transfers from data storage website Filesonic

File Transfer

Possible Misuse

Both Business and Social

351

FILESTBE

FilesTube

A file search engine that searches various file sharing and uploading sites like rapidshare, megaupload, mediafire, hotfile, netload, filesonic, 4shared.

File Transfer

Possible Misuse

All Social

352

FINGER

Finger

A simple network protocol for the exchange of human-oriented status and user information.

Network Monitoring

Minimal Risk

Mostly Social

353

FIX

FIX

Communication between network devices using the FIX protocol.

Networking

No Risk

All Business

354

FLASH

Adobe Flash

Streaming videos, site and application interaction, using browser plugin Adobe Flash

Streaming Media

Minimal Risk

Both Business and Social

355

FLICKR

Flickr

An image hosting and video hosting website, web services suite, and online community.

Web Services

Possible Misuse

All Social

356

FLIXSTER

Flixster

A social movie site allowing users to share movie ratings, discover new movies and meet others with similar movie taste. The site has expanded to include a Facebook app, a MySpace app, and an app for Bebo and Orkut

Social Networking

Minimal Risk

All Social

357

FLURRY

Flurry

Data collection traffic of different mobile applications from the company Flurry, Inc.

Web Services

No Risk

Both Business and Social

358

FOGBUGZ

Fogbugz

FogCreek Software's online project management tool.

Web Services

No Risk

All Business

359

FORBES

Forbes

General browsing of business magazine website Forbes.com

Web Services

No Risk

Mostly Business

360

FOURSQR

foursquare

Check-ins, browsing, and searching on the mobile application or website foursquare.

Social Networking

No Risk

All Social

361

FOXNEWS

Fox News

Visiting the Fox News website and streaming videos.

Web Services

Minimal Risk

Both Business and Social

362

FOXSPORT

FOX Sports

General browsing and streaming videos from sports news site foxsports.com, and affiliated sites.

Web Services

Minimal Risk

Mostly Social

363

FPROT

F-Prot

F-Prot Antivirus/Security software download and updates.

File Transfer

No Risk

Mostly Business

364

FREEDIC

The Free Dictionary

Traffic generated by looking for word definitions, viewing articles, or playing games on thefreedictionary.com.

Web Services

No Risk

Both Business and Social

365

FREEETV

freeetv

General browsing and streaming media from TV website freeetv.com

Streaming Media

Data Leaks/ Malware

All Social

366

FREEFR

Free

General browsing on French Internet Service Provider website Free.fr

Web Services

No Risk

All Social

367

FREEGATE

Freegate

Browsing the internet via the Freegate proxy application.

Proxy

Data Leaks/ Malware

Mostly Social

368

FREENET

Freenet

Traffic generated by the freenet browsing application.

File Transfer

Evades Detection/ Bypasses

Both Business and Social

369

FREWHEEL

Freewheel Media

Visiting websites that use Freewheel Media to generate ads.

Web Services

No Risk

Both Business and Social

370

FRING

Fring

Control and messaging flow traffic for mobile messaging application Fring

Messaging

Possible Misuse

Both Business and Social

371

FRINGAV

Fring A/V

Audio and video flow traffic for mobile messaging application Fring

Streaming Media

Data Leaks/ Malware

Both Business and Social

372

FRLANCER

Freelancer

Browsing and posting on the Freelancer website.

Web Services

Minimal Risk

All Business

373

FRNDFEED

FriendFeed

FriendFeed is a real-time feed aggregator from social media sites.

Social Networking

Minimal Risk

Mostly Social

374

FRNDSTER

Friendster

Friendster is a social networking service.

Social Networking

Possible Misuse

All Social

375

FTP

FTP

FTP (File Transfer Protocol) is used to transfer files from a file server to a local machine.

File Transfer

Possible Misuse

Both Business and Social

376

FTPCTRL

FTP Control

FTP (File Transfer Protocol) Control is used to manage FTP Data transfers from a file server to a local machine.

File Transfer

Possible Misuse

Both Business and Social

377

FTPDATA

FTP Data

File Transfer Protocol data flow

File Transfer

Possible Misuse

Both Business and Social

378

FTPS

FTPS

FTP control over TLS/SSL.

File Transfer

Possible Misuse

Both Business and Social

379

FTPSDATA

FTPSDATA

FTP data over TLS/SSL

File Transfer

Possible Misuse

Both Business and Social

380

FUNSHION

Funshion

Browsing Funshion videos, shopping, and online games.

Web Services

No Risk

All Social

381

FUNSHVID

Funshion Video

Streaming movies, TV, and live video streams from Funshion website.

Streaming Media

Minimal Risk

All Social

382

FXP

FXP

File eXchange Protocol provides a method of data transfer which uses the FTP protocol to transfer data from one remote server to another (inter-server) without routing this data through the client's connection.

File Transfer

No Risk

Both Business and Social

383

GACP

GACP

Gateway Access Control Protocol

Networking

No Risk

Mostly Business

384

GANJI

Ganji

Classified ad and media traffic generated by browsing ganji.com.

Web Services

No Risk

All Social

385

GCM

Google Cloud

Messaging

An Android client application retrieving messages sent to it by its server through the Google Cloud Messaging service.

Web Services

No Risk

Both Business and Social

386

GENIE

Genie

An old network management/diagnostic protocol,

Networking

No Risk

Both Business and Social

387

GENRAD

GENRAD

Protocol for service type GENRAD-MUX registered with IANA on Port 176 tcp/udp

Networking

No Risk

Both Business and Social

388

GIGANEWS

Giganews

A popular Usenet/newsgroup service provider.

File Transfer

Data Leaks/ Malware

All Social

389

GIST

GIST

General Internet Signalling Transport

Networking

No Risk

Both Business and Social

390

GLYPEPRX

GlypeProxy

Glype Proxy is a free web-based proxy script written in PHP.

Proxy

Possible Misuse

All Social

391

GMAIL

gmail

Logging in and sending/receiving emails on Google's web email service Gmail.

Mail

No Risk

Both Business and Social

392

GNUTELLA

Gnutella

A large peer-to-peer file-sharing network.

File Transfer

Evades Detection/ Bypasses

All Social

393

GOAL

goal.com

General browsing, interaction and streaming videos from international soccer news website goal.com.

Web Services

Minimal Risk

Mostly Social

394

GOGOBOX

GoGoBox

Browsing, using the online store, and playing online games on the website gogobox.com

Web Services

No Risk

All Social

395

GOMREMOT

GOM Remote

Using mobile application to remotely control PC applications GOM Audio and GOM Media Player

Remote Access

Data Leaks/ Malware

Mostly Social

396

GOMTVCOM

GOMTV.com

General browsing, interaction, and streaming media on Korean streaming media site GOMTV.com

Streaming Media

Data Leaks/ Malware

Mostly Social

397

GOMTVNET

GOMTV.net

General browsing, watching videos, and league and player stat tracking on Korean e-sports site GOMTV.net

Streaming Media

Data Leaks/ Malware

Mostly Social

398

GOOGADS

Google Ads

Visiting websites that use Google Ads to generate user specific advertisements.

Web Services

No Risk

Both Business and Social

399

GOOGANAL

Google Analytics

Google service that tracks and generates details web statistics.

Web Services

No Risk

Mostly Business

400

GOOGAPIS

Google APIs

Google Application Programming Interfaces that support the development of web applications that leverage Google services.

Web Services

No Risk

Both Business and Social

401

GOOGAPP

Google App Engine

Google App Engine lets you run your web applications using Google's infrastructure.

Web Services

No Risk

Both Business and Social

402

GOOGCNDR

Google Calendar

A free time-management web application offered by Google.

Web Services

No Risk

Mostly Business

403

GOOGDESK

Google Desktop

Google's Desktop search and desktop gadget software.

Web Services

Minimal Risk

Both Business and Social

404

GOOGDOCS

Google Drive

Loading and editing files on Google's word processing and document storage site Google Drive.

Web Services

No Risk

Mostly Business

405

GOOGERTH

Google Earth

Search locations for maps, topography, and first person views on Google's global mapping application Google Earth

Web Services

Minimal Risk

Mostly Social

406

GOOGLBT

Googlebot

Googlebot Web Crawler

Web Services

No Risk

Both Business and Social

407

GOOGLE

Google

Internet searching on Google's search engine site google.com (or international equivalent) and/or encrypted traffic from other Google services.

Web Services

No Risk

Both Business and Social

408

GOOGMAPS

Google Maps

Browsing and searching locations and getting directions on Google's online mapping service Google Maps

Web Services

No Risk

Both Business and Social

409

GOOGPLAY

Google Play

Downloading apps, music, movies, TV shows, books on Android phone application store Google Play

Web Services

No Risk

Both Business and Social

410

GOOGPLUS

Google +

Connecting to friends, posting messages, pictures, and videos, newsfeeds and game play on Google's social networking service Google +

Social Networking

Minimal Risk

All Social

411

GOOGSAFE

Google Safe Browsing

Google service that protects users from known phishing and malware sites

Web Services

No Risk

Both Business and Social

412

GOOGTRAN

Google Translate

Translating websites and selected text on Google's translation service Google Translate.

Web Services

No Risk

Both Business and Social

413

GOOGVIDO

Google Video

A free video sharing website and also a video search engine from Google Inc.

Streaming Media

Minimal Risk

Mostly Social

414

GOONEJP

goo.ne.jp

goo.ne.jp is a Japanese web portal

Web Services

No Risk

Mostly Social

415

GOPHER

Gopher

A TCP/IP Application layer protocol designed for distributing, searching, and retrieving documents over the Internet.

Web Services

No Risk

Mostly Social

416

GOTOMEET

GoToMeeting

Using features of the GoToMeeting platform specific to GoToMeeting alone. Scheduling meetings, account management, and starting the GoToMeeting-specific client through the web.

Collaboration

Minimal Risk

Mostly Business

417

GOTOMYPC

Citrix GoToMyPC

Using GoToMyPC to remotely control a PC that has the hosting software installed.

Collaboration

Minimal Risk

Mostly Business

418

GOTOTRNG

Citrix GoToTraining

Using GoToTraining-specific features of the GoToMeeting platform within a GoToTraining session, including participant testing and course-material sharing.

Collaboration

Minimal Risk

Mostly Business

419

GOTOWBNR

Citrix GoToWebinar

Using GoToWebinar-specific features of the GoToMeeting platform within a GoToWebinar session, including Q&A, Panel management, and crowd management functions.

Collaboration

Minimal Risk

Mostly Business

420

GPFS

GPFS

IBM General Parallel File System is a high-performance shared- disk clustered file system.

File Transfer

No Risk

All Business

421

GPITNP

Genesis PPP

Genesis Point-to-Point Trans Net

Networking

No Risk

Both Business and Social

422

GRE

GRE

GRE (Generic Route Encapsulation Protocol) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocol packet types inside IP tunnels, creating a virtual point-to-point link to various brands of routers at remote points over an Internet Protocol (IP) internetwork.

VPN and Tunneling

No Risk

Both Business and Social

423

GROUPON

Groupon

General browsing and use of the features of the coupon deal website Groupon

Web Services

No Risk

Both Business and Social

424

GRPWISE

Groupwise

A messaging and collaborative software platform from Novell that supports email, calendaring, personal information management, instant messaging, and document management.

Collaboration

No Risk

All Business

425

GRVSHRK

Grooveshark

Online music search engine and streaming service

Streaming Media

Minimal Risk

All Social

426

GSIFTP

GSIFTP

FTP enhanced to use GSI security.

File Transfer

Possible Misuse

Mostly Business

427

GSSLIC

Gss License

Gss X License Verification

Networking

No Risk

Both Business and Social

428

GTALK

Google Talk

Sending audio and video files, voice and text messaging with Google's messaging service Google Talk.

Messaging

Minimal Risk

Mostly Social

429

GTALKAUD

Google Talk Audio

Making an audio call or message using Google's messaging service Google Talk.

Streaming Media

Minimal Risk

Both Business and Social

430

GTALKFIL

Google Talk File Transfer

Sending a file over Google's messaging service Google Talk.

File Transfer

Possible Misuse

Both Business and Social

431

GTALKGAD

Google Talk Gadget

Flash based Google Talk IM client.

Messaging

Minimal Risk

Mostly Social

432

GTALKVID

Google Talk Video

Making a video call using Google Talk or Google Talk mobile.

Streaming Media

Minimal Risk

Both Business and Social

433

GTP_C

GPRS Tunneling Protocol Control

Protocol used within the GPRS core network for signaling between gateway and serving GPRS support nodes. It allows session activation, deactivation, adjustment of quality of service parameters, and session updates to check for new subscribers.

Networking

No Risk

Both Business and Social

434

GTP_P

GPRS Tunneling Protocol Prime

GTP protocol used for carrying charging data from the charging data function to the charging gateway function. Generally, from many individual network elements to a centralized computer that delivers the charging data to the network operator's billing centre.

Networking

No Risk

Both Business and Social

435

GTP_U

GPRS Tunneling Protocol User

Protocol used for carrying user data with the GPRS core network and between the radio access network and the core network.

Networking

No Risk

Both Business and Social

436

GUARDIAN

the guardian

General browsing and streaming audio and video from British new website the guardian

Web Services

Minimal Risk

Mostly Social

437

H225

H.225

In the family of H.323 VoIP protocols

Streaming Media

No Risk

Both Business and Social

438

H245

H.245

H.245 is a control channel protocol used with[in] e.g. H.323 and H.324 communication sessions.

Streaming Media

No Risk

Both Business and Social

439

H248

H.248

Megaco (officially H.248) is an implementation of the Media Gateway Control Protocol architecture for controlling VoIP gateways.

Streaming Media

Possible Misuse

Both Business and Social

440

H323

H.323

H.323 VoIP call signalling and control

Streaming Media

No Risk

Both Business and Social

441

HAMACHI

Hamachi

A hosted VPN service that lets you securely extend LAN-like networks to distributed teams.

VPN and Tunneling

Evades Detection/ Bypasses

Both Business and Social

442

HAO123

Hao123.com

Traffic generated by performing web searches on hao123.com.

Web Services

No Risk

Mostly Social

443

HASSLE

Hassle

HASSLE is a networking application that allows to execute remote jobs that have a transfer component built in. HASSLE is flexible as it only transfers the data and the parameters. The execution at the remote site is automatically accomplished via a code generator.

Networking

No Risk

Both Business and Social

444

HBCI

FinTS

A bank-independent protocol developed for online banking in the European market, used by German banks. Formerly HBCI (Home Banking Computer Interface)

Networking

No Risk

All Business

445

HDAP

HDAP

Microsoft HDA Protocol

Networking

No Risk

Both Business and Social

446

HEMS

HEMS

HEMS protocol

Networking

No Risk

Both Business and Social

447

HI5

hi5

General browsing and interaction with social gaming website hi5.com

Social Networking

Minimal Risk

All Social

448

HIVESTOR

HiveStor

HiveStor Distributed File System

File Transfer

No Risk

Mostly Social

449

HL7

HL7

Health Level 7 Medical information exchange is a standard for exchanging information between medical applications.

Collaboration

No Risk

All Business

450

HOOTSUIT

HootSuite

General browsing and interaction on the social media management website HootSuite

Web Services

Minimal Risk

Both Business and Social

451

HOPSTER

Hopster

An application that tunnels other applications in order to bypass firewalls.

Proxy

Possible Misuse

All Social

452

HOSTNAME

Hostname

NIC Host Name Server

Networking

No Risk

Both Business and Social

453

HOTFILE

Hotfile

Online file hosting/sharing.

File Transfer

Evades Detection/ Bypasses

All Social

454

HOTSPTSH

Hotspot Shield

The setup and running of a vpn tunnel using Hotspot Shield's application on PC, Android, or iPhone.

VPN and Tunneling

Minimal Risk

Both Business and Social

455

HOWARDFM

HowardForums

Visiting and browsing the Howard Forums website.

Web Services

No Risk

Mostly Social

456

HP

HP Website

HP.com offers company news and information on Hewlett-Packard

Web Services

No Risk

Mostly Business

457

HPPERF

HP Perf

The Performance Data Collector for HP OpenVMS (TDC) gathers performance data for OpenVMS systems. By default, TDC periodically collects and stores data in a file. Subsequently, user applications can retrieve and analyze data from the file.

Networking

No Risk

Both Business and Social

458

HPVMM

HP VMM

HP Virtual Machine Manager (VMM)

Remote Access

No Risk

All Business

459

HTTPMGT

HTTPMGT

Protocol for service type http-mgmt registered with IANA on Port 280 tcp/udp

Networking

No Risk

Both Business and Social

460

HTTPTNNL

HTTP Tunnel

HTTP traffic which has been tunnelled using the CONNECT method.

Web Services

No Risk

Both Business and Social

461

HUBPAGES

HubPages

Visiting and browsing the HubPages website.

Web Services

Minimal Risk

Both Business and Social

462

HULU

Hulu

Hulu online video streaming.

Streaming Media

Minimal Risk

All Social

463

HUPU

hupu.com

General browsing and streaming media from the sports news website Hupu.com

Web Services

No Risk

Mostly Social

464

HUSHMAIL

Hushmail.com

Browsing, logon, and emailing on webmail site Hushmail.com

Mail

Minimal Risk

Both Business and Social

465

HYPERG

Hyper-G

A publishing system with hypertext features more advanced than those available with the Hypertext Transfer Protocol and today's Web browser.

Networking

No Risk

Both Business and Social

466

HYVES

Hyves

General browsing and interaction on the Dutch social media website Hyves.

Social Networking

No Risk

All Social

467

IASD

IASD

Port 432/tcp and 432/udp

Networking

No Risk

Both Business and Social

468

IBM

IBM

Website for International Business Machines corporation

Web Services

No Risk

Mostly Business

469

IBMAPP

IBM APP

Protocol for service type IBM Application registered with IANA on Port 385 tcp/udp

Networking

No Risk

Both Business and Social

470

IBMOPC

IBM OPC

OPC automatically plans, controls, and monitors your production workload to maximize and optimize throughput, but lets you intervene manually when required.

Networking

No Risk

Both Business and Social

471

ICAD

ICAD

This was a Knowledge-Based Engineering (KBE) system that was based upon the Lisp programming language. ICAD had an open architecture that can utilize all the power and flexibility of the underlying language.

Networking

No Risk

Both Business and Social

472

ICALL

iCall

Sending messages, voice or video chat, and mobile to landline phone calls with messaging application iCall.

Messaging

Minimal Risk

Mostly Social

473

ICLOUD

iCloud

Apple's cloud data storage and computing service

File Transfer

Possible Misuse

Both Business and Social

474

ICP

ICP

Intelligent Communication Protocol, IANA port 1112/tcp and 1112/udp

Networking

No Risk

Both Business and Social

475

ICQ

ICQ

ICQ is an instant messaging computer program.

Messaging

Evades Detection/ Bypasses

Both Business and Social

476

IDENT

Ident

Ident is a protocol that helps identify the user of a particular TCP connection.

Networking

Evades Detection/ Bypasses

Mostly Social

477

IDP

IDP

IDP (Internet Datagram Protocol) is a close descendant of PUP's internetwork protocol, and roughly corresponds to the Internet Protocol (IP) layer in TCP/IP.

Networking

No Risk

Both Business and Social

478

IFENG

Ifeng.com

Traffic generated from reading articles and viewing media on ifeng.com.

Web Services

No Risk

Both Business and Social

479

IFILE

ifile.it

General browsing and file transfers from online backup service ifile.it

File Transfer

Evades Detection/ Bypasses

Both Business and Social

480

IGN

IGN

Browsing and watching videos on the IGN website.

Web Services

Minimal Risk

All Social

481

IKEA

IKEA

General browsing and merchandise purchasing from online store Ikea.com

Web Services

No Risk

Both Business and Social

482

IMAP

IMAP

IMAP (Internet Message Access Protocol) is an Internet standard protocol for accessing email on a remote server.

Mail

Evades

Detection/ Bypasses

Both Business and Social

483

IMDB

IMDb

General browsing and interaction on the IMDb website.

Web Services

No Risk

Mostly Social

484

IMESH

iMesh

A media and file sharing client with online social network features.

File Transfer

Evades Detection/ Bypasses

All Social

485

IMGAMES

IMGames

Protocol for service type IMGames registered with IANA on Port 1077 tcp/udp

Games

No Risk

Both Business and Social

486

IMGSHACK

ImageShack

General browsing and file transfers from image hosting website ImageShack

File Transfer

Minimal Risk

Both Business and Social

487

IMGUR

Imgur

Photo sharing web site

Web Services

Minimal Risk

Mostly Social

488

IMGVENUE

Image Venue

Free Image Hosting for bloggers, message board users, and eBay sellers.

Web Services

No Risk

Both Business and Social

489

IMO

imo.im

Text and voice IM through instant messenger service imo.im

Messaging

Data Leaks/ Malware

All Social

490

IMPRVDIG

Improve Digital

Visiting a website that uses Improve Digital to display ads.

Web Services

No Risk

All Social

491

IMSP

IMSP

Port 406/tcp and 406/udp

Networking

No Risk

Both Business and Social

492

INBSNESS

InBusiness

TCP Port 244 was used to connect to the administrative functions on the Dayna Communications InBusiness line of small office network equipment.

Networking

No Risk

Both Business and Social

493

INCOM

In.com

General browsing and interaction on Indian web portal In.com

Web Services

Minimal Risk

All Social

494

INFONLNE

Infonline

Visiting websites that use IVWbox to generate ads and collect information about users visiting that website.

Web Services

No Risk

All Social

495

INFOSEEK

InfoSeek

This was a very popular search engine originally operated by the Infoseek Corporation. Infoseek was bought by The Walt Disney Company in 1998, and the technology was merged with that of the Disney-acquired Starwave to form the Go.com network. Since then it has been replaced with Yahoo! search and is no longer in use.

Web Services

No Risk

Both Business and Social

496

INFOSTOR

Infostore

Microsoft Exchange Information Store

Mail

No Risk

All Business

497

INGRSNET

INGRES-NET

IngresNET service

Database

No Risk

Mostly Business

498

INNOVATI

Innovation Interactive

Visiting websites that use Innovation Interactive to generate ads or collect information about users.

Web Services

No Risk

All Social

499

INSKIN

Inskin Media

Visiting websites that use Inskin Media to generate ad traffic and gather user metrics.

Web Services

No Risk

Both Business and Social

500

INSTAGRM

Instagram

Using Instagram to view and share pictures and videos on social media platforms.

Social Networking

No Risk

All Social

501

INSTAIMG

Instagram Images

Viewing images with the Instagram application.

Web Services

No Risk

Mostly Social

502

INSTAVID

Instagram Video

Streaming videos with the Instagram application.

Streaming Media

Minimal Risk

Mostly Social

503

INTEGLAD

Integral Ad Science

Browsing a website that uses Integral Ad Science to generate ad traffic and gather user metrics.

Web Services

No Risk

Both Business and Social

504

INTERCLK

InterClick

Visiting websites that use InterClick to generate ad traffic.

Web Services

No Risk

Both Business and Social

505

IPCOMP

IPComp

IPComp (IP Payload Compression Protocol) is a low level compression protocol for IP datagrams defined in RFC 3173.

VPN and Tunneling

No Risk

Both Business and Social

506

IPERCEPT

IPerceptions

Visiting a website which uses IPerceptions to collect user information.

Web Services

No Risk

All Social

507

IPIP

IPIP

An IP tunneling protocol that encapsulates one IP packet in another IP packet.

VPN and Tunneling

No Risk

Both Business and Social

508

IPLAYER

BBC iPlayer

In-stream video and audio traffic from a television application developed by BBC

Streaming Media

Possible Misuse

All Social

509

IPSEC

IPsec

IPsec (Internet Protocol Security) is an end-to-end security scheme commonly used for VPNs.

VPN and Tunneling

Minimal Risk

Mostly Business

510

IRC

IRC

IRC (Internet Relay Chat) is a popular form of real-time Internet text messaging.

Messaging

Minimal Risk

Both Business and Social

511

IS99

IS-99

Port 379/380/tcp and 379/380/udp

Networking

No Risk

Both Business and Social

512

ISAKMP

ISAKMP

A protocol defined by RFC 2408 for establishing Security Associations (SA) and cryptographic keys in an Internet environment. ISAKMP only provides a framework for authentication and key exchange and is designed to be key exchange independent

Networking

No Risk

Both Business and Social

513

ISCHAT

ISCHAT

(Now known as ATG Live Help) ATG Live Help is an integrated set of live voice, chat, and email response services that enable online businesses to deliver just-in-time, personalized, interactive assistance to each visitor.

Messaging

No Risk

All Business

514

ISIGL

ISI Graphics

ISI Graphics Language

Networking

No Risk

Mostly Business

515

ISOIP

ISOIP

ISO Internetworking Protocol

Networking

Possible Misuse

Both Business and Social

516

ISOTSAP

ISO-TSAP

ISO-TSAP

Networking

No Risk

Both Business and Social

517

ISTOCKPT

iStockPhoto

Traffic generated by browsing or purchasing images on istockphoto.com.

Web Services

No Risk

Mostly Business

518

IT168

IT168.com

General browsing of the Chinese social media site IT168.com

Web Services

Minimal Risk

Mostly Social

519

ITUNES

iTunes

Apple's media player and online store.

Streaming Media

Minimal Risk

All Social

520

IVPIP

mck-ivpip

MCK, now Citel's VoIP extender ipvip protocol.

Streaming Media

No Risk

All Business

521

JANGO

Jango

Browsing and streaming music from the Jango website.

Streaming Media

Minimal Risk

All Social

522

JARGON

JARGON

Jargon protocol

Networking

No Risk

Both Business and Social

523

JAVARMI

Java RMI

A Java application programming interface that performs the object-oriented equivalent of remote procedure calls (RPC).

Networking

No Risk

Both Business and Social

524

JAVAUPDT

Java Update

Updating the Java Runtime Environment

Web Services

Data Leaks/ Malware

Both Business and Social

525

JONDO

Jondo

Browsing the JonDo website and browsing the internet while being connected via JonDo proxy servers.

Proxy

Possible Misuse

Both Business and Social

526

KAIXIN

Kaixin

Browsing the Kaixin social media website.

Social Networking

No Risk

All Social

527

KAKAO

Kakao

The Kakao Talk application being used to participate in chat, add friends, share media with friends, or make calls.

Messaging

Possible Misuse

Mostly Social

528

KAKAOAUD

Kakao Audio

The Kakao Talk application being used to make calls.

Messaging

Possible Misuse

Mostly Social

529

KASPRSKY

Kaspersky

Kaspersky Antivirus/Security software download and updates.

File Transfer

No Risk

Mostly Business

530

KATORRNT

KAT

A torrent download site

File Transfer

Evades Detection/ Bypasses

All Social

531

KAZAA

Kazaa

Started as a peer-to-peer file sharing application using the FastTrack protocol, now running as a music subscription service.

File Transfer

Evades Detection/ Bypasses

All Social

532

KBLOCK

Kblock

K-Block protects unattended logged-in terminals from unauthorized access in OpenVMS environments.

Networking

No Risk

Both Business and Social

533

KERBEROS

Kerberos

Kerberos is a network authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography.

Networking

No Risk

Mostly Business

534

KFTP

KFTP

File Transfer Protocol with Kerberos authentication and encryption.

File Transfer

Possible Misuse

Both Business and Social

535

KFTPDATA

KFTPDATA

File Transfer Protocol with Kerberos authentication and encryption.

File Transfer

Possible Misuse

Both Business and Social

536

KIS

KIS

Protocol for service type KIS Protocol registered with IANA on Port 186 tcp/udp

Networking

No Risk

Both Business and Social

537

KNETCMP

KNETCMP

KNET/VM Command/Message Protocol

Networking

No Risk

Both Business and Social

538

KOMLI

Komli

Visiting a website that uses Komli to generate ads.

Web Services

No Risk

All Social

539

KOOLIM

Kool IM

General browsing, interaction, and chatting on the web messaging site Kool IM.

Messaging

No Risk

Mostly Social

540

KOOORA