TCP & UDP Port 22 Information

Port 22 common errors:Account forgery, data mining through internal network data scans, and wireless internet connection manipulation can be done by attackers through port 22 via the exploitation of this network port's vulnerabilities. To learn more about errors in your system run a free registry scan.
Services or applications using this port:SSH and Pcanywherestat default port and server
Malicious services / applications:The manipulation of a system's wireless internet connectivity can be facilitated by remote users through port 22.

Port 22 details:

Protocol: TCP & UDP
IAMA status: Official
Range: Registered
Traffic: outbound
Notification: True
Free registry scan
Select your operating system: Start Free Scan More info

Technical description for port 22:

Port 22 is monitored by SSH servers as their default procedure. Public-key cryptographic processes are utilized by SSH servers for the validation of remote computers. This in turn provides access to users after remote computers have authenticated user profiles because user validation is sometimes necessary. Remote computer logins and command execution processes are also facilitated by SSH servers through port 22. However, such SSH servers also provide support for the capability of forwarding and tunneling X11 connections or TCP network ports like port 22. This means file transmissions are conducted by SSH servers via embedded SCP or SFTP protocols associated with similar network ports. The client-server model is utilized by SSH servers. The typical utility of SSH client applications is for the capability of establishing SSH daemon connections configured to accept data transmissions to and from remote computers. Most operating systems today such as Mac OS X, FreeBSD, Linux, OpenVMS, and Solaris among other proprietary, open source, and freeware systems come bundled with such functionality.
Uniblue Systems Microsoft Certified Partner
Uniblue Systems Ltd has achieved the prestigious Microsoft Gold Certified Partner Status, in recognition of its expertise, excellence and consistency in the delivery of system performance, security and stability software.