The references on that page are explaining that Solo is known to use TCP port 5010, which is officially reserved for the TelepathStart protocol, and ditto for TCP 5011. If you look thru that list you'll see that lots of malware uses ports that are reserved for other services.
TelepathStart and TelepathAttack are properly listed with IANA as using those ports, so I would expect them to be benign, although I've drawn a bit of a blank as to what those protocols actually are.
Let's look at port 5011investigate what runs on those ports. IANA writes:
- Ports: 5010 / 5011
- Service namenames: telelpathstart / telelpathattack
- DescriptionDescriptions: TelepathStart / TelepathAttack
- Assignee: Helmuth Breitenfellner
I suppose the contact's email address was hbreitenf@vnet.ibm.com at the time.
A Google search for [ helmuth breitenfellner telepath ] leads us to discover that Helmuth Breitenfellner "ported networkingported the code of the messaging platform (TelePath) forof IBM FlowMark"FlowMark (a workflow-management system) "toto AIX RS6000"RS6000.
Sandy Kemsley writes that FlowMark was later rebranded as MQSeries Workflow, and is now WebSphere MQ Workflow.
How comeIs your box is running this protocolWebSphere MQ Workflow?
ThreeIf not, then here are three thoughts:
- Today is a good day to run some malware scans.
- You might want to poke at nmap's options a little, and see how much confidence it's service detection has about what's listening on those ports. Maybe use
--version-intensity 9
, for example. - You could also try the old sysadmin trick of blocking it, and seeing what breaks.