Vulnerable Ports: SG Ports Database Security Scanner Email Us Security Forum
Vulnerable Ports: SG Ports Database Security Scanner Email Us Security Forum
php
Search site
Vulnerable Ports
This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security
Scanner, and corresponding potential security threats. We update the list on a regular basis, however if you feel
we should add other port(s) to the list or modify their descriptions, please email us. Any feedback and
suggestions can also be posted to our Security forum.
1 | 2 | 3 | 4 | 5 | 6 |....| 55
Sockets des Troie remote access trojan uses this port (a.k.a.
Backdoor.Sockets23, Lame, Backdoor.Kamikaze, IRC_trojan,
TROJ_Backdoor, W32/Cheval.gen, coded in Delphi 3, 06.1998). It might
also use ports 1/udp, 5000, 5001, 30303, 50505, 60000 and 65000.
1 tcp tcpmux Premium scan
Scans against this port are commonly used to test if a machine runs SGI
Irix (as SGI is the only system that typically has this enabled). This
service is almost never used in practice.
1 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
builtins.c in Xinetd before 2.3.15 does not check the service type when
the tcpmux-server service is enabled, which exposes all enabled
services and allows remote attackers to bypass intended access
restrictions via a request to tcpmux port 1 (TCP/UDP).
References: [CVE-2012-0862] [BID-53720] [OSVDB-81774]
2 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
FAQs global file system with completely decentralized control. SFS uses NFS
Glossary 3 as the underlying protocol for file access.
SG Broadband Tools
SG IP Locator America's Army also uses this port.
SG Network Tools
Midnight Commander sometimes uses port 4/tcp as well.
SG Security Scan
SG Speed Test 5 tcp trojans Premium scan
Incoming Routing Redirect Bomb, yoyo
TCP/IP Analyzer 7 tcp Echo Members scan
Echo Service, somewhat outdated by ICMP echo. Port just echoes
TCP/IP Optimizer whatever is sent to it. This feature can be used in many attacks, such as
Smurf/Fraggle.
3 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
4 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
Some trojans also use this port: Amanda, Senna Spy FTP server.
21 tcp FTP Basic scan
File Transfer Protocol [RFC 959] - some network devices may be
listening on this port, such as NAT routers for remote access/private
cloud storage and network attached multi-function printers (scan to ftp
feature).
Asus RT routers may open an internet accessible FTP server for USB-
attached storage, configurable in administration panel under "USB
Application > Servers Center > FTP Share"
Trojan horses/backdoors that also use this port: 7tp trojan, MBT, Back
Construction, Blade Runner, Cattivik FTP Server, CC Invader, Dark FTP,
Doly Trojan, Fore, Invisible FTP, Juggernaut 42, Larva, MotIv FTP, Nerte
7.8.1, Net Administrator, Ramen, Senna Spy FTP server, The Flu,
5 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
The FTP service in QNAP iArtist Lite before 1.4.54, as distributed with
QNAP Signage Station before 2.0.1, has hardcoded credentials, which
makes it easier for remote attackers to obtain access via a session on
TCP port 21.
References: [CVE-2015-7261]
The FTP service on Janitza UMG 508, 509, 511, 604, and 605 devices
has a default password, which makes it easier for remote attackers to
read or write to files via a session on TCP port 21.
References: [CVE-2015-3968]
6 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
Old verson of pcAnywhere uses port 22/udp (no relation to ssh and port
22/tcp).
The real pcAnywhere port is 5632. The value 0x0016 (hex) is 22
7 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
decimal; the value of 0x1600 (hex) is 5632 decimal. Some say that
pcAnywhere had a byte-swapping bug that led to its incorrect use of port
22.
22 tcp,sctp SSH Basic scan
Secure Shell - most common use is command line access, secure
replacement of Telnet. Could also be used as an encrypted tunnel for
secure communication of virtually any service [RFC 4251], [RFC 4960]
8 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
9 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
attacker with network access to port 22/tcp and valid low-privileged user
credentials for the target device could perform a privilege escalation and
gain root privileges. Successful exploitation requires user privileges of a
low-privileged user but no user interaction. The vulnerability could allow
an attacker to compromise confidentiality, integrity and availability of the
system.
References: [CVE-2018-13801], [BID-105545]
An issue was discovered in Valve Steam Link build 643. When the SSH
daemon is enabled for local development, the device is publicly available
via IPv6 TCP port 22 over the internet (with stateless address
autoconfiguration) by default, which makes it easier for remote attackers
to obtain access by guessing 24 bits of the MAC address and attempting
a root login. This can be exploited in conjunction with CVE-2017-17878.
References: [CVE-2017-17877]
10 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
Trojans that also use this port: Prosiak, Wingate, ADM worm, Aphex's
Remote Packet Sniffer , AutoSpY, ButtMan, Fire HacKer, My Very Own
trojan, Pest, RTB 666, Tiny Telnet Server - TTS, Truva Atl,
Backdoor.Delf variants [Symantec-2003-050207-0707-99],
Backdoor.Dagonit [Symantec-2005-092616-0858-99] (2005.09.26)
11 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
Hospira Lifecare PCA infusion pump running "SW ver 412" does not
require authentication for Telnet sessions, which allows remote attackers
to gain root privileges via TCP port 23.
References: [CVE-2015-3459]
Telestar Digital GmbH Imperial and Dabman Series I and D could allow
a remote attacker to gain elevated privileges on the system, caused by
the use of weak passwords with hardcoded credentials in an
undocumented Telnet service (Telnetd) that connects to Port 23. A
remote attacker could exploit this vulnerability to gain root access to the
gadgets' embedded Linux BusyBox operating system.
References: [CVE-2019-13473], [XFDB-166724]
12 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
13 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
port number outside the range of the unsigned short data type, as
demonstrated by a value of 65561 for TCP port 25.
List of some trojan horses/backdoors that use this port: Ajan, Antigen,
Barok, Email Password Sender - EPS, EPS II, Gip, Gris, Happy99,
Hpteam mail, Hybris, I love you, Kuang2, Magic Horse, MBT (Mail
Bombing Trojan), Moscow Email trojan, Naebi, NewApt worm, ProMail
trojan, Shtirlitz, Stealth, Tapiras, Terminator, WinPC, WinSpy, Aji, Email
Worms, Haebu Coceda, Loveletter, Neabi, Shtrilitz.
W32.Sober.I@mm [Symantec-2004-111900-1451-99] (2004.11.19) -
mass-mailing worm that uses its own SMTP engine. Affects all current
Windows versions. Checks network connectivity by contacting a NTP
server on port 37/tcp.
Trojan.Mitglieder.R [Symantec-2005-070117-2559-99] (2005.07.01) -
trojan with backdoor capabilities. It runs a SOCKS4 proxy server and
periodically contacts websites with information about the compromised
computer. Attempts to open a back door on port 9040/tcp. Might also
initiate a SMTP spam relay server on port 25/tcp.
W32.Beagle.CX@mm [Symantec-2005-121511-1751-99] (2005.12.15) -
mass-mailing worm that uses its own SMTP engine to spread
Trojan.Lodear.E [Symantec-2005-110111-3344-99]. Also opens a
backdoor on port 80/tcp and lowers security settings on the
compromised computer.
Backdoor.Rustock [Symantec-2006-060111-5747-99] (2006.06.01) -
backdoor program that allows the compromised computer to be used as
a proxy, uses rootkit techniques to hide its files and registry entries.
14 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
15 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
Entertainment
31 tcp msg-auth Members scan
MSG Authentication
The following trojand/backdoors also use this port: Agent 31, Agent
40421, Hackers Paradise (ports 31, 456), Masters Paradise, Skun
34 tcp,udp remote not scanned
Remote File (RF) - used for file transfer between machines
35 udp games not scanned
Delta Force
37 tcp worm Basic scan
Officially assigned for use by TIME protocol [RFC 868] [RFC 956]
TIME (port 37/tcp) can pose a DOS subnet threat because it has
embedded functions used for the identification of critical processing time
intervals and the ability to re-issue its output to port 7.
16 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
Port was originally assigned to the obsolete ARPA Host name server
protocol (pre-DNS).
43 tcp,udp whois not scanned
WHOIS protocol
44 tcp trojan Premium scan
Arctic
17 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
Some trojans also use this port: ADM worm, Bonk (DoS) trojan, li0n,
MscanWorm, MuSka52, Trojan.Esteems.C
[Symantec-2005-051212-1727-99] (2005.05.12), W32.Spybot.ABDO
[Symantec-2005-121014-3510-99] (2005.12.10).
18 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
named in ISC BIND 9.x (before 9.9.7-P2 and 9.10.x before 9.10.2.-P3)
allows remote attackers to cause denial of service (DoS) via TKEY
queries. A constructed packet can use this vulnerability to trigger a
REQUIRE assertion failure, causing the BIND daemon to exit. Both
recursive and authoritative servers are vulnerable. The exploit occurs
early in the packet handling, before checks enforcing ACLs or
configuration options that limit/deny service.
See: [CVE-2015-5477]
19 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
20 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
NCP Secure Enterprise Client (aka VPN/PKI client) 8.30 Build 59, and
possibly earlier versions, when the Link Firewall and Personal Firewall
are both configured to block all inbound and outbound network traffic,
allows context-dependent attackers to send inbound UDP traffic with
source port 67 and destination port 68, and outbound UDP traffic with
source port 68 and destination port 67.
References: [CVE-2006-3551]
ZoneAlarm 2.1.10 and earlier does not filter UDP packets with a source
port of 67, which allows remote attackers to bypass the firewall rules.
References: [CVE-2000-0339] [BID-1137] [OSVDB-1294]
The Avaya 4602 SW IP Phone (Model 4602D02A) with 2.2.2 and earlier
SIP firmware allows remote attackers to cause a denial of service
(device reboot) via a flood of packets to the BOOTP port (68/udp).
References: [CVE-2007-3321] [SECUNIA-25747] [OSVDB-38117]
NCP Secure Enterprise Client (aka VPN/PKI client) 8.30 Build 59, and
possibly earlier versions, when the Link Firewall and Personal Firewall
are both configured to block all inbound and outbound network traffic,
allows context-dependent attackers to send inbound UDP traffic with
source port 67 and destination port 68, and outbound UDP traffic with
source port 68 and destination port 67.
References: [CVE-2006-3551]
21 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
Many trojans also use this port: BackGate Kit, Nimda, Pasana, Storm,
Storm worm, Theef...
W32.Blaster.Worm [Symantec-2003-081113-0229-99] is a widely spread
worm that exploits the MS DCOM RPC vulnerability described in MS
Security Bulletin [MS03-026]. The worm allows remote access to an
infected computer via ports 4444/tcp and 69/UDP, and spreads through
port 135/tcp. To avoid being infected consider closing those ports.
W32.Welchia.Worm [Symantec-2003-081815-2308-99] - a wildly spread
worm that removes the W32.Blaster.Worm and installs a TFTP server.
W32.Cycle [Symantec-2004-051015-4731-99] (2004.05.10). Exploits a
MS vulnerability on port 445, Listens on ports 3332/tcp and 69/udp.
W32.Zotob.E [Symantec-2005-081615-4443-99] (2005.08.16) - a worm
that opens a backdoor and exploits the MS Plug and Play Buffer
Overflow vulnerability (MS Security Bulletin [MS05-039]) on port 445/tcp.
It runs and spreads using all current Windows versions, but only infects
Windows 2000.
The worm connects to IRC servers and listens for remote commands on
port 8080/tcp. It opens port 69/udp to initiate TFTP transfers. It also
opens a bacdoor on remote compromised computers on port 8594/tcp.
Port 69/udp also used by the W32.Zotob.H
[Symantec-2005-081717-2017-99] variant of the worm.
W32.Evala.Worm [Symantec-2002-071017-5735-99] (2002.07.10) -
backdoor trojan. Affects Windows 9x/Me/NT/2k/XP, listens on ports 69
and 70.
22 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
23 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
Trojans that also use this port: ADM worm, Back Orifice 2000 (BO2K),
CDK trojan (ports 79, 15858), Firehotcker (ports 79, 5321)
The legacy finger service (TCP port 79) is enabled by default on various
older Lexmark devices.
References: [CVE-2019-10059]
24 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
Some broadband routers run a web server on port 80 or 8080 for remote
management. WAN Administration can (and should, in most cases) be
disabled using the Web Admin interface.
AnyDesk remote desktop software uses TCP ports 80, 443, 6568, 7070
(direct line connection)
25 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
Code Red, Nimda, 711 trojan (Seven Eleven), AckCmd, Back End, Back
Orifice 2000 Plug-Ins, Cafeini, CGI Backdoor, Executor, God Message,
God Message Creator, Hooker, IISworm, MTX, NCX, Nerte 7.8.1,
Reverse WWW Tunnel Backdoor, RingZero, Seeker, WAN Remote, Web
Server CT, WebDownloader
Trojan.Webus.C [Symantec-2004-101212-0903-99]
W32.Beagle.AO@mm [Symantec-2004-080911-3251-99] - mass-mailing
worm with backdoor functionality. Uses its own SMTP engine,
discovered 08.09.2004. Opens port 80 tcp & udp.
Mydoom.B [Symantec-2004-012816-3647-99] (2004.01.28) - mass-
mailing worm that opens a backdoor into the system. The backdoor
makes use of TCP ports 80, 1080, 3128, 8080, and 10080.
Backdoor.Ranky.S [Symantec-2005-013015-4228-99] (2005.01.30) -
runs proxy on port 80.
W32.Crowt.A@mm [Symantec-2005-012310-2158-99] (2005.01.23) -
mass mailing worm, opens a backdoor, logs keystrokes. Uses ports 80
and 137.
Backdoor.Darkmoon.B [Symantec-2005-102115-3914-99] (2005.10.21) -
a backdoor trojan with keylogger capabilities. Opens a backdoor and
listens for remote commands on port 80/tcp.
W32.Beagle.CX@mm [Symantec-2005-121511-1751-99] (2005.12.16) -
mass-mailing worm that uses its own SMTP engine to spread
Trojan.Lodear.E [Symantec-2005-121516-1510-99]. Also opens a
backdoor on port 80/tcp and lowers security settings on the
compromised computer.
Trojan.Lodear.F [Symantec-2005-121513-5818-99] (2005.12.18) - trojan
that attempts to download remote files.
W32.Feebs [Symantec-2006-013122-5631-99] (2006.01.07)
26 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
Some common uses for port 81/tcp include web administration (cobalt
cube), web proxy servers, McAfee Framework Service, TigerVPN
(servers speed check), etc.
If you're not running web services on this port, keep in mind it is also
used by some trojans:
Backdoor.Asylum [Symantec-2000-121815-0609-99] (2000.05.02) -
remote access trojan, uses ports 81, 2343, 23432 by default.
W32.Beagle.AR@mm [Symantec-2004-092811-5825-99] (2004.09.28) -
port 81.
27 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
28 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
29 of 30 12/10/2024, 4:21 PM
SpeedGuide.net :: Ports to Scan https://www.speedguide.net/ports_sg.php
1 | 2 | 3 | 4 | 5 | 6 |....| 55
Related Links:
SG Ports Database » Vulnerable Ports
SG Security Scan » Scanned Ports » Commonly Open Ports
SG Broadband Tools
30 of 30 12/10/2024, 4:21 PM