Port 30000 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
30000 |
tcp |
trojans |
Pokemon Netbattle
GnomeMeeting (audio and videoconference) uses ports 30000-30010
Infector trojan (1999-04) - affects Windows 9x (ICQ). Uses ports 146, 1208, 17569, 24000, 30000
Stack-based buffer overflow in NT_Naming_Service.exe in SAP Business One 2005 A 6.80.123 and 6.80.320 allows remote attackers to execute arbitrary code via a long GIOP request to TCP port 30000.
References: [CVE-2009-4988], [BID-35933]
In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If minikube mount is in use, the attacker could also directly access the host filesystem.
References: [CVE-2018-1002103]
ndmps - Secure Network Data Management Protocol (IANA official) |
SG
|
30000 |
udp |
applications |
Xlink Kai
Minetest server default port |
SG
|
30000 |
tcp,udp |
|
Pokemon Netbattle (unofficial) |
Wikipedia
|
30000 |
tcp |
trojan |
DataRape, Infector |
Trojans
|
30000 |
tcp |
Infector |
[trojan] Infector |
SANS
|
15000-15300, 21000-21999, 30000-30999 |
tcp |
applications |
Homeworld |
Portforward
|
30000 |
tcp |
applications |
Pokemon NetBattle |
Portforward
|
8880-8890, 9961, 17475, 27000-30000 |
udp |
applications |
Test Drive Unlimited |
Portforward
|
6667, 9961, 17475, 27000-30000 |
tcp |
applications |
Test Drive Unlimited |
Portforward
|
30000 |
udp |
applications |
Xlink Kai |
Portforward
|
30000 |
tcp |
ndmps |
Secure Network Data Management Protocol, registered 2013-02-05 |
IANA
|
30000 |
udp |
|
Reserved |
IANA
|
|
12 records found
Related ports: 146 1208 17569 24000 30010
|