The Broadband Guide
SG
search advanced

Vulnerable Ports

This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats. We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please . Any feedback and suggestions can also be posted to our Security forum.

 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |....| 55 
Port(s) Protocol Service Scan level Description
 3592 tcp,udp gtrack-ne not scanned LOCANIS G-TRACK NE Port
 3585 tcp,udp emprise-lls not scanned Emprise License Server
 3586 tcp,udp emprise-lsc not scanned License Server Console

Snid X2 trojan horse also uses port 3585 (TCP).
 3567 tcp,udp oap not scanned Object Access Protocol
EMIT protocol stack [Panasonic_Intranet_Panasonic_North_America_PEWLA] (IANA official)
DOF Protocol Stack (IANA official)
 3568 tcp,udp oap-s not scanned Dark Reign 2, Delta Force 2

EMIT secure tunnel [Panasonic_Intranet_Panasonic_North_America_PEWLA] (IANA official)
DOF Secure Tunnel (IANA official)
 4800 tcp,udp iims not scanned Deloder Worm can run a backdoor on ports 4800 and 4900.

Moxa Service in Moxa NPort 5150A firmware version 1.5 and earlier allows attackers to obtain sensitive configuration values via a crafted packet to UDP port 4800. NOTE: Moxa Service is an unauthenticated service that runs upon a first-time installation but can be disabled without ill effect.
References: [CVE-2020-12117], [XFDB-181354]

IANA Registered for: Icona Instant Messenging System
 3538 tcp,udp ibm-diradm not scanned IBM Directory Server
 3539 tcp,udp ibm-diradm-ssl not scanned IBM Directory Server SSL
 3495 tcp,udp seclayer-tcp not scanned securitylayer over tcp
 3496 tcp,udp seclayer-tls not scanned securitylayer over tls
 3472 tcp,udp jaugsremotec-1 not scanned JAUGS N-G Remotec 1
 3473 tcp,udp jaugsremotec-2 not scanned JAUGS N-G Remotec 2
 3470 tcp,udp jt400 not scanned Worms using this port: I-Worm/Mytob.BO (W32/Mytob)

IANA registered for: jt400
 4747 udp pgp not scanned peer-to-peer file exchange protocol (IANA official)
PGP Secure Phone Data Stream
PlayLink online game also uses port 4747
 3460 tcp,udp edm-manager not scanned EDM Manger
 3461 tcp,udp edm-stager not scanned EDM Stager
 3462 tcp,udp edm-std-notify not scanned Software distribution

IANA registered for: EDM STD Notify
 3463 tcp,udp edm-adm-notify not scanned EDM ADM Notify
 3464 tcp,udp edm-mgr-sync not scanned EDM MGR Sync
 3465 tcp,udp edm-mgr-cntrl not scanned EDM MGR Cntrl

radexecd.exe in Persistent Systems Radia Client Automation (RCA) 7.9, 8.1, 9.0, and 9.1 allows remote attackers to execute arbitrary commands via a crafted request to TCP port 3465.
References: [CVE-2015-1497], [XFDB-100920]
 3450 tcp,udp castorproxy not scanned Virtual Places Voice Chat, TrackMania Forever (TCP), Virtual Skipper 5

Malicious services using this port: Trojan Proxy

IANA registered for: CAStorProxy
 3423 tcp,udp xtrm not scanned xTrade Reliable Messaging
 3422 tcp,udp rusb-sys-port not scanned Malicious services using this port: IRC Bots

IANA registered for: Remote USB System Port
 3424 tcp,udp xtrms not scanned xTrade over TLS/SSL
 3409 tcp,udp networklens not scanned NetworkLens Event Port
 3405 tcp,udp nokia-ann-ch1 not scanned Nokia Announcement ch 1
 3406 tcp,udp nokia-ann-ch2 not scanned Nokia Announcement ch 2
 3399 tcp,udp csms not scanned SAP EPS (applications)

IANA registered for: CSMS
 3400 tcp,udp csms2 not scanned CSMS2
 3393 tcp,udp d2k-tapestry1 not scanned D2K Tapestry Client to Server
 3394 tcp,udp d2k-tapestry2 not scanned D2K Tapestry Server to Server
 3360 tcp,udp kv-server not scanned KV Server
 3361 tcp,udp kv-agent not scanned KV Agent
 3300 tcp,udp sap-gw not scanned SAP Gateway Server, TripleA game server (applications), Debate Gopher backend database system

IANA registered for: Ceph monitor (TCP)
 3301 tcp,udp tarantool not scanned Unauthorized use by SAP R/3
GTR FIA GT Racing Game also uses port 3301 (TCP)

Tarantool in-memory computing platform (IANA official)
 3303 tcp,udp opsession-clnt not scanned OP Session Client
 3304 tcp,udp opsession-srvr not scanned OP Session Server
 3308 tcp,udp tns-server not scanned TNS Server
 3309 tcp,udp tns-adv not scanned TNS ADV
 3313 tcp,udp uorb not scanned Verisys file integrity monitoring software uses port 3313 (TCP)

Port is IANA registered for Unify Object Broker
 3314 tcp,udp uohost not scanned Port is IANA registered for Unify Object Host
 3330 tcp,udp mcs-calypsoicf not scanned MCS Calypso ICF
 3331 tcp,udp mcs-messaging not scanned MCS Messaging
 3335 tcp,udp directv-soft not scanned Direct TV Software Updates
 3336 tcp,udp directv-tick not scanned Direct TV Tickers
 3338 tcp,udp anet-b not scanned OMF data b
 3339 tcp,udp anet-l not scanned OMF data l
 3340 tcp,udp anet-m not scanned OMF data m
 3341 tcp,udp anet-h not scanned OMF data h
 4525 tcp,udp applications not scanned Java, postfix SMTP
 3293 tcp,udp fg-fps not scanned fg-fps
 3294 tcp,udp fg-gip not scanned fg-gip
 3283 tcp,udp net-assistant not scanned Apple Remote Desktop, iChat

IANA registered for: Net Assistant
 3268 tcp,udp msft-gc not scanned LDAP connection to Global Catalog. LDAP servers typically use the following ports:
TCP 389 LDAP plain text
TCP 636 LDAP SSL connection
TCP 3268 LDAP connection to Global Catalog
TCP 3269 LDAP connection to Global Catalog over SSL

IANA registered for: Microsoft Global Catalog
 860 tcp,udp iscsi not scanned iSCSI (IANA official) [RFC 7143]
 3260 tcp,udp iscsi-target not scanned iSCSI port (IANA official) [RFC 7143]
 3220 tcp,udp xnm-ssl not scanned XML NM over SSL
 3221 tcp,udp xnm-clear-text not scanned XML NM over TCP
 3214 tcp,udp jmq-daemon-1 not scanned JMQ Daemon Port 1
 3215 tcp,udp jmq-daemon-2 not scanned Trojans using this port: XHX, BlackStar, Ghose

IANA registered for: JMQ Daemon Port 2
 3203 tcp,udp netwatcher-mon not scanned Network Watcher Monitor
 3204 tcp,udp netwatcher-db not scanned Network Watcher DB Access
 3197 tcp,udp embrace-dp-s not scanned Embrace Device Protocol Server

MyDoom.B@mm trojan also uses this port (TCP).
 3198 tcp,udp embrace-dp-c not scanned Embrace Device Protocol Client

MyDoom.B@mm trojan also uses this port (TCP).
 3196 tcp,udp ncu-2 not scanned Network Control Unit
 3190 tcp,udp csvr-proxy not scanned ConServR Proxy
 3191 tcp,udp csvr-sslproxy not scanned ConServR SSL Proxy
 3181 tcp,udp bmcpatrolagent not scanned Format string vulnerability in BMC PATROL Agent before 3.7.30 allows remote attackers to execute arbitrary code via format string specifiers in an invalid version number to TCP port 3181, which are not properly handled when writing a log message.
References: [CVE-2008-5982], [BID-32692]

PatrolAgent.exe in BMC Performance Manager does not require authentication for requests to modify configuration files, which allows remote attackers to execute arbitrary code via a request on TCP port 3181 for modification of the masterAgentName and masterAgentStartLine SNMP parameters. NOTE: the vendor disputes this vulnerability, stating that it does not exist when the system is properly configured.
References: [CVE-2007-1972] [BID-23559]

Port also IANA registered for BMC Patrol Agent
 3182 tcp,udp bmcpatrolrnvu not scanned BMC Patrol Rendezvous
 3169 tcp,udp serverview-as not scanned SERVERVIEW-AS
 3170 tcp,udp serverview-asn not scanned SERVERVIEW-ASN
 3171 tcp,udp serverview-gf not scanned SERVERVIEW-GF
 3172 tcp,udp serverview-rm not scanned SERVERVIEW-RM
 3148 tcp,udp nm-game-admin not scanned NetMike Game Administrator

MyDoom.B@mm trojan also uses this port (TCP).
 3149 tcp,udp nm-game-server not scanned NetMike Game Server

MyDoom.B@mm trojan also uses this port (TCP).
 3151 tcp,udp nm-assessor not scanned NetMike Assessor
 3137 tcp,udp rtnt-1 not scanned rtnt-1 data packets

MyDoom.B@mm trojan also uses this port (TCP).
 3138 tcp,udp rtnt-2 not scanned rtnt-2 data packets

MyDoom.B@mm trojan also uses this port (TCP).
 3120 tcp,udp d2000webserver not scanned D2000 Webserver Port
 3115 tcp,udp mctet-master not scanned MCTET Master
 3116 tcp,udp mctet-gateway not scanned MCTET Gateway
 3117 tcp,udp mctet-jserv not scanned Rainbow Six Vegas
IANA registered for: MCTET Jserv
 3105 tcp,udp cardbox not scanned Cardbox, Settlers 4, Rainbow Six Vegas
Tom Clancy's Splinter Cell: Conviction also uses port 3105 (TCP), developer: Ubisoft Montreal
 3106 tcp,udp cardbox-http not scanned Cardbox HTTP
 3075 tcp,udp orbix-locator not scanned Lost Planet - Extreme Condition, Call of Duty - World at War, Blazing Angels Online
IANA registered for: Orbix 2000 Locator
 3081 tcp,udp tl1-lv not scanned Tom Clancy's Splinter Cell: Conviction uses port 3081 (TCP), developer: Ubisoft Montreal
Rainbow Six Vegas also uses port 3081 (UDP)
Port is IANA assigned for TL1-LV
 3082 tcp,udp tl1-raw not scanned TL1-RAW
 3083 tcp,udp tl1-telnet not scanned TL1-TELNET
 3076 tcp,udp orbix-config not scanned Orbix 2000 Config
 3077 tcp,udp orbix-loc-ssl not scanned Orbix 2000 Locator SSL
 3078 tcp,udp orbix-cfg-ssl not scanned Orbix 2000 Locator SSL
 3027 tcp,udp liebdevmgmt_c not scanned LiebDevMgmt_C
 3028 tcp,udp liebdevmgmt_dm not scanned LiebDevMgmt_DM

Backdoor.Wortbot [Symantec-2005-021611-0236-99] also uses this port (TCP).
 3029 tcp,udp liebdevmgmt_a not scanned LiebDevMgmt_A
 3011 tcp,udp trusted-web not scanned Citrix NetScaler appliance uses port 3011 TCP for non-secure MEP.

Trusted Web
 3012 tcp,udp twsdss not scanned Trusted Web Client
 1241 tcp,udp nessus not scanned Nessus
 3002 tcp applications not scanned The web100 NDT (Network Diagnostic Tool) server uses ports 3001, 3002, and 3003 tcp to communicate with the Java applet on the client's desktop. NDT also uses port 7123/tcp.

Miralix CSTA

IANA registered for: EXLM Agent (TCP/UDP)
 3003 tcp applications not scanned The web100 NDT (Network Diagnostic Tool) server uses ports 3001, 3002, and 3003 tcp to communicate with the Java applet on the client's desktop. NDT also uses port 7123/tcp.

Miralix GreenBox API
Viewgate Classic DVR also uses port 3003 (TCP/UDP)

IANA registered for: CGMS (TCP/UDP)
 2993 tcp,udp veritas-vis1 not scanned VERITAS VIS1

Vulnerabilities listed: 100 (some use multiple ports)
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About