Shortcuts
|
Vulnerable Ports
This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats.
We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please .
Any feedback and suggestions can also be posted to our Security forum.
Port(s) |
Protocol |
Service |
Scan level |
Description |
3592 |
tcp,udp |
gtrack-ne |
not scanned |
LOCANIS G-TRACK NE Port |
3585 |
tcp,udp |
emprise-lls |
not scanned |
Emprise License Server |
3586 |
tcp,udp |
emprise-lsc |
not scanned |
License Server Console
Snid X2 trojan horse also uses port 3585 (TCP). |
3567 |
tcp,udp |
oap |
not scanned |
Object Access Protocol
EMIT protocol stack [Panasonic_Intranet_Panasonic_North_America_PEWLA] (IANA official)
DOF Protocol Stack (IANA official) |
3568 |
tcp,udp |
oap-s |
not scanned |
Dark Reign 2, Delta Force 2
EMIT secure tunnel [Panasonic_Intranet_Panasonic_North_America_PEWLA] (IANA official)
DOF Secure Tunnel (IANA official) |
4800 |
tcp,udp |
iims |
not scanned |
Deloder Worm can run a backdoor on ports 4800 and 4900.
Moxa Service in Moxa NPort 5150A firmware version 1.5 and earlier allows attackers to obtain sensitive configuration values via a crafted packet to UDP port 4800. NOTE: Moxa Service is an unauthenticated service that runs upon a first-time installation but can be disabled without ill effect.
References: [CVE-2020-12117], [XFDB-181354]
IANA Registered for: Icona Instant Messenging System |
3538 |
tcp,udp |
ibm-diradm |
not scanned |
IBM Directory Server |
3539 |
tcp,udp |
ibm-diradm-ssl |
not scanned |
IBM Directory Server SSL |
3495 |
tcp,udp |
seclayer-tcp |
not scanned |
securitylayer over tcp |
3496 |
tcp,udp |
seclayer-tls |
not scanned |
securitylayer over tls |
3472 |
tcp,udp |
jaugsremotec-1 |
not scanned |
JAUGS N-G Remotec 1 |
3473 |
tcp,udp |
jaugsremotec-2 |
not scanned |
JAUGS N-G Remotec 2 |
3470 |
tcp,udp |
jt400 |
not scanned |
Worms using this port: I-Worm/Mytob.BO (W32/Mytob)
IANA registered for: jt400 |
4747 |
udp |
pgp |
not scanned |
peer-to-peer file exchange protocol (IANA official)
PGP Secure Phone Data Stream
PlayLink online game also uses port 4747 |
3460 |
tcp,udp |
edm-manager |
not scanned |
EDM Manger |
3461 |
tcp,udp |
edm-stager |
not scanned |
EDM Stager |
3462 |
tcp,udp |
edm-std-notify |
not scanned |
Software distribution
IANA registered for: EDM STD Notify |
3463 |
tcp,udp |
edm-adm-notify |
not scanned |
EDM ADM Notify |
3464 |
tcp,udp |
edm-mgr-sync |
not scanned |
EDM MGR Sync |
3465 |
tcp,udp |
edm-mgr-cntrl |
not scanned |
EDM MGR Cntrl
radexecd.exe in Persistent Systems Radia Client Automation (RCA) 7.9, 8.1, 9.0, and 9.1 allows remote attackers to execute arbitrary commands via a crafted request to TCP port 3465.
References: [CVE-2015-1497], [XFDB-100920] |
3450 |
tcp,udp |
castorproxy |
not scanned |
Virtual Places Voice Chat, TrackMania Forever (TCP), Virtual Skipper 5
Malicious services using this port: Trojan Proxy
IANA registered for: CAStorProxy |
3423 |
tcp,udp |
xtrm |
not scanned |
xTrade Reliable Messaging |
3422 |
tcp,udp |
rusb-sys-port |
not scanned |
Malicious services using this port: IRC Bots
IANA registered for: Remote USB System Port |
3424 |
tcp,udp |
xtrms |
not scanned |
xTrade over TLS/SSL |
3409 |
tcp,udp |
networklens |
not scanned |
NetworkLens Event Port |
3405 |
tcp,udp |
nokia-ann-ch1 |
not scanned |
Nokia Announcement ch 1 |
3406 |
tcp,udp |
nokia-ann-ch2 |
not scanned |
Nokia Announcement ch 2 |
3399 |
tcp,udp |
csms |
not scanned |
SAP EPS (applications)
IANA registered for: CSMS |
3400 |
tcp,udp |
csms2 |
not scanned |
CSMS2 |
3393 |
tcp,udp |
d2k-tapestry1 |
not scanned |
D2K Tapestry Client to Server |
3394 |
tcp,udp |
d2k-tapestry2 |
not scanned |
D2K Tapestry Server to Server |
3360 |
tcp,udp |
kv-server |
not scanned |
KV Server |
3361 |
tcp,udp |
kv-agent |
not scanned |
KV Agent |
3300 |
tcp,udp |
sap-gw |
not scanned |
SAP Gateway Server, TripleA game server (applications), Debate Gopher backend database system
IANA registered for: Ceph monitor (TCP) |
3301 |
tcp,udp |
tarantool |
not scanned |
Unauthorized use by SAP R/3
GTR FIA GT Racing Game also uses port 3301 (TCP)
Tarantool in-memory computing platform (IANA official) |
3303 |
tcp,udp |
opsession-clnt |
not scanned |
OP Session Client |
3304 |
tcp,udp |
opsession-srvr |
not scanned |
OP Session Server |
3308 |
tcp,udp |
tns-server |
not scanned |
TNS Server |
3309 |
tcp,udp |
tns-adv |
not scanned |
TNS ADV |
3313 |
tcp,udp |
uorb |
not scanned |
Verisys file integrity monitoring software uses port 3313 (TCP)
Port is IANA registered for Unify Object Broker |
3314 |
tcp,udp |
uohost |
not scanned |
Port is IANA registered for Unify Object Host |
3330 |
tcp,udp |
mcs-calypsoicf |
not scanned |
MCS Calypso ICF |
3331 |
tcp,udp |
mcs-messaging |
not scanned |
MCS Messaging |
3335 |
tcp,udp |
directv-soft |
not scanned |
Direct TV Software Updates |
3336 |
tcp,udp |
directv-tick |
not scanned |
Direct TV Tickers |
3338 |
tcp,udp |
anet-b |
not scanned |
OMF data b |
3339 |
tcp,udp |
anet-l |
not scanned |
OMF data l |
3340 |
tcp,udp |
anet-m |
not scanned |
OMF data m |
3341 |
tcp,udp |
anet-h |
not scanned |
OMF data h |
4525 |
tcp,udp |
applications |
not scanned |
Java, postfix SMTP |
3293 |
tcp,udp |
fg-fps |
not scanned |
fg-fps |
3294 |
tcp,udp |
fg-gip |
not scanned |
fg-gip |
3283 |
tcp,udp |
net-assistant |
not scanned |
Apple Remote Desktop, iChat
IANA registered for: Net Assistant |
3268 |
tcp,udp |
msft-gc |
not scanned |
LDAP connection to Global Catalog. LDAP servers typically use the following ports:
TCP 389 LDAP plain text
TCP 636 LDAP SSL connection
TCP 3268 LDAP connection to Global Catalog
TCP 3269 LDAP connection to Global Catalog over SSL
IANA registered for: Microsoft Global Catalog |
860 |
tcp,udp |
iscsi |
not scanned |
iSCSI (IANA official) [RFC 7143] |
3260 |
tcp,udp |
iscsi-target |
not scanned |
iSCSI port (IANA official) [RFC 7143] |
3220 |
tcp,udp |
xnm-ssl |
not scanned |
XML NM over SSL |
3221 |
tcp,udp |
xnm-clear-text |
not scanned |
XML NM over TCP |
3214 |
tcp,udp |
jmq-daemon-1 |
not scanned |
JMQ Daemon Port 1 |
3215 |
tcp,udp |
jmq-daemon-2 |
not scanned |
Trojans using this port: XHX, BlackStar, Ghose
IANA registered for: JMQ Daemon Port 2 |
3203 |
tcp,udp |
netwatcher-mon |
not scanned |
Network Watcher Monitor |
3204 |
tcp,udp |
netwatcher-db |
not scanned |
Network Watcher DB Access |
3197 |
tcp,udp |
embrace-dp-s |
not scanned |
Embrace Device Protocol Server
MyDoom.B@mm trojan also uses this port (TCP). |
3198 |
tcp,udp |
embrace-dp-c |
not scanned |
Embrace Device Protocol Client
MyDoom.B@mm trojan also uses this port (TCP). |
3196 |
tcp,udp |
ncu-2 |
not scanned |
Network Control Unit |
3190 |
tcp,udp |
csvr-proxy |
not scanned |
ConServR Proxy |
3191 |
tcp,udp |
csvr-sslproxy |
not scanned |
ConServR SSL Proxy |
3181 |
tcp,udp |
bmcpatrolagent |
not scanned |
Format string vulnerability in BMC PATROL Agent before 3.7.30 allows remote attackers to execute arbitrary code via format string specifiers in an invalid version number to TCP port 3181, which are not properly handled when writing a log message.
References: [CVE-2008-5982], [BID-32692]
PatrolAgent.exe in BMC Performance Manager does not require authentication for requests to modify configuration files, which allows remote attackers to execute arbitrary code via a request on TCP port 3181 for modification of the masterAgentName and masterAgentStartLine SNMP parameters. NOTE: the vendor disputes this vulnerability, stating that it does not exist when the system is properly configured.
References: [CVE-2007-1972] [BID-23559]
Port also IANA registered for BMC Patrol Agent |
3182 |
tcp,udp |
bmcpatrolrnvu |
not scanned |
BMC Patrol Rendezvous |
3169 |
tcp,udp |
serverview-as |
not scanned |
SERVERVIEW-AS |
3170 |
tcp,udp |
serverview-asn |
not scanned |
SERVERVIEW-ASN |
3171 |
tcp,udp |
serverview-gf |
not scanned |
SERVERVIEW-GF |
3172 |
tcp,udp |
serverview-rm |
not scanned |
SERVERVIEW-RM |
3148 |
tcp,udp |
nm-game-admin |
not scanned |
NetMike Game Administrator
MyDoom.B@mm trojan also uses this port (TCP). |
3149 |
tcp,udp |
nm-game-server |
not scanned |
NetMike Game Server
MyDoom.B@mm trojan also uses this port (TCP). |
3151 |
tcp,udp |
nm-assessor |
not scanned |
NetMike Assessor |
3137 |
tcp,udp |
rtnt-1 |
not scanned |
rtnt-1 data packets
MyDoom.B@mm trojan also uses this port (TCP). |
3138 |
tcp,udp |
rtnt-2 |
not scanned |
rtnt-2 data packets
MyDoom.B@mm trojan also uses this port (TCP). |
3120 |
tcp,udp |
d2000webserver |
not scanned |
D2000 Webserver Port |
3115 |
tcp,udp |
mctet-master |
not scanned |
MCTET Master |
3116 |
tcp,udp |
mctet-gateway |
not scanned |
MCTET Gateway |
3117 |
tcp,udp |
mctet-jserv |
not scanned |
Rainbow Six Vegas
IANA registered for: MCTET Jserv |
3105 |
tcp,udp |
cardbox |
not scanned |
Cardbox, Settlers 4, Rainbow Six Vegas
Tom Clancy's Splinter Cell: Conviction also uses port 3105 (TCP), developer: Ubisoft Montreal |
3106 |
tcp,udp |
cardbox-http |
not scanned |
Cardbox HTTP |
3075 |
tcp,udp |
orbix-locator |
not scanned |
Lost Planet - Extreme Condition, Call of Duty - World at War, Blazing Angels Online
IANA registered for: Orbix 2000 Locator |
3081 |
tcp,udp |
tl1-lv |
not scanned |
Tom Clancy's Splinter Cell: Conviction uses port 3081 (TCP), developer: Ubisoft Montreal
Rainbow Six Vegas also uses port 3081 (UDP)
Port is IANA assigned for TL1-LV |
3082 |
tcp,udp |
tl1-raw |
not scanned |
TL1-RAW |
3083 |
tcp,udp |
tl1-telnet |
not scanned |
TL1-TELNET |
3076 |
tcp,udp |
orbix-config |
not scanned |
Orbix 2000 Config |
3077 |
tcp,udp |
orbix-loc-ssl |
not scanned |
Orbix 2000 Locator SSL |
3078 |
tcp,udp |
orbix-cfg-ssl |
not scanned |
Orbix 2000 Locator SSL |
3027 |
tcp,udp |
liebdevmgmt_c |
not scanned |
LiebDevMgmt_C |
3028 |
tcp,udp |
liebdevmgmt_dm |
not scanned |
LiebDevMgmt_DM
Backdoor.Wortbot [Symantec-2005-021611-0236-99] also uses this port (TCP). |
3029 |
tcp,udp |
liebdevmgmt_a |
not scanned |
LiebDevMgmt_A |
3011 |
tcp,udp |
trusted-web |
not scanned |
Citrix NetScaler appliance uses port 3011 TCP for non-secure MEP.
Trusted Web |
3012 |
tcp,udp |
twsdss |
not scanned |
Trusted Web Client |
1241 |
tcp,udp |
nessus |
not scanned |
Nessus |
3002 |
tcp |
applications |
not scanned |
The web100 NDT (Network Diagnostic Tool) server uses ports 3001, 3002, and 3003 tcp to communicate with the Java applet on the client's desktop. NDT also uses port 7123/tcp.
Miralix CSTA
IANA registered for: EXLM Agent (TCP/UDP) |
3003 |
tcp |
applications |
not scanned |
The web100 NDT (Network Diagnostic Tool) server uses ports 3001, 3002, and 3003 tcp to communicate with the Java applet on the client's desktop. NDT also uses port 7123/tcp.
Miralix GreenBox API
Viewgate Classic DVR also uses port 3003 (TCP/UDP)
IANA registered for: CGMS (TCP/UDP) |
2993 |
tcp,udp |
veritas-vis1 |
not scanned |
VERITAS VIS1 |
Vulnerabilities listed: 100 (some use multiple ports)
|