Port 21000 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
21000 |
udp |
games |
Soldier of Fortune 2, IL2 Sturmovik (TCP/UDP), IL2 Sturmovik: Forgotten Battles (TCP/UDP), Pacific Fighters: IL2 (TCP/UDP) |
SG
|
21000 |
tcp |
malware |
Backdoor.Win32.Coredoor.10.a / Port Bounce Scan - the malware listens on TCP port 21000. Third-party attackers who successfully logon can abuse the backdoor FTP server as a man-in-the-middle machine allowing PORT Command bounce scan attacks using Nmap. This vulnerability allows remote attackers to abuse your system and discreetly conduct network port scanning. Victims will then think these scans are originating from the infected system running the afflicted malware FTP Server and not you.
References: [MVID-2021-0411]
Backdoor.Win32.Coredoor.10.a / Authentication Bypass - the malware runs an FTP server on TCP port 21000. Third-party
attackers who can reach infected systems can logon using any username/password combination. Intruders may then upload executables using ftp PASV, STOR commands, this can result in remote code execution.
References: [MVID-2022-0618] |
SG
|
20000-21000 |
udp |
applications |
Ground Control |
Portforward
|
15001, 15101, 15200, 20000-21000, 25451 |
tcp |
applications |
Ground Control |
Portforward
|
20000-21000 |
udp |
applications |
Ground Control with Chat Rooms |
Portforward
|
15001, 15101, 15200, 20000-21000, 25000-25499 |
tcp |
applications |
Ground Control with Chat Rooms |
Portforward
|
15000-15300, 21000-21999, 30000-30999 |
tcp |
applications |
Homeworld |
Portforward
|
21000 |
udp |
applications |
IL-2 |
Portforward
|
21000 |
tcp,udp |
applications |
IL-2 Sturmovik - Forgotten Battles |
Portforward
|
21000 |
tcp |
applications |
IL2-Sturmovik |
Portforward
|
80,6667,21000,40000-42000 |
tcp |
applications |
IL2-Sturmovik Ubi.com |
Portforward
|
21000 |
tcp,udp |
irtrans |
IRTrans Control, registered 2004-11 |
IANA
|
|
12 records found
|