speedguide.net  

Port 6660 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
6660 tcp trojans W32.Spybot.OBZ [Symantec-2005-042413-0059-99] (2005.04.24) - worm with DDoS and backdoor capabilities. Exploits multiple vulnerabilities, spreads through network shares. Opens a backdoor on port 6660/tcp.

Internet Relay Chat (IRC)

LameSpy trojan also uses this port.

Stack-based buffer overflow in the AntServer Module (AntServer.exe) in BigAnt IM Server 2.50 allows remote attackers to execute arbitrary code via a long GET request to TCP port 6660.
References: [CVE-2009-4660], [BID-36407]

SG
6660-6664 tcp Internet Relay Chat (unofficial) Wikipedia
80, 3783, 4321, 6660-6669, 28900, 29900, 2901 tcp applications Command and Conquer Red Alert 3 Portforward
6660 tcp threat W32.Spybot Bekkoame
6660-6664 tcp Internet Relay Chat (unofficial) Wikipedia
6658-6664 tcp,udp Unassigned. Unauthorized Use Known on Port 6659 IANA
6 records found

Related ports: 6661  6662  6663  6664  6665  6666  6667  6668  6669  

News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About