Port 6660 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
6660 |
tcp |
trojans |
W32.Spybot.OBZ [Symantec-2005-042413-0059-99] (2005.04.24) - worm with DDoS and backdoor capabilities. Exploits multiple vulnerabilities, spreads through network shares. Opens a backdoor on port 6660/tcp.
Internet Relay Chat (IRC)
LameSpy trojan also uses this port.
Stack-based buffer overflow in the AntServer Module (AntServer.exe) in BigAnt IM Server 2.50 allows remote attackers to execute arbitrary code via a long GET request to TCP port 6660.
References: [CVE-2009-4660], [BID-36407]
|
SG
|
6660-6664 |
tcp |
|
Internet Relay Chat (unofficial) |
Wikipedia
|
80, 3783, 4321, 6660-6669, 28900, 29900, 2901 |
tcp |
applications |
Command and Conquer Red Alert 3 |
Portforward
|
6660 |
tcp |
threat |
W32.Spybot |
Bekkoame
|
6658-6664 |
tcp,udp |
|
Unassigned. Unauthorized Use Known on Port 6659 |
IANA
|
|
5 records found
Related ports: 6661 6662 6663 6664 6665 6666 6667 6668 6669
|