| 
 
   Port 6660 Details
   known port assignments and vulnerabilities
threat/application/port search:
 
  
	| Port(s) | 
	Protocol | 
	Service | 
	Details | 
	Source | 
   
  
  |  6660  | 
  tcp | 
  trojans | 
  W32.Spybot.OBZ [Symantec-2005-042413-0059-99] (2005.04.24) - worm with DDoS and backdoor capabilities. Exploits multiple vulnerabilities, spreads through network shares. Opens a backdoor on port 6660/tcp. 
 
Internet Relay Chat (IRC) 
 
LameSpy trojan also uses this port. 
 
Stack-based buffer overflow in the AntServer Module (AntServer.exe) in BigAnt IM Server 2.50 allows remote attackers to execute arbitrary code via a long GET request to TCP port 6660. 
References: [CVE-2009-4660], [BID-36407] 
 
 | 
  SG 
	   | 
 
  |  6660-6664  | 
  tcp | 
   | 
  Internet Relay Chat (unofficial) | 
  Wikipedia 
	   | 
 
  |  80, 3783, 4321, 6660-6669, 28900, 29900, 2901  | 
  tcp | 
  applications | 
  Command and Conquer Red Alert 3 | 
  Portforward 
	   | 
 
  |  6660  | 
  tcp | 
  threat | 
  W32.Spybot | 
  Bekkoame 
	   | 
 
  
  |  6660-6664  | 
  tcp | 
   | 
  Internet Relay Chat (unofficial) | 
  Wikipedia 
	   | 
 
  |  6658-6664  | 
  tcp,udp | 
   | 
  Unassigned. Unauthorized Use Known on Port 6659 | 
  IANA 
	   | 
 
 
 | 
 
 
	6 records found
	Related ports: 6661  6662  6663  6664  6665  6666  6667  6668  6669   
 |