Shortcuts
|
Port 80 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
80 |
udp |
trojans |
W32.Beagle.AO@mm [Symantec-2004-080911-3251-99] - mass-mailing worm with backdoor functionality. Uses its own SMTP engine, discovered 08.09.2004. Opens port 80 tcp & udp.
W32.Bobax.AF@mm [Symantec-2005-081611-4121-99] (2005.08.15) - a mass-mailing worm that opens a backdoor and lowers security settings on the compromised computer. It exploits the MS Plug and Play Buffer Overflow vulnerability (MS Security Bulletin [MS05-039]) on port 21/tcp., and by sending copies of itself to gathered email addresses. Also opens a backdoor on a random tcp port and/or port 80/udp.
Siemens SINEMA Server before 12 SP1 allows remote attackers to cause a denial of service (web-interface outage) via crafted HTTP requests to port 80 (TCP/UDP).
References: [CVE-2014-2733]
Multiple directory traversal vulnerabilities in the integrated web server in Siemens SINEMA Server before 12 SP1 allow remote attackers to access arbitrary files via HTTP traffic to port (1) 4999 or (2) 80.
References: [CVE-2014-2732]
Multiple directory traversal vulnerabilities in the integrated web server in Siemens SINEMA Server before 12 SP1 allow remote attackers to access arbitrary files via HTTP traffic to port (1) 4999 or (2) 80.
Reference: [CVE-2014-2731]
Port 80 udp is also used by some games, like Alien vs Predator (Activision). |
SG
|
80 |
tcp |
http |
Hyper Text Transfer Protocol (HTTP) - port used for web traffic.
Some broadband routers run a web server on port 80 or 8080 for remote management. WAN Administration can (and should, in most cases) be disabled using the Web Admin interface.
AnyDesk remote desktop software uses TCP ports 80, 443, 6568, 7070 (direct line connection)
If you're not running web services, keep in mind that a number of trojans/worms/backdoors propagate via TCP port 80 (HTTP):
Code Red, Nimda, 711 trojan (Seven Eleven), AckCmd, Back End, Back Orifice 2000 Plug-Ins, Cafeini, CGI Backdoor, Executor, God Message, God Message Creator, Hooker, IISworm, MTX, NCX, Nerte 7.8.1, Reverse WWW Tunnel Backdoor, RingZero, Seeker, WAN Remote, Web Server CT, WebDownloader
Trojan.Webus.C [Symantec-2004-101212-0903-99]
W32.Beagle.AO@mm [Symantec-2004-080911-3251-99] - mass-mailing worm with backdoor functionality. Uses its own SMTP engine, discovered 08.09.2004. Opens port 80 tcp & udp.
Mydoom.B [Symantec-2004-012816-3647-99] (2004.01.28) - mass-mailing worm that opens a backdoor into the system. The backdoor makes use of TCP ports 80, 1080, 3128, 8080, and 10080.
Backdoor.Ranky.S [Symantec-2005-013015-4228-99] (2005.01.30) - runs proxy on port 80.
W32.Crowt.A@mm [Symantec-2005-012310-2158-99] (2005.01.23) - mass mailing worm, opens a backdoor, logs keystrokes. Uses ports 80 and 137.
Backdoor.Darkmoon.B [Symantec-2005-102115-3914-99] (2005.10.21) - a backdoor trojan with keylogger capabilities. Opens a backdoor and listens for remote commands on port 80/tcp.
W32.Beagle.CX@mm [Symantec-2005-121511-1751-99] (2005.12.16) - mass-mailing worm that uses its own SMTP engine to spread Trojan.Lodear.E [Symantec-2005-121516-1510-99]. Also opens a backdoor on port 80/tcp and lowers security settings on the compromised computer.
Trojan.Lodear.F [Symantec-2005-121513-5818-99] (2005.12.18) - trojan that attempts to download remote files.
W32.Feebs [Symantec-2006-013122-5631-99] (2006.01.07)
Xbox 360 (LIVE) ports: 3074 TCP/UDP, 53 TCP/UDP, 80 TCP, 88 UDP
Xbox One (LIVE) ports: 3074 TCP/UDP, 53 TCP/UDP, 80 TCP, 88 UDP, 500 UDP, 3544 UDP, 4500 UDP
Some Apple applications also use port 80 (TCP): MobileMe, Sherlock, QuickTime Installer, iTunes Store and Radio, Software Update, RAID Admin, Backup, iCal calendar publishing, iWeb, MobileMe Web Gallery Publishing, WebDAV (iDisk), Final Cut Server.
Siemens SIPROTEC 4 and SIPROTEC Compact is vulnerable to a denial of service, caused by an error in the EN100 Ethernet module. By sending specially-crafted HTTP packets to TCP port 80, a remote attacker could exploit this vulnerability to cause the device to go into defect mode.
References: [CVE-2016-7113] [XFDB-116647]
A vulnerability was discovered in Siemens ViewPort for Web Office Portal before revision number 1453 that could allow an unauthenticated remote user to upload arbitrary code and execute it with the permissions of the operating-system user running the web server by sending specially crafted network packets to port 443/TCP or port 80/TCP.
References: [CVE-2017-6869], [BID-99343] |
SG
|
80 |
tcp |
|
Hypertext Transfer Protocol (HTTP) (official) |
Wikipedia
|
80 |
tcp |
trojan |
711 trojan (Seven Eleven), AckCmd, BlueFire, Cafeini, Duddie, Executor, God Message, Intruzzo , Latinus, Lithium, MscanWorm, NerTe, Nimda, Noob, Optix Lite, Optix Pro , Power, Ramen, Remote Shell , Reverse WWW Tunnel Backdoor , RingZero, RTB 666, Scalper, Screen Cutter , Seeker, Slapper, Web Server CT , WebDownloader |
Trojans
|
80 |
udp |
trojan |
Penrox |
Trojans
|
80 |
tcp,udp |
www |
World Wide Web HTTP |
SANS
|
80,2300 |
tcp |
applications |
Age of Empires III |
Portforward
|
80 |
tcp,udp |
applications |
Applications/Games that use port 80:
ATT Remote Monitor
BT Homesafe
Dungeons + Dragons Online
Eyeon
Gadspot IP Camera
Halo
Lord of the Rings Online
Lorex IP Surveillance
MythTV
QSee QSD6204
QSee QSD6209
Rise of Legends |
Portforward
|
22,57,80,3660,3663,4665 |
tcp,udp |
applications |
AudioReQuest |
Portforward
|
80,443 |
tcp |
applications |
BarracudaDrive |
Portforward
|
80, 4711, 18060, 28910, 29900, 29901, 29920 |
tcp |
applications |
Battlefield 2 |
Portforward
|
80, 443, 1024-1124, 4711, 9960-9969, 17475, 18060, 18120, 18300, 18510, 27900, 28910, 29900 |
tcp |
applications |
Battlefield 2142 |
Portforward
|
80,443,3074,5223 |
tcp |
applications |
Call of Duty - World at War |
Portforward
|
80,6667,28910,29900,29920 |
tcp |
applications |
Command and Conquer Generals |
Portforward
|
80, 3783, 6500, 6515, 6667, 13139, 27900, 28900, 28910, 29900, 29901, 29920 |
tcp |
applications |
Command and Conquer Generals GameSpy |
Portforward
|
80, 3783, 4321, 6660-6669, 28900, 29900, 2901 |
tcp |
applications |
Command and Conquer Red Alert 3 |
Portforward
|
80,6667,28910,29900,29920 |
tcp |
applications |
Command and Conquer Zero Hour |
Portforward
|
80, 3783, 6500, 6515, 6667, 13139, 27900, 28900, 28910, 29900, 29901, 29920 |
tcp |
applications |
Command and Conquer Zero Hour GameSpy |
Portforward
|
80, 2300-2400, 3783, 13139, 27900, 28900, 29900-29901, 34000-34005 |
udp |
applications |
Cossacks II |
Portforward
|
80,5938 |
tcp |
applications |
DynGate |
Portforward
|
21, 80, 3389, 4550, 5550, 6550, 9650 |
tcp |
applications |
GeoVision TwinDVR with Webcam |
Portforward
|
21,80,3389,4550,5550,6550 |
tcp |
applications |
GeoVision Webcam |
Portforward
|
80,6112 |
tcp |
applications |
Guild Wars |
Portforward
|
80,6667,21000,40000-42000 |
tcp |
applications |
IL2-Sturmovik Ubi.com |
Portforward
|
80,2106,7777 |
tcp |
applications |
L2J |
Portforward
|
80,2106,2009,7777 |
tcp |
applications |
Lineage II |
Portforward
|
80,6667,10308,40000-42000 |
tcp |
applications |
Lock On Modern Air Combat Ubi.com |
Portforward
|
80,13505,30900-30999 |
tcp |
applications |
MVP Baseball 2005 |
Portforward
|
80, 18210, 18215, 13505, 30900-30999 |
tcp |
applications |
Need for Speed Carbon |
Portforward
|
80,8511,28900 |
tcp |
applications |
Need for Speed Hot Pursuit 2 |
Portforward
|
80,13505,30900-30999 |
tcp |
applications |
Need for Speed Most Wanted |
Portforward
|
80,554 |
tcp |
applications |
Orb |
Portforward
|
80,443,5223 |
tcp |
applications |
PlayStation Network |
Portforward
|
80,8000 |
tcp |
applications |
Ports used by:
QSee QSC26404
QSee QSC26416
QSee QSD42208
QSee QSD42908 |
Portforward
|
80,5000-5001 |
tcp |
applications |
QSee QSD2216 |
Portforward
|
80,2000 |
tcp |
applications |
Ports used by:
QSee QSD2304L
QSee QSD2316L
QSee QSDF8204
QSee QSTD2308L
QSee QSTD2408
QSee QSTD2416
QSee QSTD5304 |
Portforward
|
80,1159-1161 |
tcp,udp |
applications |
Ports used by:
QSPDVR04
QSPDVR16
QSU2DVR04 |
Portforward
|
80,1518 |
tcp |
|
Ports used by:
Quadrox GuardDVR
Quadrox GuardNVR
Quadrox WebCCTV DVR
Quadrox WebCCTV NDVR
Quadrox WebCCTV NVR |
Portforward
|
80, 6667, 7777-7787, 8777-8787, 40000-42000 |
udp |
applications |
Rainbow Six 3 Raven Shield with Ubi.com |
Portforward
|
80, 2346-2348, 6668, 40000-42999 |
tcp |
applications |
Rainbow Six Lockdown with Ubi.com |
Portforward
|
80,3074 |
tcp |
applications |
Rainbow Six Vegas |
Portforward
|
80,29000,29100,29200 |
tcp |
applications |
ROSE Online |
Portforward
|
53,80,443,10070-10080 |
tcp |
applications |
Socom, Socom 2. Also uses ports 6000-6999,10070 udp |
Portforward
|
80,10070-10080 |
tcp |
applications |
Socom 3. Also uses ports 6000-7000,10070,10080 udp. |
Portforward
|
80,10070-10080 |
tcp |
applications |
Sony Playstation 3 |
Portforward
|
80,9393 |
tcp |
applications |
TalkSwitch |
Portforward
|
80,3000-3007,8800 |
tcp,udp |
applications |
Talon DVR |
Portforward
|
80,5190,10000,11000 |
tcp |
applications |
The Matrix Online |
Portforward
|
53,80,443,10070,10080 |
tcp |
applications |
Twisted Metal Black Online (also uses ports 6000-6999 udp) |
Portforward
|
80,4010,4011,1433 |
tcp |
applications |
Video Insight IP Server |
Portforward
|
80,1433,4000,11111 |
tcp |
applications |
Video Insight Server |
Portforward
|
80, 5911, 6667, 28900, 29900, 29901 |
tcp |
applications |
Worms 4 - Mayhem |
Portforward
|
80 |
tcp,udp |
http |
World Wide Web HTTP |
Nmap
|
80 |
tcp |
711trojan |
[trojan] 711 trojan (Seven Eleven) |
Neophasis
|
80 |
tcp |
AckCmd |
[trojan] AckCmd |
Neophasis
|
80 |
tcp |
BackEnd |
[trojan] Back End |
Neophasis
|
80 |
tcp |
BO2000Plug-Ins |
[trojan] Back Orifice 2000 Plug-Ins |
Neophasis
|
80 |
tcp |
Cafeini |
[trojan] Cafeini |
Neophasis
|
80 |
tcp |
CGIBackdoor |
[trojan] CGI Backdoor |
Neophasis
|
80 |
tcp |
Executor |
[trojan] Executor |
Neophasis
|
80 |
tcp |
GodMessage4Creator |
[trojan] God Message 4 Creator |
Neophasis
|
80 |
tcp |
GodMessage |
[trojan] God Message |
Neophasis
|
80 |
tcp |
Hooker |
[trojan] Hooker |
Neophasis
|
80 |
tcp |
IISworm |
[trojan] IISworm |
Neophasis
|
80 |
tcp |
MTX |
[trojan] MTX |
Neophasis
|
80 |
tcp |
NCX |
[trojan] NCX |
Neophasis
|
80 |
tcp |
Noob |
[trojan] Noob |
Neophasis
|
80 |
tcp |
Ramen |
[trojan] Ramen |
Neophasis
|
80 |
tcp |
ReverseWWWTunnel |
[trojan] Reverse WWW Tunnel Backdoor |
Neophasis
|
80 |
tcp |
RingZero |
[trojan] RingZero |
Neophasis
|
80 |
tcp |
RTB666 |
[trojan] RTB 666 |
Neophasis
|
80 |
tcp |
Seeker |
[trojan] Seeker |
Neophasis
|
80 |
tcp |
WANRemote |
[trojan] WAN Remote |
Neophasis
|
80 |
tcp |
WebDownloader |
[trojan] WebDownloader |
Neophasis
|
80 |
tcp |
WebServerCT |
[trojan] Web Server CT |
Neophasis
|
80 |
tcp |
threat |
711 trojan (Seven Eleven) |
Bekkoame
|
80 |
tcp |
threat |
AckCmd |
Bekkoame
|
80 |
tcp |
threat |
Back End |
Bekkoame
|
80 |
tcp |
threat |
Back Orifice 2k Plug-Ins |
Bekkoame
|
80 |
tcp |
threat |
Banito |
Bekkoame
|
80 |
tcp |
threat |
Bebshell |
Bekkoame
|
80 |
tcp |
threat |
Cafeini |
Bekkoame
|
80 |
tcp |
threat |
CGI Backdoor |
Bekkoame
|
80 |
tcp |
threat |
Civcat |
Bekkoame
|
80 |
tcp |
threat |
Eaghouse |
Bekkoame
|
80 |
tcp |
threat |
Executor |
Bekkoame
|
80 |
tcp |
threat |
God Message |
Bekkoame
|
80 |
tcp |
threat |
God Message Creator |
Bekkoame
|
80 |
tcp |
threat |
Hesive |
Bekkoame
|
80 |
tcp |
threat |
Hexem |
Bekkoame
|
80 |
tcp |
threat |
Hooker |
Bekkoame
|
80 |
tcp |
threat |
IISworm |
Bekkoame
|
80 |
tcp |
threat |
Ketch |
Bekkoame
|
80 |
tcp |
threat |
Lodear |
Bekkoame
|
80 |
tcp |
threat |
Mindos |
Bekkoame
|
80 |
tcp |
threat |
MTX |
Bekkoame
|
80 |
tcp |
threat |
Muquest |
Bekkoame
|
80 |
tcp |
threat |
Mydoom |
Bekkoame
|
80 |
tcp |
threat |
NCX |
Bekkoame
|
80 |
tcp |
threat |
Reverse WWW Tunnel Backdoor |
Bekkoame
|
|
100 records found
|
jump to:
|
Related ports: 81 88 443 591 8008 8009 8080 8081 8443 10080
« back to SG Ports
External Resources
SANS ISC: port 80
Notes:
Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify
a specific process, or network service. IANA is responsible for internet protocol resources, including the registration of commonly
used port numbers for well-known internet services.
Well Known Ports: 0 through 1023.
Registered Ports: 1024 through 49151.
Dynamic/Private : 49152 through 65535.
TCP ports use the Transmission Control Protocol, the most commonly used protocol
on the Internet and any TCP/IP network. TCP enables two hosts
to establish a connection and exchange streams of data. TCP guarantees delivery of data
and that packets will be delivered in the same order in which they were sent.
Guaranteed communication/delivery is the key difference between TCP and UDP.
UDP ports use the Datagram Protocol. Like TCP, UDP is used in combination with IP (the Internet Protocol)
and facilitates the transmission of datagrams from one computer to applications on another computer,
but unlike TCP, UDP is connectionless and does not guarantee reliable communication; it's up to the application that received
the message to process any errors and verify correct delivery. UDP is often used with time-sensitive
applications, such as audio/video streaming and realtime gaming, where dropping some packets is preferable to waiting for delayed data.
When troubleshooting unknown open ports, it is useful to find exactly what services/processes are listening to them.
This can be accomplished in both Windows command prompt and Linux variants using the "netstat -aon" command.
We also recommend runnig multiple anti-virus/anti-malware scans to rule out the possibility of active malicious software.
For more detailed and personalized help please use our forums.
Please use the "Add Comment" button below to provide additional information or comments about port 80.
|
|
|
|