Shortcuts
|
Port 8000 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
8000 |
tcp |
trojans |
Commonly used as an alternate HTTP port. Some firewalls use it for HTTP web administration. Also commonly used for internet radio streams using Nicecast/Icecast/Shoutcast/Winamp audio streaming.
Applications that use this port:
PFSense
VmWare VMotion
Nortel Firewall User Authentication
Barracuda Web Administration
AWS Local DynamoDB
Canon Management Console
Dell OpenManage (remote management for Dell Servers)
MediaBank
JRun Management Console
Splunk
Django Dev Server
Chef service "opscode-erchef" uses 8000/TCP to handle Chef server API requests
HIKVISION iVMS software uses 8000 port for connect clients to PCNVR server
Seafile Windows Server uses the following TCP ports: 8000 (seahub web interface), 8082 (seafile server), 10001 (ccnet), 12001 (seaf-server).
X-Lite
Verint Vid-Center [vid-center.exe], Windows enterprise network DVR application
Fortinet FortiGate uses the following ports (in addition to standard ports 53, 80, 443):
514 tcp - FortiAP logging and reporting
541 tcp, 542 tcp - FortiGuard management
703 tcp/udp. 730 udp - FortiGate heartbeat
1000 tcp, 1003 tcp - policy override keepalive
1700 tcp - FortiAuthenticator RADIUS disconnect
5246 udp - FortiAP-S event logs
8000, 8001 tcp - FortiClient SSO mobility agent
8008, 8010 tcp - policy override authentication
8013 tcp - FortiClient v.5.4
8014 tcp - Forticlient v.6
8890 tcp - AV/IPS updates, management, firmware
9443 udp - AV/IPS
9582 tcp - FortiGuard Cloud App DB (flow.fortinet.net)
Splunk (big data analysis software) uses the following ports by default:
514 - network input port
8000 - web port (clients accessing the Splunk search page)
8080 - index replication port
8089 - management port (splunkd, aslo used by deployment server)
9997 - indexing port (web interface)
9998 - SSL port
Malware using this port:
W32.Gaobot.CEZ [Symantec-2005-012609-1021-99] (01.25.2005) - Worm with backdoor capabilities. Spreads trough exploiting various vulnerabilities (ports 80, 135, 445). Blocks access to security-related websites and terminates some processes. Connects to an IRC server and listens on port 8000.
W32.Spybot.OGX [Symantec-2005-050217-0724-99] (2005.05.02) - network-aware worm with distributed denial of service and backdoor capabilities. Opens a backdoor by connecting to an IRC server on port 8000/tcp.
W32.Mytob.JW@mm [Symantec-2005-100312-4423-99] (2005.10.04) - a mass-mailing worm with backdoor capabilities that lowers security settings on the compromised computer. Opens a backdoor and listens for remote commands on port 8000/tcp. Also uses port 10027/tcp to download a copy of the worm.
JSMP3OGGWt.dll in JetCast Server 2.0.0.4308 allows remote attackers to cause a denial of service (daemon crash) via a long .mp3 URI to TCP port 8000.
References: [CVE-2007-4911] [BID-25660]
Gordano NTMail 6.0.3c allows a remote attacker to create a denial of service via a long (>= 255 characters) URL request to port 8000 or port 9000.
References: [CVE-2001-0585] [BID-2494]
Stack-based buffer overflow in collectoragent.exe in Fortinet Single Sign On (FSSO) before build 164 allows remote attackers to execute arbitrary code via a large PROCESS_HELLO message to the Message Dispatcher on TCP port 8000.
References: [CVE-2015-2281]
Port is also IANA registered for iRDMI. |
SG
|
8000 |
udp |
games |
Aliens vs Predator uses ports 8000-8999 |
SG
|
8000 |
tcp,udp |
|
iRDMI (Intel Remote Desktop Management Interface) - sometimes erroneously used instead of port 8080 (official) |
Wikipedia
|
8000 |
tcp |
|
Commonly used for internet radio streams such as those using SHOUTcast (unofficial) |
Wikipedia
|
8000 |
tcp |
irdmi |
iRDMI |
SANS
|
8000-8001 |
tcp |
applications |
Icecast |
Portforward
|
7171,8000 |
tcp,udp |
applications |
Otserv |
Portforward
|
1034-1035,2644,8000 |
tcp |
applications |
PhoneFree |
Portforward
|
80,8000 |
tcp |
applications |
Ports used by:
QSee QSC26404
QSee QSC26416
QSee QSD42208
QSee QSD42908 |
Portforward
|
8000-8001 |
tcp,udp |
applications |
ShoutCast |
Portforward
|
8000-8001,8888 |
tcp,udp |
applications |
Well of Souls with MIX |
Portforward
|
8000-8001 |
tcp |
applications |
Winamp Audio Streaming |
Portforward
|
5060,8000-8005 |
tcp |
applications |
X-Lite |
Portforward
|
8000 |
tcp |
http-alt |
A common alternative http port |
Nmap
|
8000 |
tcp |
threat |
W32.Gaobot |
Bekkoame
|
8000 |
tcp |
threat |
W32.Mytob |
Bekkoame
|
8000 |
tcp |
threat |
W32.Spybot |
Bekkoame
|
8000 |
tcp,udp |
irdmi |
iRDMI |
IANA
|
|
18 records found
|
jump to:
|
Related ports: 80 514 8082 8089 9000 9997 9998 10001 12001
« back to SG Ports
External Resources
SANS ISC: port 8000
Notes:
Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify
a specific process, or network service. IANA is responsible for internet protocol resources, including the registration of commonly
used port numbers for well-known internet services.
Well Known Ports: 0 through 1023.
Registered Ports: 1024 through 49151.
Dynamic/Private : 49152 through 65535.
TCP ports use the Transmission Control Protocol, the most commonly used protocol
on the Internet and any TCP/IP network. TCP enables two hosts
to establish a connection and exchange streams of data. TCP guarantees delivery of data
and that packets will be delivered in the same order in which they were sent.
Guaranteed communication/delivery is the key difference between TCP and UDP.
UDP ports use the Datagram Protocol. Like TCP, UDP is used in combination with IP (the Internet Protocol)
and facilitates the transmission of datagrams from one computer to applications on another computer,
but unlike TCP, UDP is connectionless and does not guarantee reliable communication; it's up to the application that received
the message to process any errors and verify correct delivery. UDP is often used with time-sensitive
applications, such as audio/video streaming and realtime gaming, where dropping some packets is preferable to waiting for delayed data.
When troubleshooting unknown open ports, it is useful to find exactly what services/processes are listening to them.
This can be accomplished in both Windows command prompt and Linux variants using the "netstat -aon" command.
We also recommend runnig multiple anti-virus/anti-malware scans to rule out the possibility of active malicious software.
For more detailed and personalized help please use our forums.
Please use the "Add Comment" button below to provide additional information or comments about port 8000.
|
|
|
|