speedguide.net  

Port 8889 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
8889 tcp Siemens Polarion ALM
NeterraProxy (Netera IPTV Proxy)
NewsEDGE server
Ninite Cache server
MAMP Server

Games using this port: Command & Conquer Theater of War, Blitzkrieg (TCP/UDP), Earthland Relams 2 Server (AU1_1)

W32.Axatak [Symantec-2002-082217-5638-99] - password stealing virus with remote access trojan capabilities. Affects all current Windows versions, uses ports 8888 and 8889.

3Com NBX V3000 could allow a remote attacker to gain unauthorized access to the device using an open port. Port 8889 is open by default and provides access to the VxWorks WDB debug service (wdbrpc). An attacker could connect to this port to obtain sensitive information.
References: [XFDB-84786]

Google Chrome OS could allow a local attacker to execute arbitrary commands on the system, caused by improper access control in the garcon service control. By sending specially-crafted arguments to TCP port 8889, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
References: [XFDB-149836], [EDB-45407]


ddi-tcp-1 NewsEDGE server (IANA official)
SG
3074,8888-8889 udp applications Splinter Cell Double Agent Portforward
8889 tcp,udp threat W32.Axatak Bekkoame
8889 tcp ddi-tcp-2 Desktop Data TCP 1. Known Unauthorized Use on port 8889 IANA
8889 udp ddi-udp-2 NewsEDGE server broadcast. Known Unauthorized Use on port 8889 IANA
5 records found

Related ports: 8888  9089  

News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About