The Broadband Guide
SG
search advanced

Vulnerable Ports

This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats. We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please . Any feedback and suggestions can also be posted to our Security forum.

 1 |....| 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 
Port(s) Protocol Service Scan level Description
 44123 tcp z-wave-s not scanned Z-Wave Secure Tunnel [Sigma Designs Inc] (IANA official)
 44280 tcp trojans Premium scan Backdoor.Amitis.B [Symantec-2003-051915-1012-99] (2003.05.19) Windows remote access trojan. Listens on ports 3547, 7823, 12345, 13173, 44280, 44390, 47387, 64429. Other variants of Backdoor.Amitis also use ports 27, 551.
 44323 udp pcp not scanned IANA registered for: Port Control Protocol
 44333 tcp,udp applications not scanned Kerio MailServer, Kerio Personal Firewall, and Kerio WinRoute Firewall are vulnerable to a denial of service attack. A remote attacker, with access to the administration ports, 44333, 44334, and 44337 could send specially-crafted data to exceed the amount of connections allowed, resulting in a denial of service.
References: [BID-13458], [CVE-2005-1063], [XFDB-20337]
 44334 tcp,udp tiny firewall Members scan Remote administration port used by Tiny Personal Firewall, and Kerio Personal firewall.
There is a possible exploit in Kerio Personal Firewall using this port: SecuriTeam 5HP0A2AA1Y
Also Kerio personal firewall has hidden "Internal Traffic Rules" that allow for open ports not being displayed in the GUI.

A remote attacker, with access to the administration ports, 44333, 44334, and 44337 could send specially-crafted data to exceed the amount of connections allowed, resulting in a denial of service.
References: [BID-13458], [CVE-2005-1063], [XFDB-20337]
 44337 tcp,udp applications not scanned Kerio MailServer, Kerio Personal Firewall, and Kerio WinRoute Firewall are vulnerable to a denial of service attack. A remote attacker, with access to the administration ports, 44333, 44334, and 44337 could send specially-crafted data to exceed the amount of connections allowed, resulting in a denial of service.
References: [BID-13458], [CVE-2005-1063], [XFDB-20337]
 44390 tcp trojans Premium scan Backdoor.Amitis.B [Symantec-2003-051915-1012-99] (2003.05.19) Windows remote access trojan. Listens on ports 3547, 7823, 12345, 13173, 44280, 44390, 47387, 64429. Other variants of Backdoor.Amitis also use ports 27, 551.
 44405 tcp,udp applications not scanned Mu Online
 44444 tcp trojan Members scan Prosiak trojan
Cognex DataMan Management Protocol [Cognex] (IANA official)

Cisco Prime Central for Hosted Collaboration Solution (HCS) Assurance 8.6 and 9.x before 9.2(1) allows remote attackers to cause a denial of service (memory consumption) via a flood of TCP packets to port 44444, aka Bug ID CSCtz92776.
References: [CVE-2013-3388]
 44445 tcp acronis-backup not scanned Acronis Backup Gateway service port (IANA registered)

Malware: W32.Kibuv
 44488 tcp,udp applications not scanned BackupStream
 44490 tcp,udp applications not scanned BAckNBiz
 44501 tcp kerio Members scan Port used by Kerio Personal Firewall pop-up blocking.
There is a script that sends information on this port about blocked pages. Also, reportedly Kerio personal firewall has "Internal traffic rules" for open ports not displayed in the GUI.
 44544 udp domiq not scanned DOMIQ Building Automation [DOMIQ Sp zoo] (IANA official)
 44575 tcp trojan Premium scan Exploiter trojan
 44600 udp asihpi not scanned IANA registered for: AudioScience HPI
 44624 udp games not scanned Virtual Tennis, developer: Strangelite
 44767 tcp,udp trojan not scanned School Bus trojan
 44818 tcp,udp ethernetip not scanned Rockwell Encapsulation

Cognex In-Signt (IANA official) uses these ports:
68 udp - DHCP In-Signt vision system only
502 tcp - Modbus
1069 tcp/udp - In-Sight
1070 tcp - machine status data
2222 udp - Ethernet IP
5753 tcp - audit message server
44818 tcp/udp - Ethernet IP
51069 tcp - In-Sight secure

IANA registered for EtherNet/IP messaging


Cisco IOS is vulnerable to a denial of service, caused by an error within the Common Industrial Protocol (CIP) feature when processing malicious packets. By sending specially-crafted IPv4 packets destined to TCP port 44818, a remote attacker could exploit this vulnerability to cause the device to reload.
References: [CVE-2015-0649], [XFDB-101804]

Rockwell Automation ControlLogix is vulnerable to a denial of service, caused by the improper validation of input being sent to the buffer. By sending a specially-crafted CIP message to TCP and UDP ports 2222 and 44818, a remote attacker could exploit this vulnerability to cause the CPU to stop logic execution and enter a denial of service.
References: [XFDB-81235]

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.
References: [CVE-2018-14829]

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat actor may intentionally send specially crafted Ethernet/IP packets to Port 44818, causing the software application to stop responding and crash. The user must restart the software to regain functionality.
References: [CVE-2018-14827]

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.
References: [CVE-2018-14821]

Tec4Data SmartCooler is vulnerable to a denial of service, caused by missing authentication for a critical function. By sending a specially crafted CIP packet to Port 44818, a remote attacker could exploit this vulnerability to cause a denial of service.
References: [CVE-2018-14796], [XFDB-150211]
 44900 tcp,udp m3da not scanned M3DA is used for efficient machine-to-machine communications [Eclipse Foundation] (IANA official)
 45000 tcp cisco-ids not scanned CiscoSecure IDS communication
Monitoring Protocol data transfer NSi AutoStore Status [Notable Solutions Inc] (IANA official)
 45000 udp games not scanned Brothers in Arms: Road To Hill 30, Heroes of Might and Magic V
Monitoring Protocol device, monitoring NSi AutoStore Status [Notable Solutions Inc] (IANA official)
 45001 udp games not scanned Brothers in Arms: Road To Hill 30
 45001 tcp asmps not scanned Monitoring Protocol secure data transfer [Notable Solutions Inc] (IANA official)
 45002 tcp rs-status not scanned Redspeed Status Monitor (IANA official)
 45054 tcp,udp invision-ag not scanned InVision AG
 45092 tcp trojan Premium scan BackGate Kit
 45100 tcp,udp applications not scanned Limewire client magnet, Azureus
 45185 tcp,udp witsnet not scanned Wire and Wireless transfer on synchroniz (IANA official)
 45395 udp whatsapp not scanned WhatsApp uses these ports:
80, 443, 4244, 5222, 5223, 5228, 5242 TCP
50318, 59234 TCP/UDP
3478, 45395 UDP
 45454 tcp trojan Premium scan Osiris trojan
 45456 tcp httptoolkit not scanned HTTP Toolkit (https://httptoolkit.tech) uses ports 45456/tcp and 45457/tcp as part of its internal communication and management API
 45457 tcp httptoolkit not scanned HTTP Toolkit (https://httptoolkit.tech) uses ports 45456/tcp and 45457/tcp as part of its internal communication and management API
 45514 tcp cloudcheck not scanned IANA registered for: ASSIA CloudCheck WiFi Management System
 45514 udp cloudcheck-ping not scanned IANA registered for: ASSIA CloudCheck WiFi Management keepalive
 45559 tcp trojan Premium scan Maniac rootkit trojan
 45631 tcp applications not scanned Air Video
 45632 tcp trojan Premium scan Little Witch trojan
 45672 tcp trojans Premium scan Backdoor.Delf.F [Symantec-2003-040117-4857-99] backdoor trojan that gives a hacker access to your computer. By default, it opens TCP ports 25226 and 45672. The existence of the file Svced.exe is an indication of a possible infection.
 45673 tcp trojans Premium scan Backdoor.Acropolis [Symantec-2001-021616-0142-99] remote access trojan, affects Windows, listens on TCP ports 32791, 45673.
 45678 tcp,udp eba not scanned EBA PRISE
 45682 tcp,udp applications not scanned pseudo-default uTorrent port
 45824 tcp dai-shell not scanned Server for the DAI family of client-server products [Data Access Inc] (IANA official)
 45836 tcp,udp worm not scanned W32.HLLW.Graps [Symantec-2003-070717-0814-99] - a network-aware worm with backdoor capabilities. By default, it opens port 45836 for listening. The worm copies itself to available network shares by connecting with weak passwords.
 45869 tcp hydrus not scanned Hydrus Network client API default port
 45966 tcp,udp ssr-servermgr not scanned SSRServerMgr
 46000 tcp,udp games not scanned Strike Fighters Project 1, developer: Third Wire
 46318 tcp applications not scanned Soft Circle French-Bread Melty Blood: Actress Again: Current Code through 1.07 Rev. 1.4.0 allows a remote attacker to execute arbitrary code on a client's machine via a crafted packet on TCP port 46318.
References: [CVE-2024-39704]
 46336 tcp inedo not scanned IANA registered for: Inedo agent communication
 46440 udp games not scanned Scrabble Complete
 46626 tcp trojan Premium scan Psychward [Symantec-2001-052208-1840-99] - trojan with backdoor capabilities.
 46631 tcp games not scanned Hedgewars game
 46666 tcp,udp trojan not scanned Taskman trojan
 46823 tcp applications not scanned Stack-based buffer overflow in Sielco Sistemi Winlog Pro 2.07.00 and earlier, when Run TCP/IP server is enabled, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a crafted 0x02 opcode to TCP port 46823.
References: [CVE-2011-0517], [BID-45813], [EDB-15992]
 46824 tcp applications not scanned Sielco Sistemi Winlog Pro SCADA before 2.07.17 and Winlog Lite SCADA before 2.07.17 do not validate the return value of the realloc function, which allows remote attackers to cause a denial of service (invalid 0x00 write operation and daemon crash) or possibly have unspecified other impact via a port-46824 TCP packet with a crafted positive integer after the opcode.
References: [CVE-2012-4358] [SECUNIA-49395]

Buffer overflow in RunTime.exe in Sielco Sistemi Winlog Pro SCADA before 2.07.18 and Winlog Lite SCADA before 2.07.18 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 46824. NOTE: some of these details are obtained from third party information.
References: [CVE-2012-3815] [BID-53811] [OSVDB-82654] [SECUNIA-49395]
 46882 tcp trojan Premium scan Psychward [Symantec-2001-052208-1840-99] - trojan with backdoor capabilities.
 46998 tcp sp-remotetablet not scanned Connection between a desktop computer or server and a signature tablet to capture handwritten signatures [SOFTPRO GmbH] (IANA official)
 47000 tcp,udp mbus not scanned Message Bus
 47001 tcp winrm not scanned Windows Remote Management Service
 47017 tcp trojan Premium scan T0rn Rootkit trojan
 47100 udp jvl-mactalk not scanned Configuration of motors connected to Industrial Ethernet [JVL_Industri_Elektronik] (IANA official)
 47141 tcp,udp applications not scanned Dartpro
 47252 tcp trojan Premium scan Delta Source trojan
 47262 udp trojan not scanned Delta Source trojan
 47387 tcp trojans Premium scan Backdoor.Amitis.B [Symantec-2003-051915-1012-99] (2003.05.19) Windows remote access trojan. Listens on ports 3547, 7823, 12345, 13173, 44280, 44390, 47387, 64429. Other variants of Backdoor.Amitis also use ports 27, 551.
 47545 udp canon not scanned Canon printers management console uses these ports (in addition to standard ports 25, 80, 110, 137, 389, 443, etc.):
427 UDP - SLP multicast discovery
5355 TCP/UDP - LLMNR device discovery for SNMP, SLP
8000, 8080 TCP - UI HTTP access
11427 UDP - device sleep notifications
47545 UDP - communication with devices
47547 TCP - communication with devices
 47547 tcp canon not scanned Canon printers management console uses these ports (in addition to standard ports 25, 80, 110, 137, 389, 443, etc.):
427 UDP - SLP multicast discovery
5355 TCP/UDP - LLMNR device discovery for SNMP, SLP
8000, 8080 TCP - UI HTTP access
11427 UDP - device sleep notifications
47545 UDP - communication with devices
47547 TCP - communication with devices
 47557 tcp,udp dbbrowse not scanned Databeam Corporation
 47611 tcp,udp games not scanned Vindictus MMORPG (devCAT) uses ports 47611 tcp/udp and 27000-27025 tcp/udp
 47624 tcp,udp applications not scanned Battlecom, Age of Empires II, MechCommander 2, Star Wars Galactic Battlegrounds, Flight Simulator 2002 (TCP), Total Annihilation (TCP), Stronghold Crusader (TCP), Cossacks (TCP).
Spiral Knights uses ports 47624-47634.
IANA registered for Direct Play Server.
 47626 udp games not scanned Sudden Strike
 47634 tcp,udp games not scanned Spiral Knights uses ports 47624-47634
 47698 tcp trojan Premium scan KiLo trojan [Symantec-2003-021319-1815-99]
 47785 tcp,udp trojan not scanned KiLo trojan [Symantec-2003-021319-1815-99]
 47800 tcp,udp applications not scanned Outpost 2 Divided Destiny

Infostealer.Reoxtan [Symantec-2005-090511-5408-99] - a trojan horse program that attempts to steal user names, passwords, and other computer information. It also attempts to lower security settings on the compromised computer.
 47806 tcp,udp ap not scanned ALC Protocol
 47808 tcp,udp bacnet not scanned The BACNet Test Server is vulnerable to a denial of service (DoS) vulnerability when sending malformed BVLC Length UDP packet to port 47808 causing the application to crash.
References: [EDB-48860]

IANA registered for: Building Automation and Control Networks
 47837 udp games not scanned Will Rock, developer: Saber Interactive
 47885 tcp malware not scanned Backdoor.Win32.Indexer.a / Hardcoded Weak Credentials - Indexer.a backdoor runs an FTP server that listens on TCP port 47885 and uses several weak hardcoded credentials "Ronald Reagen", "Boris Becker", "Donald Duck". The credentials can be easily veiwed in the binary using strings util. This can allow anyone with up front knowledge to logon to the infected system.
References: [MVID-2021-0091]
 47891 tcp trojans Premium scan Backdoor.AntiLam [Symantec-2002-060715-0902-99], a.k.a. AntiLamer backdoor - remote access trojan, affects Windows, listens on TCP ports 29559 and 47891, may also use port 29999.

Backdoor.Win32.Antilam.14.o / Unauthenticated Remote Command Execution - the malware listens on TCP ports 47891, 29559. Third party attackers who can reach infected systems can execute commands made available by the backdoor. Netcat utility worked the best for running commands, which are supplied as numeric values or hex characters. The values sent correspond to different commands mapped in the backdoor. Commands are typically three digits e.g. 001 and perform various actions on the infected host.
References: [MVID-2021-0379]
 48000 tcp,udp nimcontroller not scanned World in Conflict (WIC) 1.008 and earlier allows remote attackers to cause a denial of service (access violation and crash) via a zero-byte data block to TCP port 48000, which triggers a NULL pointer dereference.
References: [CVE-2008-6713], [BID-29888]

Massive Entertainment World in Conflict 1.001 and earlier allows remote attackers to cause a denial of service (failed assertion and daemon crash) via a large packet to TCP or UDP port 48000.
References: [CVE-2007-5711] [OSVDB-39019] [SECUNIA-27417]

Port is also IANA registered for Nimbus Controller.
 48001 tcp,udp nimspooler not scanned Nimbus Spooler
 48002 tcp,udp nimhub not scanned Nimbus Hub
 48003 tcp,udp nimgtw not scanned Nimbus Gateway
 48004 tcp trojan Premium scan Fraggle Rock trojan

IANA registered for: NimbusDB Connector.
 48005 tcp nimbusdbctrl not scanned IANA registered for: NimbusDB Control
 48006 tcp trojan Premium scan Fraggle Rock trojan
 48048 tcp juliar not scanned IANA registered for: Juliar Programming Language Protocol
 48049 tcp,udp 3gpp not scanned 3GPP Cell Broadcast Service Protocol
 48094 tcp trojans Premium scan Backdoor.Nibu.M [2005-071112-2150-99] - a trojan with backdoor capabilities, that runs a keylogger, sends information periodically to a remote server (via http), and also blocks access to security-related websites. Listens for remote commands on port 48094/tcp.
 48101 tcp applications not scanned Stack-based buffer overflow in PQCore.exe in Print Manager Plus 2008 Client Billing and Authentication allows remote attackers to cause a denial of service (service outage) via a series of long packets to TCP port 48101.
References: [CVE-2008-0693], [BID-27604]
 48512 tcp trojan Premium scan Arctic trojan
 48556 tcp,udp com-bardac-dw not scanned com-bardac-dw, drive.web AC/DC Drive Automation and Control Networks
 48653 tcp,udp robotraconteur not scanned Robot Raconteur transport - a communication library for robotics and automation, developed by Wason Technology, LLC [Wason_Technology_LLC] (IANA official)
 48705 tcp viera not scanned Panasonic Viera cast may use the following ports: 80, 443, 43654, 48705
 48899 udp applications not scanned The Beckhoff TwinCAT version <= 2.11.0.2004 can be brought down by sending a crafted UDP packet to port 48899 (TCATSysSrv.exe).
References: [CVE-2011-3486], [OSVDB-75495]
 49000 tcp trojan Premium scan Fraggle Rock trojan

IANA registered for: Matahari Broker
 49001 udp games not scanned Far Cry

IANA registered for: Nuance Unity Service Discovery Protocol
 49001 tcp nusrp not scanned IANA registered for: Nuance Unity Service Request Protocol
 49002 tcp,udp games not scanned Far Cry

Vulnerabilities listed: 100 (some use multiple ports)
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About