The Broadband Guide
SG
search advanced

Port 80 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
80 udp trojans W32.Beagle.AO@mm [Symantec-2004-080911-3251-99] - mass-mailing worm with backdoor functionality. Uses its own SMTP engine, discovered 08.09.2004. Opens port 80 tcp & udp.

W32.Bobax.AF@mm [Symantec-2005-081611-4121-99] (2005.08.15) - a mass-mailing worm that opens a backdoor and lowers security settings on the compromised computer. It exploits the MS Plug and Play Buffer Overflow vulnerability (MS Security Bulletin [MS05-039]) on port 21/tcp., and by sending copies of itself to gathered email addresses. Also opens a backdoor on a random tcp port and/or port 80/udp.

Siemens SINEMA Server before 12 SP1 allows remote attackers to cause a denial of service (web-interface outage) via crafted HTTP requests to port 80 (TCP/UDP).
References: [CVE-2014-2733]

Multiple directory traversal vulnerabilities in the integrated web server in Siemens SINEMA Server before 12 SP1 allow remote attackers to access arbitrary files via HTTP traffic to port (1) 4999 or (2) 80.
References: [CVE-2014-2732]

Multiple directory traversal vulnerabilities in the integrated web server in Siemens SINEMA Server before 12 SP1 allow remote attackers to access arbitrary files via HTTP traffic to port (1) 4999 or (2) 80.
Reference: [CVE-2014-2731]

Port 80 udp is also used by some games, like Alien vs Predator (Activision).
SG
80 tcp http Hyper Text Transfer Protocol (HTTP) - port used for web traffic.

Some broadband routers run a web server on port 80 or 8080 for remote management. WAN Administration can (and should, in most cases) be disabled using the Web Admin interface.

AnyDesk remote desktop software uses TCP ports 80, 443, 6568, 7070 (direct line connection)

If you're not running web services, keep in mind that a number of trojans/worms/backdoors propagate via TCP port 80 (HTTP):
Code Red, Nimda, 711 trojan (Seven Eleven), AckCmd, Back End, Back Orifice 2000 Plug-Ins, Cafeini, CGI Backdoor, Executor, God Message, God Message Creator, Hooker, IISworm, MTX, NCX, Nerte 7.8.1, Reverse WWW Tunnel Backdoor, RingZero, Seeker, WAN Remote, Web Server CT, WebDownloader
Trojan.Webus.C [Symantec-2004-101212-0903-99]
W32.Beagle.AO@mm [Symantec-2004-080911-3251-99] - mass-mailing worm with backdoor functionality. Uses its own SMTP engine, discovered 08.09.2004. Opens port 80 tcp & udp.
Mydoom.B [Symantec-2004-012816-3647-99] (2004.01.28) - mass-mailing worm that opens a backdoor into the system. The backdoor makes use of TCP ports 80, 1080, 3128, 8080, and 10080.
Backdoor.Ranky.S [Symantec-2005-013015-4228-99] (2005.01.30) - runs proxy on port 80.
W32.Crowt.A@mm [Symantec-2005-012310-2158-99] (2005.01.23) - mass mailing worm, opens a backdoor, logs keystrokes. Uses ports 80 and 137.
Backdoor.Darkmoon.B [Symantec-2005-102115-3914-99] (2005.10.21) - a backdoor trojan with keylogger capabilities. Opens a backdoor and listens for remote commands on port 80/tcp.
W32.Beagle.CX@mm [Symantec-2005-121511-1751-99] (2005.12.16) - mass-mailing worm that uses its own SMTP engine to spread Trojan.Lodear.E [Symantec-2005-121516-1510-99]. Also opens a backdoor on port 80/tcp and lowers security settings on the compromised computer.
Trojan.Lodear.F [Symantec-2005-121513-5818-99] (2005.12.18) - trojan that attempts to download remote files.
W32.Feebs [Symantec-2006-013122-5631-99] (2006.01.07)

Xbox 360 (LIVE) ports: 3074 TCP/UDP, 53 TCP/UDP, 80 TCP, 88 UDP
Xbox One (LIVE) ports: 3074 TCP/UDP, 53 TCP/UDP, 80 TCP, 88 UDP, 500 UDP, 3544 UDP, 4500 UDP

Some Apple applications also use port 80 (TCP): MobileMe, Sherlock, QuickTime Installer, iTunes Store and Radio, Software Update, RAID Admin, Backup, iCal calendar publishing, iWeb, MobileMe Web Gallery Publishing, WebDAV (iDisk), Final Cut Server.

Siemens SIPROTEC 4 and SIPROTEC Compact is vulnerable to a denial of service, caused by an error in the EN100 Ethernet module. By sending specially-crafted HTTP packets to TCP port 80, a remote attacker could exploit this vulnerability to cause the device to go into defect mode.
References: [CVE-2016-7113] [XFDB-116647]

A vulnerability was discovered in Siemens ViewPort for Web Office Portal before revision number 1453 that could allow an unauthenticated remote user to upload arbitrary code and execute it with the permissions of the operating-system user running the web server by sending specially crafted network packets to port 443/TCP or port 80/TCP.
References: [CVE-2017-6869], [BID-99343]
SG
80 tcp Hypertext Transfer Protocol (HTTP) (official) Wikipedia
80 tcp trojan 711 trojan (Seven Eleven), AckCmd, BlueFire, Cafeini, Duddie, Executor, God Message, Intruzzo , Latinus, Lithium, MscanWorm, NerTe, Nimda, Noob, Optix Lite, Optix Pro , Power, Ramen, Remote Shell , Reverse WWW Tunnel Backdoor , RingZero, RTB 666, Scalper, Screen Cutter , Seeker, Slapper, Web Server CT , WebDownloader Trojans
80 udp trojan Penrox Trojans
80 tcp,udp www World Wide Web HTTP SANS
80,2300 tcp applications Age of Empires III Portforward
80 tcp,udp applications Applications/Games that use port 80:

ATT Remote Monitor
BT Homesafe
Dungeons + Dragons Online
Eyeon
Gadspot IP Camera
Halo
Lord of the Rings Online
Lorex IP Surveillance
MythTV
QSee QSD6204
QSee QSD6209
Rise of Legends
Portforward
22,57,80,3660,3663,4665 tcp,udp applications AudioReQuest Portforward
80,443 tcp applications BarracudaDrive Portforward
80, 4711, 18060, 28910, 29900, 29901, 29920 tcp applications Battlefield 2 Portforward
80, 443, 1024-1124, 4711, 9960-9969, 17475, 18060, 18120, 18300, 18510, 27900, 28910, 29900 tcp applications Battlefield 2142 Portforward
80,443,3074,5223 tcp applications Call of Duty - World at War Portforward
80,6667,28910,29900,29920 tcp applications Command and Conquer Generals Portforward
80, 3783, 6500, 6515, 6667, 13139, 27900, 28900, 28910, 29900, 29901, 29920 tcp applications Command and Conquer Generals GameSpy Portforward
80, 3783, 4321, 6660-6669, 28900, 29900, 2901 tcp applications Command and Conquer Red Alert 3 Portforward
80,6667,28910,29900,29920 tcp applications Command and Conquer Zero Hour Portforward
80, 3783, 6500, 6515, 6667, 13139, 27900, 28900, 28910, 29900, 29901, 29920 tcp applications Command and Conquer Zero Hour GameSpy Portforward
80, 2300-2400, 3783, 13139, 27900, 28900, 29900-29901, 34000-34005 udp applications Cossacks II Portforward
80,5938 tcp applications DynGate Portforward
21, 80, 3389, 4550, 5550, 6550, 9650 tcp applications GeoVision TwinDVR with Webcam Portforward
21,80,3389,4550,5550,6550 tcp applications GeoVision Webcam Portforward
80,6112 tcp applications Guild Wars Portforward
80,6667,21000,40000-42000 tcp applications IL2-Sturmovik Ubi.com Portforward
80,2106,7777 tcp applications L2J Portforward
80,2106,2009,7777 tcp applications Lineage II Portforward
80,6667,10308,40000-42000 tcp applications Lock On Modern Air Combat Ubi.com Portforward
80,13505,30900-30999 tcp applications MVP Baseball 2005 Portforward
80, 18210, 18215, 13505, 30900-30999 tcp applications Need for Speed Carbon Portforward
80,8511,28900 tcp applications Need for Speed Hot Pursuit 2 Portforward
80,13505,30900-30999 tcp applications Need for Speed Most Wanted Portforward
80,554 tcp applications Orb Portforward
80,443,5223 tcp applications PlayStation Network Portforward
80,8000 tcp applications Ports used by:

QSee QSC26404
QSee QSC26416
QSee QSD42208
QSee QSD42908
Portforward
80,5000-5001 tcp applications QSee QSD2216 Portforward
80,2000 tcp applications Ports used by:

QSee QSD2304L
QSee QSD2316L
QSee QSDF8204
QSee QSTD2308L
QSee QSTD2408
QSee QSTD2416
QSee QSTD5304
Portforward
80,1159-1161 tcp,udp applications Ports used by:

QSPDVR04
QSPDVR16
QSU2DVR04
Portforward
80,1518 tcp Ports used by:

Quadrox GuardDVR
Quadrox GuardNVR
Quadrox WebCCTV DVR
Quadrox WebCCTV NDVR
Quadrox WebCCTV NVR
Portforward
80, 6667, 7777-7787, 8777-8787, 40000-42000 udp applications Rainbow Six 3 Raven Shield with Ubi.com Portforward
80, 2346-2348, 6668, 40000-42999 tcp applications Rainbow Six Lockdown with Ubi.com Portforward
80,3074 tcp applications Rainbow Six Vegas Portforward
80,29000,29100,29200 tcp applications ROSE Online Portforward
53,80,443,10070-10080 tcp applications Socom, Socom 2. Also uses ports 6000-6999,10070 udp Portforward
80,10070-10080 tcp applications Socom 3. Also uses ports 6000-7000,10070,10080 udp. Portforward
80,10070-10080 tcp applications Sony Playstation 3 Portforward
80,9393 tcp applications TalkSwitch Portforward
80,3000-3007,8800 tcp,udp applications Talon DVR Portforward
80,5190,10000,11000 tcp applications The Matrix Online Portforward
53,80,443,10070,10080 tcp applications Twisted Metal Black Online (also uses ports 6000-6999 udp) Portforward
80,4010,4011,1433 tcp applications Video Insight IP Server Portforward
80,1433,4000,11111 tcp applications Video Insight Server Portforward
80, 5911, 6667, 28900, 29900, 29901 tcp applications Worms 4 - Mayhem Portforward
80 tcp,udp http World Wide Web HTTP Nmap
80 tcp 711trojan [trojan] 711 trojan (Seven Eleven) Neophasis
80 tcp AckCmd [trojan] AckCmd Neophasis
80 tcp BackEnd [trojan] Back End Neophasis
80 tcp BO2000Plug-Ins [trojan] Back Orifice 2000 Plug-Ins Neophasis
80 tcp Cafeini [trojan] Cafeini Neophasis
80 tcp CGIBackdoor [trojan] CGI Backdoor Neophasis
80 tcp Executor [trojan] Executor Neophasis
80 tcp GodMessage4Creator [trojan] God Message 4 Creator Neophasis
80 tcp GodMessage [trojan] God Message Neophasis
80 tcp Hooker [trojan] Hooker Neophasis
80 tcp IISworm [trojan] IISworm Neophasis
80 tcp MTX [trojan] MTX Neophasis
80 tcp NCX [trojan] NCX Neophasis
80 tcp Noob [trojan] Noob Neophasis
80 tcp Ramen [trojan] Ramen Neophasis
80 tcp ReverseWWWTunnel [trojan] Reverse WWW Tunnel Backdoor Neophasis
80 tcp RingZero [trojan] RingZero Neophasis
80 tcp RTB666 [trojan] RTB 666 Neophasis
80 tcp Seeker [trojan] Seeker Neophasis
80 tcp WANRemote [trojan] WAN Remote Neophasis
80 tcp WebDownloader [trojan] WebDownloader Neophasis
80 tcp WebServerCT [trojan] Web Server CT Neophasis
80 tcp threat 711 trojan (Seven Eleven) Bekkoame
80 tcp threat AckCmd Bekkoame
80 tcp threat Back End Bekkoame
80 tcp threat Back Orifice 2k Plug-Ins Bekkoame
80 tcp threat Banito Bekkoame
80 tcp threat Bebshell Bekkoame
80 tcp threat Cafeini Bekkoame
80 tcp threat CGI Backdoor Bekkoame
80 tcp threat Civcat Bekkoame
80 tcp threat Eaghouse Bekkoame
80 tcp threat Executor Bekkoame
80 tcp threat God Message Bekkoame
80 tcp threat God Message Creator Bekkoame
80 tcp threat Hesive Bekkoame
80 tcp threat Hexem Bekkoame
80 tcp threat Hooker Bekkoame
80 tcp threat IISworm Bekkoame
80 tcp threat Ketch Bekkoame
80 tcp threat Lodear Bekkoame
80 tcp threat Mindos Bekkoame
80 tcp threat MTX Bekkoame
80 tcp threat Muquest Bekkoame
80 tcp threat Mydoom Bekkoame
80 tcp threat NCX Bekkoame
80 tcp threat Reverse WWW Tunnel Backdoor Bekkoame
100 records found
jump to:
 go
previous next

Related ports: 81  88  443  591  8008  8009  8080  8081  8443  10080  

« back to SG Ports


External Resources
SANS Internet Storm Center: port 80

Notes:
Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify a specific process, or network service. IANA is responsible for internet protocol resources, including the registration of commonly used port numbers for well-known internet services.
Well Known Ports: 0 through 1023.
Registered Ports: 1024 through 49151.
Dynamic/Private : 49152 through 65535.

TCP ports use the Transmission Control Protocol, the most commonly used protocol on the Internet and any TCP/IP network. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered in the same order in which they were sent. Guaranteed communication/delivery is the key difference between TCP and UDP.

UDP ports use the Datagram Protocol. Like TCP, UDP is used in combination with IP (the Internet Protocol) and facilitates the transmission of datagrams from one computer to applications on another computer, but unlike TCP, UDP is connectionless and does not guarantee reliable communication; it's up to the application that received the message to process any errors and verify correct delivery. UDP is often used with time-sensitive applications, such as audio/video streaming and realtime gaming, where dropping some packets is preferable to waiting for delayed data.

When troubleshooting unknown open ports, it is useful to find exactly what services/processes are listening to them. This can be accomplished in both Windows command prompt and Linux variants using the "netstat -aon" command. We also recommend runnig multiple anti-virus/anti-malware scans to rule out the possibility of active malicious software. For more detailed and personalized help please use our forums.

Please use the "Add Comment" button below to provide additional information or comments about port 80.
  User Reviews/Comments:
    rate:
   avg:
by Philip - 2009-02-26 07:37
List of other trojans/worms using port 80 (tcp):

tcp Noob [trojan] Noob
tcp Ramen [trojan] Ramen
tcp ReverseWWWTunnel [trojan] Reverse WWW Tunnel Backdoor
tcp RingZero [trojan] RingZero
tcp RTB666 [trojan] RTB 666
tcp Seeker [trojan] Seeker
tcp WANRemote [trojan] WAN Remote
tcp WebDownloader [trojan] WebDownloader
tcp WebServerCT [trojan] Web Server CT
udp http World Wide Web HTTP
tcp NCX [trojan] NCX
tcp MTX [trojan] MTX
tcp IISworm [trojan] IISworm
tcp AckCmd [trojan] AckCmd
tcp AckCmd [trojan] AckCmd
tcp BackEnd [trojan] Back End
tcp BO2000Plug-Ins [trojan] Back Orifice 2000 Plug-Ins
tcp Cafeini [trojan] Cafeini
tcp CGIBackdoor [trojan] CGI Backdoor
tcp Executor [trojan] Executor
tcp GodMessage4Creator [trojan] God Message 4 Creator
tcp GodMessage [trojan] God Message
tcp Hooker [trojan] Hooker
tcp 711trojan [trojan] 711 trojan (Seven Eleven)
by Matt Clairmont - 2014-02-06 14:33
Trojan.Cidox variants use 80/tcp. Look for session data containing GET /b/opt/
by Matt Clairmont - 2014-02-06 14:37
Adware.Win32.Hassar uses 80/tcp. Look for session data containing 'enc='. Hassar is an adware that installs a Backdoor onto the compromised workstation.
by anonymous - 2014-08-28 23:35
Why does apple use the port 80 when it opens the back door and makes peoples idevices vulnerable? I scanned for open ports and what do you know it says port 80 is open and awaiting lookup. Also port 443 was awaiting lookup and port 1935 said unknown. So now I got spyware or a virus and hacker on my device.
by anonymous - 2019-07-24 23:59
You really need to do some research and then you will not be surprised that 90% of the internet runs on ports 80 and 443.
You would have no internet connection most likely if you block those and most definitely would not be visiting any web pages.
by Philip - 2019-07-27 22:56
People would only need to access your computer on port 80 if your device is serving web pages. If you are not running a web server, there is no reason your computer should be listening on ports 80 or 443 for incoming connections.
by anonymous - 2023-06-04 18:49
very good
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About