The Broadband Guide
SG
search advanced

Vulnerable Ports

This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats. We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please . Any feedback and suggestions can also be posted to our Security forum.

 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |....| 55 
Port(s) Protocol Service Scan level Description
 29831 tcp,udp slapd not scanned Slapd
 29000 tcp,udp saltd-licensing not scanned PWI and PWI patches

Battlefield 2

IANA registered for: Siemens Licensing Server (TCP)
 48049 tcp,udp 3gpp not scanned 3GPP Cell Broadcast Service Protocol
 28221 tcp,udp emule not scanned eMule, BitTorrent
 27031 tcp,udp applications not scanned Port used by: UKS UT server, Flex-net managed application VRCO (TrackD), Counter Strike, Day of Defeat Source, Half Life Steam, Steam Client.
 27030 tcp,udp applications not scanned Counter Strike, Day of Defeat Source, Half Life Steam, Steam Client
 27041 tcp,udp applications not scanned Steam Client
 27045 tcp,udp applications not scanned Steam Client
 27000 tcp,udp games not scanned id Software's QuakeWorld master server
FLEXlm (Network License Manager) uses ports 27000-27009 tcp.
Autodesk Network License Manager (adskflex.exe) also needs port 2080 tcp in addition to 27000-27009.
Citrix License Server uses ports 7279 and 27000 TCP.

Ports 27000+ are used by some online games:
Team Fortress 2, Day of Defeat, Counter Strike use ports 27000-27015
Left 4 Dead 2 (Valve software) uses ports 27000-27040
Vindictus MMORPG (devCAT/Nexon) uses ports 27000-27025, 36567, and 47611 tcp/udp

Steam (Valve gaming platform) uses these ports:
27000-27015 udp (Steam client game client traffic)
27015-27030 tcp/udp (typically matchmaking and HLTV, also used to download Steam content)
27031 udp, 27036 tcp/udp, and 27037 tcp (incoming for in-home streaming)
3478 udp, 4379 udp, 4380 udp (outbound - Steamworks P2P networking and voice chat)
4380 udp (Steam client)
 27001 tcp,udp flex-lm not scanned Ports 27000+ are used by some online games:
Team Fortress 2, Day of Defeat, Counter Strike use ports 27000-27015
Left 4 Dead 2 (Valve Software) uses ports 27000-27040
Vindictus MMORPG (devCAT/Nexon) uses ports 27000-27025, 36567, and 47611 tcp/udp

Steam (Valve gaming platform) uses these ports:
27000-27015 udp (Steam client game client traffic)
27015-27030 tcp/udp (typically matchmaking and HLTV, also used to download Steam content)
27031 udp, 27036 tcp/udp, and 27037 tcp (incoming for in-home streaming)
3478 udp, 4379 udp, 4380 udp (outbound - Steamworks P2P networking and voice chat)
4380 udp (Steam client)

FLEXlm (Network License Manager) uses ports 27000-27009 tcp
 27002 tcp,udp flexlm not scanned Ports 27000+ are used by some online games:
Team Fortress 2, Day of Defeat, Counter Strike use ports 27000-27015
Left 4 Dead 2 (Valve Software) uses ports 27000-27040
Vindictus MMORPG (devCAT/Nexon) uses ports 27000-27025, 36567, and 47611 tcp/udp

Steam (Valve gaming platform) uses these ports:
27000-27015 udp (Steam client game client traffic)
27015-27030 tcp/udp (typically matchmaking and HLTV, also used to download Steam content)
27031 udp, 27036 tcp/udp, and 27037 tcp (incoming for in-home streaming)
3478 udp, 4379 udp, 4380 udp (outbound - Steamworks P2P networking and voice chat)
4380 udp (Steam client)

FLEXlm (Network License Manager) uses ports 27000-27009 tcp
 27003 tcp,udp flex-lm not scanned Ports 27000+ are used by some online games:
Team Fortress 2, Day of Defeat, Counter Strike use ports 27000-27015
Left 4 Dead 2 (Valve Software) uses ports 27000-27040
Vindictus MMORPG (devCAT/Nexon) uses ports 27000-27025, 36567, and 47611 tcp/udp

Steam (Valve gaming platform) uses these ports:
27000-27015 udp (Steam client game client traffic)
27015-27030 tcp/udp (typically matchmaking and HLTV, also used to download Steam content)
27031 udp, 27036 tcp/udp, and 27037 tcp (incoming for in-home streaming)
3478 udp, 4379 udp, 4380 udp (outbound - Steamworks P2P networking and voice chat)
4380 udp (Steam client)

FLEXlm (Network License Manager) uses ports 27000-27009 tcp
 27004 tcp,udp flex-lm not scanned Ports 27000+ are used by some online games:
Team Fortress 2, Day of Defeat, Counter Strike use ports 27000-27015
Left 4 Dead 2 (Valve Software) uses ports 27000-27040
Vindictus MMORPG (devCAT/Nexon) uses ports 27000-27025, 36567, and 47611 tcp/udp

Steam (Valve gaming platform) uses these ports:
27000-27015 udp (Steam client game client traffic)
27015-27030 tcp/udp (typically matchmaking and HLTV, also used to download Steam content)
27031 udp, 27036 tcp/udp, and 27037 tcp (incoming for in-home streaming)
3478 udp, 4379 udp, 4380 udp (outbound - Steamworks P2P networking and voice chat)
4380 udp (Steam client)

FLEXlm (Network License Manager) uses ports 27000-27009 tcp
 27005 tcp,udp flex-lm not scanned Ports 27000+ are used by some online games:
Team Fortress 2, Day of Defeat, Counter Strike use ports 27000-27015
Left 4 Dead 2 (Valve Software) uses ports 27000-27040
Vindictus MMORPG (devCAT/Nexon) uses ports 27000-27025, 36567, and 47611 tcp/udp

Steam (Valve gaming platform) uses these ports:
27000-27015 udp (Steam client game client traffic)
27015-27030 tcp/udp (typically matchmaking and HLTV, also used to download Steam content)
27031 udp, 27036 tcp/udp, and 27037 tcp (incoming for in-home streaming)
3478 udp, 4379 udp, 4380 udp (outbound - Steamworks P2P networking and voice chat)
4380 udp (Steam client)

FLEXlm (Network License Manager) uses ports 27000-27009 tcp
 27006 tcp,udp flex-lm not scanned Ports 27000+ are used by some online games:
Team Fortress 2, Day of Defeat, Counter Strike use ports 27000-27015
Left 4 Dead 2 (Valve Software) uses ports 27000-27040
Vindictus MMORPG (devCAT/Nexon) uses ports 27000-27025, 36567, and 47611 tcp/udp

Steam (Valve gaming platform) uses these ports:
27000-27015 udp (Steam client game client traffic)
27015-27030 tcp/udp (typically matchmaking and HLTV, also used to download Steam content)
27031 udp, 27036 tcp/udp, and 27037 tcp (incoming for in-home streaming)
3478 udp, 4379 udp, 4380 udp (outbound - Steamworks P2P networking and voice chat)
4380 udp (Steam client)

FLEXlm (Network License Manager) uses ports 27000-27009 tcp
 27007 tcp,udp flex-lm not scanned Ports 27000+ are used by some online games:
Team Fortress 2, Day of Defeat, Counter Strike use ports 27000-27015
Left 4 Dead 2 (Valve Software) uses ports 27000-27040
Vindictus MMORPG (devCAT/Nexon) uses ports 27000-27025, 36567, and 47611 tcp/udp

Steam (Valve gaming platform) uses these ports:
27000-27015 udp (Steam client game client traffic)
27015-27030 tcp/udp (typically matchmaking and HLTV, also used to download Steam content)
27031 udp, 27036 tcp/udp, and 27037 tcp (incoming for in-home streaming)
3478 udp, 4379 udp, 4380 udp (outbound - Steamworks P2P networking and voice chat)
4380 udp (Steam client)

FLEXlm (Network License Manager) uses ports 27000-27009 tcp
 27008 tcp,udp flex-lm not scanned Ports 27000+ are used by some online games:
Team Fortress 2, Day of Defeat, Counter Strike use ports 27000-27015
Left 4 Dead 2 (Valve Software) uses ports 27000-27040
Vindictus MMORPG (devCAT/Nexon) uses ports 27000-27025, 36567, and 47611 tcp/udp

Steam (Valve gaming platform) uses these ports:
27000-27015 udp (Steam client game client traffic)
27015-27030 tcp/udp (typically matchmaking and HLTV, also used to download Steam content)
27031 udp, 27036 tcp/udp, and 27037 tcp (incoming for in-home streaming)
3478 udp, 4379 udp, 4380 udp (outbound - Steamworks P2P networking and voice chat)
4380 udp (Steam client)

FLEXlm (Network License Manager) uses ports 27000-27009 tcp
 27009 tcp,udp flex-lm not scanned Ports 27000+ are used by some online games:
Team Fortress 2, Day of Defeat, Counter Strike use ports 27000-27015
Left 4 Dead 2 (Valve Software) uses ports 27000-27040
Vindictus MMORPG (devCAT/Nexon) uses ports 27000-27025, 36567, and 47611 tcp/udp

Steam (Valve gaming platform) uses these ports:
27000-27015 udp (Steam client game client traffic)
27015-27030 tcp/udp (typically matchmaking and HLTV, also used to download Steam content)
27031 udp, 27036 tcp/udp, and 27037 tcp (incoming for in-home streaming)
3478 udp, 4379 udp, 4380 udp (outbound - Steamworks P2P networking and voice chat)
4380 udp (Steam client)

FLEXlm (Network License Manager) uses ports 27000-27009 tcp
 26675 tcp,udp applications not scanned ActiveSync - data synchronization between a mobile computer and a desktop computer, connected to the Internet.
 25121 tcp,udp applications not scanned VOISpeed VoIP
 25080 tcp,udp applications not scanned Ninja Email Security - port for checking against phishing attacks, spam, and malware.
 21302 tcp,udp applications not scanned BitchX IRC Client, FreeTel audioconferencing
 18923 tcp,udp jahia not scanned Jahia
 18302 tcp,udp portmon not scanned Portmon- monitors and displays all serial and parallel port activity on a system.
 12291 udp plc not scanned YOKOGAWA FA-M3 PLC industrical computer uses UDP ports 12289,12291.
 12200 tcp applications not scanned GNucDNA, Tenebril GhostSurf
 12083 tcp applications not scanned Delta Three PC to Phone
 12120 udp applications not scanned Delta Three PC to Phone
 12122 udp applications not scanned Delta Three PC to Phone
 179 tcp,udp,sctp bgp not scanned Border Gateway Protocol (IANA official)
See also [RFC 4960]

Brocade BigIron RX switches allow remote attackers to bypass ACL rules by using 179 as the source port of a packet.
References: [CVE-2011-2760] [BID-48663] [SECUNIA-45217] [OSVDB-73869]
 9833 tcp applications not scanned Telindus router - default port for the 1100 series of Telindus ADSL routers, such as 1110 and 1120.
 8282 tcp applications not scanned Y-cam Wireless IP Camera, SAS Server, CS Intranet use this port.

IANA registered for: Libelle EnterpriseBus
 8280 tcp,udp synapse not scanned Apache Synapse, Y-cam Wireless IP Camera use this port.
 8243 tcp,udp synapse-nhttps not scanned Synapse Non Blocking HTTPS, HTTPS listener for Apache Synapse, Y-cam Wireless IP Camera
 8245 tcp applications not scanned No-IP, DynDNS, Y-cam Wireless IP Camera use this port.
 8222 tcp applications not scanned VMWare, Y-cam Wireless IP Camera
 8211 tcp applications not scanned Dealing Office Server
Palworld Server
Y-cam Wireless IP Camera
 8198 tcp applications not scanned Sophos Antivirus, Y-cam Wireless IP Camera
 8192 tcp,udp applications not scanned Sophos Remote Management System, SnapStream PVS, SpyTech Phone Service, Y-cam Wireless IP Camera use this port.
 8193 tcp,udp applications not scanned Sophos Remote Management System, Y-cam Wireless IP Camera
 8194 tcp,udp applications not scanned Sophos Remote Management System, Bloomberg data API, Y-cam Wireless IP Camera use this port.
 8182 tcp applications not scanned SQL servers

Port is IANA registered for VMware Fault Domain Manager (TCP/UDP).
 8143 tcp,udp applications not scanned ImapProxy, SCO SSH Tunneling
 8009 tcp,udp netware-http not scanned Netware HTTP Server, Apache JServ Protocol v13 (TCP)

Apache Tomcat in Avaya S87XX, S8500, and S8300 before CM 3.1.3, and Avaya SES allows connections from external interfaces via port 8009, which exposes it to attacks from outside parties.
References: [CVE-2007-1491]

The HTTPSTK service in the novell-nrm package before 2.0.2-297.305.302.3 in Novell Open Enterprise Server 2 (OES 2) Linux, and OES 11 Linux Gold and SP1, does not make the intended SSL_free and SSL_shutdown calls for the close of a TCP connection, which allows remote attackers to cause a denial of service (service crash) by establishing many TCP connections to port 8009.
References: [CVE-2013-3707]

A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and trigger this vulnerability to gain remote code execution.
References: [CVE-2020-1745]

IANA registered for: NVMe over Fabrics Discovery Service (TCP)
 591 tcp,udp http-alt not scanned FileMaker, Inc. - HTTP Alternate
 7968 tcp,udp applications not scanned Odyssey
 7797 tcp applications not scanned Accelerate It, Humboldt Internet Accelerator, Hyperspeed Dialup
 7798 tcp,udp pnet-enc not scanned Propel Encoder port, GunZ
 7725 tcp,udp applications not scanned Nitrogen Service
GunZ
Faronics Deep Freeze (workstation OS protection software) - uses either port 1971 or 7725.
 7724 tcp,udp nsdeepfreezectl not scanned Novell Snap-in Deep Freeze Control, GunZ
 18082 tcp vipre not scanned VIPRE Business Security uses the following TCP ports: 8123, 18082, 18086, 18090. It may also communicate through TCP ports 135, 139, 445.
 7654 tcp applications not scanned SSH Tunneling
 7234 tcp applications not scanned WebSEAL, Knights of the Ruby Order, PokerTH Online, Player Worlds

IANA registered for: Traffic forwarding for Okta cloud
 7144 tcp applications not scanned PeerCast, EMC RepliStor, RealAudio

Rep_serv.exe 6.3.1.3 in the server in EMC RepliStor allows remote attackers to cause a denial of service via a crafted packet to TCP port 7144
References: [CVE-2009-3744], [BID-36738]
 7125 udp applications not scanned StateMirrorClientToServer, RealAudio
 7099 udp applications not scanned City of Heroes, City of Villains, lazy-ptop, RealAudio
 7090 udp applications not scanned City of Heroes, City of Villains, RealAudio
 7101 tcp,udp elcn not scanned Embedded Light Control Network, RealAudio, Dungeon Fighter Online
 7103 udp applications not scanned RealAudio, Dungeon Fighter Online (TCP/UDP)
 7126 udp applications not scanned RealAudio
 7127 udp applications not scanned RealAudio
 7090 tcp applications not scanned Surpass Copycat, EverQuest Launch Pad, Database Voyager (ABLE)
 7002 tcp,udp afs3-pserver not scanned users & groups database

Default for BEA WebLogic Server's HTTP server, though often changed during installation (TCP).

Command and Conquer Renegade also uses this port (TCP).
 7003 tcp,udp afs3-vlserver not scanned Volume location database, City of Heroes, City of Villains, RealAudio

MA Lighting Technology grandMA onPC is vulnerable to a denial of service, caused by an error when processing socket connection negotiation. By sending a single malicious packet to TCP port 7003, an attacker could exploit this vulnerability to cause the device to crash.
References: [BID-66645], [XFDB-92300]
 7004 tcp,udp afs3-kaserver not scanned AFS/Kerberos authentication service, City of Heroes, City of Villains, RealAudio
 7005 tcp,udp afs3-volser not scanned VMware vCenter Single Sign On base shutdown port.
Volume management server
RealAudio
BMC Control-M/Server
BMC Control-M/Agent
Oracle HTTP

Games: City of Heroes, City of Villains
 7006 tcp,udp afs3-errors not scanned RealAudio, Error interpretation service, BMC Software CONTROL-M/Server and CONTROL-M/AgentServer-to-Agent, City of Heroes, City of Villains

Trojan.JBosser opens command and control communication on port 7006.
 6113 tcp games not scanned Port used by Club Penguin Disney online game for kids, Warcraft II and III (Blizzard Downloader). It also uses port 3724.
Red Ace Squadron Pro also uses port 6113 (TCP/UDP), developer: Small Rockets

IANA registered for: Daylite Server
 6114 tcp games not scanned Port used by Warcraft II and III (Blizzard Downloader). It also uses port 3724.
Red Ace Squadron Pro also uses port 6114 (TCP/UDP), developer: Small Rockets

IANA registered for: WRspice IPC Service.
 6115 tcp games not scanned Port used by Warcraft II and III (Blizzard Downloader). It also uses port 3724.
Red Ace Squadron Proalso uses port 6115 (TCP/UDP), developer: Small Rockets

IANA registered for: Xic IPC Service.
 6116 tcp games not scanned Port used by Warcraft II and III (Blizzard Downloader). It also uses port 3724.
IANA registered for: XicTools License Manager Service.
 6117 tcp games not scanned Port used by Daylite Touch Sync, Warcraft II and III (Blizzard Downloader). It also uses port 3724.
 6118 tcp games not scanned Port used by Warcraft II and III (Blizzard Downloader). It also uses port 3724.
 6119 tcp games not scanned Port used by Warcraft II and III (Blizzard Downloader). It also uses port 3724.
 6963 tcp,udp swismgr1 not scanned swismgr1, BitTorrent
 6964 tcp,udp swismgr2 not scanned swismgr2, BitTorrent
 6942 tcp applications not scanned BitTorrent, SubEthaEdit text editor
 6900 tcp,udp applications not scanned BitTorrent part, Windows Live Messenger, MSN Messenger, Ragnarok Online Server

IANA registered for: R*TIME Viewer Data Interface (TCP)
 6892 tcp,udp applications not scanned BitTorrent, Windows Live Messenger
 6893 tcp,udp applications not scanned BitTorrent, Windows Live Messenger
 6894 tcp,udp applications not scanned BitTorrent, Windows Live Messenger (File transfer)
 6895 tcp,udp applications not scanned BitTorrent, Windows Live Messenger (File transfer)
 6896 tcp,udp applications not scanned BitTorrent, Windows Live Messenger (File transfer)
 6897 tcp,udp applications not scanned BitTorrent, Windows Live Messenger (File transfer)
 6898 tcp,udp applications not scanned BitTorrent, Windows Live Messenger (File transfer)
 6899 tcp,udp applications not scanned BitTorrent, Windows Live Messenger (File transfer)
 6809 tcp,udp applications not scanned cman (cluster manager)

Multiple stack-based buffer overflows in FSD 2.052 d9 and earlier, and FSFDT FSD 3.000 d9 and earlier, allow (1) remote attackers to execute arbitrary code via a long HELP command on TCP port 3010 to the sysuser::exechelp function in sysuser.cc and (2) remote authenticated users to execute arbitrary code via long commands on TCP port 6809 to the servinterface::sendmulticast function in servinterface.cc, as demonstrated by a PIcallsign command.
References: [CVE-2007-5256] [BID-25883] [SECUNIA-27008]
 6800 tcp applications not scanned Resin server, Resin Watchdog
 6786 tcp,udp smc-jmx not scanned Sun Java Web Console JMX
 6787 tcp,udp smc-admin not scanned Sun Web Console Admin
 6788 tcp,udp smc-http not scanned SMC-HTTP
 6681 tcp,udp applications not scanned UPnP, Bittorent, peer-to-peer
 6662 tcp applications not scanned Internet Relay Chat, Radmind protocol
 12399 tcp applications not scanned Multiple buffer overflows in 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) 9.0.0.11355 and earlier allow remote attackers to execute arbitrary code or cause a denial of service via a crafted packet to TCP ports 12397 or 12399.
References: [CVE-2011-4537], [BID-51157]
 12397 tcp applications not scanned Multiple buffer overflows in 7-Technologies (7T) Interactive Graphical SCADA System (IGSS) 9.0.0.11355 and earlier allow remote attackers to execute arbitrary code or cause a denial of service via a crafted packet to TCP ports 12397 or 12399.
References: [CVE-2011-4537], [BID-51157]

Directory traversal vulnerability in dc.exe 9.00.00.11059 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allows remote attackers to execute arbitrary programs via ..\ (dot dot backslash) sequences in opcodes (1) 0xa and (2) 0x17 to TCP port 12397.
References: [CVE-2011-1566] [BID-46936] [SECUNIA-43849]

Stack-based buffer overflow in Schneider Electric Interactive Graphical SCADA System (IGSS) 10 and earlier allows remote attackers to execute arbitrary code by sending TCP port-12397 data that does not comply with a protocol.
References: [CVE-2013-0657]
 6620 tcp,udp kftp-data not scanned Kerberos V5 FTP Data
 6621 tcp,udp kftp not scanned Kerberos V5 FTP Control
 6623 tcp,udp ktelnet not scanned Kerberos V5 Telnet
 6580 tcp,udp parsec-master not scanned Parsec Masterserver
 6581 tcp,udp parsec-peer not scanned Parsec Peer-to-Peer

Vulnerabilities listed: 100 (some use multiple ports)
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About