|
Port 23456 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
23456 |
tcp |
trojans |
Common sequence of numbers "2 3 4 5 6" often used as default port by some programs and trojans.
Cisco SD-WAN edge devices use these ports to establish connections with peers in the overlay network:
UDP ports 12346, 12446, 12546, 12646 (UDP if DTLS)
TCP ports: 23456, 23556, 23656, 23756 (TCP if DTLS)
Trojans/backdoors that use this port: Evil FTP, Ugly FTP, WhackJob
An issue was discovered on AVStar PE204 3.10.70 IP camera devices. A denial of service can occur on open TCP port 23456. After a TELNET connection, no TCP ports are open.
References: [CVE-2019-18382], [XFDB-170155]
Backdoor.Win32.NetBull.11.b / Remote Buffer Overflow - NetBull.11.b listens on both TCP ports 23456 and 23457, sending a large junk packet results in buffer overflow overwriting stack registers.
References: [MVID-2021-0066] |
SG
|
23456 |
udp |
games |
Flight Simulator 2004 |
SG
|
23456 |
tcp |
trojan |
Clandestine, Evil FTP, Vagr Nocker, Whack Job |
Trojans
|
23456 |
tcp |
EvilFTP |
[trojan] Evil FTP |
SANS
|
23456 |
tcp |
UglyFTP |
[trojan] Ugly FTP |
SANS
|
23456 |
tcp |
WhackJob |
[trojan] Whack Job |
SANS
|
6073,23456,2302-2400 |
udp |
applications |
Flight Simulator 2004 |
Portforward
|
6073,23456,2302-2400 |
udp |
applications |
FSHost |
Portforward
|
6073,23456,2302-2400 |
udp |
applications |
FSHostClient |
Portforward
|
2300-2400,6073,23456 |
udp |
applications |
Microsofts Flight Simulator X |
Portforward
|
23456 |
tcp,udp |
threat |
Trojan:EvilFTP |
Bekkoame
|
23456 |
tcp,udp |
threat |
Ugly FTP |
Bekkoame
|
23456 |
tcp,udp |
threat |
Whack Job |
Bekkoame
|
23456 |
tcp |
aequus |
Aequus Service, registered 2009-02-12 |
IANA
|
23456 |
udp |
|
Reserved |
IANA
|
|
15 records found
Related ports: 12345 12346 12446 23457 23556 6073
|