|
Port 6789 Details
known port assignments and vulnerabilities
threat/application/port search:
| Port(s) |
Protocol |
Service |
Details |
Source |
| 6789 |
tcp |
trojans |
Campbell Scientific Loggernet Software
Bucky's Instant Messaging Program
Ubiquiti UniFi Network server mobile speed test
W32.Netsky.T@mm [Symantec-2004-040616-1824-99] (2004.04.06) - a Netsky variant that uses its own SMTP engine to email itself. It has backdoor and DoS (Denial of Service) capabilities. Listens on port 6789/tcp to receive and execute a file from an attacker.
The W32.Netsky.S@mm [Symantec-2004-040512-2436-99] variant opens this port as well.
Doly Trojan also uses port 6789 (TCP).
Multiple buffer overflows in the DB2 JDBC Applet Server (DB2JDS) service in IBM DB2 9.x and earlier allow remote attackers to execute arbitrary code via a crafted packet to the DB2JDS service on tcp/6789 and cause a denial of service via an invalid LANG parameter or a long packet that generates a "MemTree overflow."
References: [CVE-2007-2582], [BID-26010]
A vulnerability exists in the daemon process of the Yi IOT XY-3820 v6.0.24.10, which exposes a TCP service on port 6789. This service lacks proper input validation, allowing attackers to execute arbitrary scripts present on the device by sending specially crafted TCP requests using directory traversal techniques.
References: [CVE-2025-29660]
IANA registered for: GSS-API for Oracle Remote Administration Daemon |
SG
|
| 6789 |
tcp |
|
Datalogger Support Software Campbell Scientific Loggernet Software (unofficial) |
Wikipedia
|
| 6789 |
tcp |
ibm-db2-admin |
dB2 Web Control Center |
SANS
|
| 6789 |
tcp |
ibm-db2-admin |
IBM DB2 |
Nmap
|
| 6789 |
tcp |
threat |
W32.Netsky |
Bekkoame
|
| 6789 |
tcp |
radg |
GSS-API for the Oracle Remote Administration Daemon, registered 2002-08, modified: 2016-09-15 |
IANA
|
| 6789 |
udp |
|
Reserved, registered 2002-08, modified: 2016-09-15 |
IANA
|
|
7 records found
Related ports: 6786 6787 6788 10001
|