| 
	
		 
		Shortcuts	 
	 | 
   Port 8888 Detailsknown port assignments and vulnerabilities
 
threat/application/port search:
 
24 records found
| 
  
	| Port(s) | Protocol | Service | Details | Source |  
  | 8888 | tcp | althttpd | Used by some applications as an alt http port. 
 Applications using this port:
 AirDroid
 Freenet nodes
 FortiNet's enterprise UTM client software
 MAMP on macOS default Apache port
 GNUmp3d HTTP music streaming and Web interface
 LoLo Catcher HTTP web interface (www.optiform.com)
 SimpleCam v2.0
 Sun Answerbook HTTP server
 Winpower Manager for UPS (internal server)
 HyperVM HTTPS
 D2GS Admin Console Telnet administration console for D2GS servers (Diablo 2)
 Earthland Relams 2 Server (AU1_2)
 NewsEDGE server (IANA official)
 
 Games using port 8888:
 Evil Islands
 Heroes of Might and Magic 5
 Splinter Cell (Chaos Theory, Double Agent, Pandora Tomorrow)
 Ultima Online
 
 
 Vulnerabilities/Malware:
 Napster
 W32.Axatak
 Dark IRC (trojan)
 W32.Axatak [Symantec-2002-082217-5638-99] - password stealing virus with remote access trojan capabilities. Affects all current Windows versions, uses ports 8888 and 8889.
 
 Autodesk VRED Professional 2014 contains an unauthenticated remote code execution vulnerability. Autodesk VRED Professional 2014 contains an integrated web server that binds to port tcp/8888 which is accessible remotely. It has been reported that this web server gives access to a Python API which provides users with a vast amount of libraries which could allow an attacker to execute operating system commands. Through this API, Python code can be executed on the target system, the output is returned in the web server response. By importing the Python "os" library, arbitrary operating system commands can be executed on the target system with the privileges of the user running VRED Professional 2014.
 References: [CVE-2014-2967]
 
 An issue was discovered in CloudMe 1.11.0. An unauthenticated local attacker that can connect to the "CloudMe Sync" client application listening on 127.0.0.1 port 8888 can send a malicious payload causing a buffer overflow condition. This will result in code execution, as demonstrated by a TCP reverse shell, or a crash. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-6892.
 References: [CVE-2018-7886], [EDB-44470]
 
 A directory traversal vulnerability was discovered in Enphase Envoy R3.*.* via images/, include/, include/js, or include/css on TCP port 8888.
 References: [CVE-2019-7678]
 
 XSS exists in Enphase Envoy R3.*.* via the profileName parameter to the /home URI on TCP port 8888.
 References: [CVE-2019-7677]
 
 A weak password vulnerability was discovered in Enphase Envoy R3.*.*. One can login via TCP port 8888 with the admin password for the admin account.
 References: [CVE-2019-7676]
 
 An issue was discovered in FC46-WebBridge on GE Grid Solutions MS3000 devices before 3.7.6.25p0_3.2.2.17p0_4.7p0. Direct access to the API is possible on TCP port 8888 via programs located in the cgi-bin folder without any authentication.
 References: [CVE-2022-43976], [CVE-2022-43975]
 
 A vulnerability has been identified in SIMATIC PCS neo (Administration Console) (All versions < V3.1 SP1), SINETPLAN (All versions), TIA Portal (V15, V15.1, V16 and V17). The affected system cannot properly process specially crafted packets sent to port 8888/tcp. A remote attacker could exploit this vulnerability to cause a Denial-of-Service condition. The affected devices must be restarted manually.
 References: [CVE-2022-27194]
 | SG |  
  | 8888 | udp | fortiguard | Fortinet FortiGuard uses the following ports (in addition to standard ports 53, 80, 443): 514/TCP - FortiAP-S syslog
 541/TCP - management, analysis
 1000/TCP, 1003/TCP - policy override keepalive
 5246/UDP - FortiAP-S event logs
 8001/TCP - FSSO
 8008/TCP, 8010/TCP - policy override authentication
 8888/UDP - alternate DNS, web filtering servers
 8890/TCP - AV/IPS updates, management, firmware, FortiGuard distribution servers
 9443/UDP - AV/IPS
 9582/TCP - Cloud App DB (flow.fortinet.net)
 
 | SG |  
  | 8888 | tcp,udp |  | NewsEDGE server (official) | Wikipedia |  
  | 8888 | tcp |  | Sun Answerbook dwhttpd server (deprecated by docs.sun.com) (unofficial) | Wikipedia |  
  | 8888 | tcp |  | GNUmp3d HTTP music streaming and Web interface (unofficial) | Wikipedia |  
  | 8888 | tcp |  | LoLo Catcher HTTP Web interface (www.optiform.com) (unofficial) | Wikipedia |  
  | 8888 | tcp | trojan | Dark IRC | Trojans |  
  | 8888 | tcp | sun-answerbook | Sun Answerbook HTTP server | SANS |  
  | 8888 | tcp,udp | applications | Evil Islands | Portforward |  
  | 8888,42500,44000,45000 | udp | applications | Heroes of Might and Magic 5 | Portforward |  
  | 8888 | tcp,udp | applications | SimpleCam v2.0 | Portforward |  
  | 7776, 8888-8891, 8878, 9011, 9102-9103, 9106-9107, 41006, 44000, 45000-45001 | udp | applications | Splinter Cell Chaos Theory | Portforward |  
  | 7776, 8888-8891, 8878, 9011, 9102-9103, 9106-9107, 27243-27245, 41006, 44000, 45000-45001 | udp | applications | Splinter Cell Chaos Theory w AllSeeingEye | Portforward |  
  | 3074,8888-8889 | udp | applications | Splinter Cell Double Agent | Portforward |  
  | 7776, 8888, 44000, 45000-45001 | udp | applications | Splinter Cell Pandora Tomorrow | Portforward |  
  | 8888 | tcp,udp | applications | Webcam32 | Portforward |  
  | 8000-8001,8888 | tcp,udp | applications | Well of Souls with MIX | Portforward |  
  | 8080,8888 | tcp | applications | X10 Multiview | Portforward |  
  | 8888 | tcp | sun-answerbook | Sun Answerbook HTTP server.  Or gnump3d streaming music server | Nmap |  
  | 8888 | tcp,udp | threat | Napster | Bekkoame |  
  | 8888 | tcp,udp | threat | OptixPro | Bekkoame |  
  | 8888 | tcp,udp | threat | W32.Axatak | Bekkoame |  
  | 8888 | tcp | ddi-tcp-1 | NewsEDGE server TCP (TCP 1). Known Unauthorized Use on port 8888 | IANA |  
  | 8888 | udp | ddi-udp-1 | NewsEDGE server UDP (UDP 1). Known Unauthorized Use on port 8888 | IANA |  |  
  
	|  | 
jump to:     |  Related ports: 8887  8889  9999  514  541  8001  8008  8010  8890  9582   « back to SG Ports 
External Resources
 SANS ISC: port 8888
 Notes:
Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify 
	a specific process, or network service. IANA is responsible for internet protocol resources, including the registration of commonly 
	used port numbers for well-known internet services.
 Well Known Ports: 0 through 1023.
 Registered Ports: 1024 through 49151.
 Dynamic/Private : 49152 through 65535.
 
 TCP ports use the Transmission Control Protocol, the most commonly used protocol 
on the Internet and any TCP/IP network. TCP enables two hosts 
to establish a connection and exchange streams of data. TCP guarantees delivery of data 
and that packets will be delivered in the same order in which they were sent. 
Guaranteed communication/delivery is the key difference between TCP and UDP.
 
 UDP ports use the Datagram Protocol. Like TCP, UDP is used in combination with IP (the Internet Protocol) 
	and facilitates the transmission of datagrams from one computer to applications on another computer, 
	but unlike TCP, UDP is connectionless and does not guarantee reliable communication; it's up to the application that received 
the message to process any errors and verify correct delivery. UDP is often used with time-sensitive 
applications, such as audio/video streaming and realtime gaming, where dropping some packets is preferable to waiting for delayed data.
 
 When troubleshooting unknown open ports, it is useful to find exactly what services/processes are listening to them. 
    This can be accomplished in both Windows command prompt and Linux variants using the "netstat -aon" command. 
    We also recommend runnig multiple anti-virus/anti-malware scans to rule out the possibility of active malicious software.
    For more detailed and personalized help please use our forums.
 
  | Please use the "Add Comment" button below to provide additional information or comments about port 8888. |   
    |  |  |  |