The Broadband Guide
SG
search advanced

Vulnerable Ports

This list (a very small part of our SG Ports database) includes TCP/UDP ports currently tested by our Security Scanner, and corresponding potential security threats. We update the list on a regular basis, however if you feel we should add other port(s) to the list or modify their descriptions, please . Any feedback and suggestions can also be posted to our Security forum.

 1 |....| 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |....| 55 
Port(s) Protocol Service Scan level Description
 2103 tcp,udp applications not scanned Microsoft Message Queuing (MSMQ) uses the following ports:
1801 TCP/UDP
2101, 2103, 2105 (RPC over TCP)
3527 UDP

Stack-based buffer overflow in the Microsoft Message Queuing (MSMQ) service in Microsoft Windows 2000 Server SP4, Windows 2000 Professional SP4, and Windows XP SP2 allows attackers to execute arbitrary code via a long string in an opnum 0x06 RPC call to port 2103.
References: [CVE-2007-3039], [BID-26797]

Port is also IANA registered for Zephyr serv-hm connection.
 2104 tcp,udp games not scanned City of Heroes, City of Villains

IANA registered for: Zephyr hostmanager
 2105 tcp multiple not scanned Microsoft Message Queuing (MSMQ) uses the following ports:
1801 TCP/UDP
2101, 2103, 2105 (RPC over TCP)
3527 UDP

Kerberos encrypted remote login (rlogin)
Project Athena Zephyr Notification Service hm-serv connection (should use port 2102)
IBM MiniPay (IANA official)
 2106 tcp games not scanned Auto Assault, Lineage II, City of Heroes (TCP/UDP), City of Villains (TCP/UDP), Aion

IANA registered for: MZAP
 2107 tcp bintec not scanned Citrix SmartAuditor Server MSMQ management may use port 2107 TCP.

IANA registered for: BinTec Admin
 2111 tcp,udp dsatp not scanned X over kerberos

Backdoor.Win32.Delf.abb / Insecure Transit - the malware listens on TCP ports 1988 and 2111 but message exchange takes place on port 1988. The backdoor uses unencrypted plaintext socket communication allowing anyone who can sniff network traffic to read any communications sent or retrieved. This can disclose information to third-party well positioned attackers.
References: [MVID-2021-0206]

OPNET Dynamic Sampling Agent Transaction Protocol (DSATP) [OPNET Technologies Inc] [Edward Macomber] (IANA official)
 2114 tcp,udp ariascribe not scanned IANA registered for: Classical Music Meta-Data Access and Enhancement
 2115 tcp,udp kdm Premium scan MIS Department

Trojan Bugs also uses port 2115 (TCP)

IANA registered for: Key Distribution Manager
 2121 tcp,udp scientia-ssdb not scanned FTP proxy uses port 2121 (TCP).

A hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe' in mySCADA myPRO 7 allows remote attackers to access the FTP server on port 2121, and upload files or list directories, by entering these credentials.
References: [CVE-2018-11311], [EDB-44656]

Backdoor.Win32.Burbul.b / Anonymous Logon - backdoor Burbul.b listens on TCP port 2121 allowing anonymous logon credentials to access the infected host E.g. USER anonymous PASS anonymous.
References: [MVID-2021-0093]

Worm.Win32.Busan.k / Insecure Communication Protocol - Busan.k launches a windows cmd console on the infected host so that it can send and receive messages back and forth over TCP port 2121. The worm uses unencrypted plaintext socket communication allowing anyone who can sniff network traffic to read any communications sent or retrieved. This can disclose sensitive information to third-party well positioned attackers.
References: [MVID-2021-0185]

Backdoor.Win32.Hupigon.aejq / Port Bounce Scan - the malware listens on TCP port 2121, its FTP component accepts any username/password credentials. Third-party attackers who successfully logon can abuse the backdoor FTP server as a man-in-the-middle machine allowing PORT Command bounce scan attacks using Nmap. This vulnerability allows remote attackers to abuse your system and discreetly conduct network port scanning. Victims will then think these scans are
originating from the infected system running the afflicted malware FTP Server and not you.
References: [MVID-2021-0330]

Backdoor.Win32.Hupigon.aejq / Authentication Bypass RCE - the malware runs an FTP server on TCP port 2121. Third-party attackers who can reach infected systems can logon using any username/password combination. Intruders may then upload executables using ftp PASV, STOR commands, this can result in remote code execution.
References: [MVID-2021-0329]

Backdoor.Win32.Prorat.lkt / Weak Hardcoded Password - the ProSpy Server V1.9 malware runs an FTP component that listens on TCP port 2121. The FTP server requires authentication for remote user access. However, the username and password both use the word "special" which is both weak and hardcoded in plaintext within the executable.
References: [MVID-2021-0360]

Backdoor.Win32.Agent.Amt / Authentication Bypass - The malware can run an FTP server which listens on TCP port 2121. Third-party attackers who can reach infected systems can logon using any username/password combination. Intruders can then upload executables using ftp PASV, STOR commands, this can result in remote code execution.
References: [MVID-2024-0673]

SCIENTIA-SSDB (IANA official)
 2125 tcp,udp lockstep not scanned Lockstep Systems Backup for Workgroups is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the login module when handling login failure. By sending a specially-crafted TCP packet to port 2125, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
References: [XFDB-81992], [BID-57883]

IANA registered for: LOCKSTEP
 2130 udp trojans not scanned Mini Backlash remote access and password stealing trojan. Affects Windows 9x/ME. Uses ports 2130/udp and 3150/udp.
 2140 tcp,udp trojans Premium scan Some trojans use this port: Deep Throat, Foreplay, The Invasor
 2142 tcp,udp tdmoip not scanned TDM OVER IP (IANA official) [RFC 5087]
 2144 tcp,udp lv-ffx not scanned Iron Mountain LiveVault Agent uses port 2144 (TCP)

IANA registered for: Live Vault Fast Object Transfer
 2145 tcp,udp lv-pici not scanned Iron Mountain LiveVault Agent uses port 2145 (TCP)

IANA registered for: Live Vault Remote Diagnostic Console Support
 2149 tcp trojan Premium scan Deep Throat
 2150 tcp trojan Premium scan R0xr4t trojan
 2155 tcp brdptc Members scan [trojan] Illusion Mailer
Port is also IANA registered for Bridge Protocol.
 2156 tcp citrix Premium scan Citrix SD-WAN Center - reporting communication between SD-WAN Center and SD-WAN SE/EE devices.

Oracle

IANA registered for: Talari Reliable Protocol (TCP/UDP)
 2160 tcp,udp apc-2160 not scanned APC 2160
 2161 tcp,udp apc-2161 not scanned APC 2161
 2170 tcp,udp applications not scanned Mystic Island
 2171 tcp,udp msfw-storage not scanned MS Firewall Storage
 2172 tcp,udp msfw-s-storage not scanned MS Firewall SecureStorage

Backdoor.Win32.Jokerdoor / Remote Stack Buffer Overflow - the malware listens on TCP port 2172. Third party attackers who can reach an infected system can send a junk payload and trigger a classic stack buffer overflow overwriting the ECX, EIP registers and structured exception handler (SEH). When connecting you will get a "connected" server response, then we supply our payload as a parameter prefixed by "DOS" to successfully compromise the server.
References: [MVID-2021-0426]
 2173 tcp,udp msfw-replica not scanned MS Firewall Replication
 2174 tcp,udp msfw-array not scanned MS Firewall Intra Array
 2181 tcp,udp eforward not scanned Apache ZooKeeper nodes

Games: Mystic Island

IANA registered for: eforward
 2182 tcp aws not scanned Amazon AWS MSK connection to Apache ZooKeeper using TLS encryption (Apache ZooKeeper nodes use port 2181 by default)

CGN status (IANA official)
 2185 tcp,udp onbase-dds not scanned Trojan.Win32.Cospet.abg / Insecure Permissions EoP - Cospet.abg, creates an vulnerable dir named "dir" under c:\ drive granting change (C) permissions to the authenticated users group. Sends SYN packet to TCP port 2185.
References: [MVID-2021-0069]

OnBase Distributed Disk Services (IANA official)
 2188 tcp radware-rpm not scanned IANA registered for: Radware Resource Pool Manager
 2189 tcp trojans Premium scan Backdoor.Delf [Symantec-2003-050207-0707-99] - remote access and keylogging trojan family of backdoors, affect Windows. Different varians listen to these TCP ports: 23, 2189,2444,27378.

IANA registered for Secure Radware Resource Pool Manager
 2190 tcp,udp tivoconnect not scanned IANA registered for: TiVoConnect Beacon
 2191 tcp,udp applications not scanned Mystic Island
 2195 tcp applications not scanned Apple Push Notification Service (APNS)
 2196 tcp applications not scanned Apple Push Notification Service (APNS)
 2200 tcp applications not scanned Multiple buffer overflows in LGSERVER.EXE in CA BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.1 SP1, Mobile Backup r4.0, Desktop and Business Protection Suite r2, and Desktop Management Suite (DMS) r11.0 and r11.1 allow remote attackers to execute arbitrary code via crafted packets to TCP port 1900 or 2200.
References: [CVE-2007-0449]

Port is also IANA registered for ICI
 2200 udp games not scanned Tuxanci game server
 2207 tcp applications not scanned The hpssd message parser in hpssd.py in HP Linux Imaging and Printing (HPLIP) 1.6.7 allows local users to cause a denial of service (process stop) via a crafted packet, as demonstrated by sending "msg=0" to TCP port 2207.
References: [CVE-2008-2941], [BID-30683]

Port also IANA registered for HP Status and Services.
 2208 tcp trojan Premium scan Rux.PSW trojan horse
 2210 tcp applications not scanned MikroTik Remote management for "The Dude"

IANA registered for: NOAAPORT Broadcast Network (TCP/UDP)
 2211 tcp applications not scanned MikroTik Secure management for "The Dude"

IANA registered for: EMWIN (TCP/UDP)
 2211 udp malware not scanned Backdoor.Win32.Singu.a / Remote Stack Buffer Overflow (UDP Datagram) - the malware listens on UDP ports 2211 and 8899. Third-party attackers who can reach an infected host can send a specially crafted UDP packet to port 8899, triggering a classic buffer overflow overwriting ECX and EIP registers.
References: [MVID-2021-0221]
 2212 tcp,udp leecoposserver not scanned Port-A-Pour Remote WinBatch uses port 2212 (TCP)

IANA registered for: LeeCO POS Server Service
 2213 tcp,udp applications not scanned KALI
 2219 tcp,udp netiq-ncap not scanned IANA registered for: NetIQ NCAP Protocol
 2220 tcp,udp netiq not scanned IANA registered for: NetIQ End2End
 2221 tcp,udp rockwell-csp1 not scanned Rockwell CSP1

ESET Anti-virus updates also use this port (TCP).

Port is IANA registered for: EtherNet/IP over TLS (TCP); EtherNet/IP over DTLS (UDP)
 2222 tcp,udp rockwell-csp2 not scanned Rockwell CSP2
ESET Remote Administrator, DirectAdmin default
Microsoft Office OS X anti-piracy network monitor

Cognex In-Signt (IANA official) uses these ports:
68 udp - DHCP In-Signt vision system only
502 tcp - Modbus
1069 tcp/udp - In-Sight
1070 tcp - machine status data
2222 udp - Ethernet IP
5753 tcp - audit message server
44818 tcp/udp - Ethernet IP
51069 tcp - In-Sight secure

Some trojans also use this port: BackDoor.Botex [Symantec-2004-062718-3311-99], SweetHeart, Rootshell, Way

The MicroWorld Agent service (MWAGENT.EXE) in MicroWorld Technologies eScan, allows remote or local attackers to gain privileges and execute arbitrary commands by connecting directly to TCP port 2222.
References: [CVE-2007-0655], [BID-23759]

Rockwell Automation ControlLogix is vulnerable to a denial of service, caused by the improper validation of input being sent to the buffer. By sending a specially-crafted CIP message to TCP and UDP ports 2222 and 44818, a remote attacker could exploit this vulnerability to cause the CPU to stop logic execution and enter a denial of service.
References: [XFDB-81235]

Backdoor.Win32.Mnets / Remote Stack Buffer Overflow - the backdoor listens for commands on UDP ports 2222 and 4444. Sending a mere 323 bytes we can overwrite the instruction pointer (EIP), potentially giving us program execution flow over the remote Malware.
References: [MVID-2021-0031]

Port is also IANA registered for EtherNet/IP I/O.
 2223 tcp,udp rockwell-csp3 not scanned Microsoft Office OS X antipiracy network monitor (UDP)

IANA registered for: Rockwell CSP3
 2225 tcp,sctp rcip-itu not scanned Resource Connection Initiation Protocol
 2233 tcp,udp applications not scanned RDT traffic (unicast peer to peer communication) uses port 2233/TCP
Shiva VPN

Infocrypt (IANA official)
 2234 tcp,udp applications not scanned Janes F-18, developer: Electronic Arts
Operation Flashpoint also uses this port
Soulseek uses ports 2234-2239
 2235 tcp,udp applications not scanned Operation Flashpoint
 2236 tcp applications not scanned Macintosh Manager
 2239 tcp,udp applications not scanned Soulseek uses ports 2234-2239
 2255 tcp trojan Premium scan Nirvana
 2259 tcp,udp bid-serv not scanned BIF identifiers resolution service (IANA official)
 2261 tcp,udp comotionmaster not scanned IANA registered for: CoMotion Master Server
 2262 tcp,udp comotionback not scanned IANA registered for: CoMotion Backup Server
 2266 tcp trojans Members scan Backdoor.Dawcun [Symantec-2010-040116-0914-99] (2010.04.01) - a trojan horse that steals confidential information and opens a back door on the compromised computer. It opens a back door by connecting to a remote server on TCP ports 2266 and 3390 to send the confidential information and to download, decrypt and then start the updated rootkit driver.

Port is also IANA registered for M-Files Server
 2268 tcp,udp amt not scanned AMT (IANA official) [RFC 7450]
 2281 tcp trojan Premium scan Nautical
 2283 tcp trojans Members scan Dumaru.Y [Symantec-2004-012316-2557-99] (2004.01.23) - multi-threaded, mass mailing worm that opens a backdoor, runs a keylogger and attempts to steal personal information. Opens ports 2283/tcp and 10000/tcp.

Hvl RAT - remote access trojan, coded in VB5, uses TCP ports 1095-1099 and 2283.

Port registered for Lotus Notes LNVSTATUS
 2287 tcp dna Premium scan Rig Exploit Kit communicates over port 2287 TCP, same signature as Pitou.B Trojan [Symantec-2016-011823-3733-99]

Port is IANA registered for: DNA
 2290 udp games not scanned Virtual Tennis, developer: Strangelite
 2291 udp games not scanned Virtual Tennis, developer: Strangelite
 2293 udp games not scanned Virtual Tennis, developer: Strangelite
 2294 udp games not scanned Virtual Tennis, developer: Strangelite
 2299 tcp,udp applications not scanned Monopoly Tycoon, developer: Deep Red
 2300 tcp,udp applications not scanned Combat Flight Simulator 3: Battle For Europe (UDP), Battlecom, Age of Empires III (ports 2300-2310), eJamming Station, Heroes of Might and Magic III (TCP), Realflight G3 (UDP)

Aliens vs Predator uses ports 2300-2400 (UDP)

Storm, Xplorer trojans also use port 2300 (TCP).
 2301 tcp,udp cpq-wbem not scanned Warrior Kings, HP System Management Redirect to port 2381

Compaq Web-based Management Software is vulnerable to a buffer overflow in the authentication page "cpqlogin.htm." By default, Compaq Web-based Management Software is installed on TCP port 2301 and could allow a remote attacker to send a username containing exactly 460 bytes to overflow a buffer and execute arbitrary code on the system with administrator privileges.
References: [CVE-2001-0134] [BID-2200]

Denial of service in Compaq Management Agents and the Compaq Survey Utility via a long string sent to port 2301.
References: [CVE-1999-0772]

IANA registered for: Compaq HTTP
 2302 udp games not scanned Halo - Combat Evolved, Freelancer, Battlestations: Midway, Civilization III, Dungeon Siege (TCP/UDP), Virtual Tennis, Homeworld 2 (TCP/UDP), ArmA multiplayer (default for game)
 2303 udp games not scanned Halo - Combat Evolved, Freelancer, ArmA II
 2304 udp games not scanned Freelancer
 2305 udp games not scanned ArmA II, developer: Bohemia Int.

Integer underflow in Armed Assault (aka ArmA) 1.14 and earlier, and 1.16 beta, and Armed Assault II 1.02 and earlier allows remote attackers to cause a denial of service (crash) via a VoIP over Network (VON) packet to port 2305 with a negative packet_size value, which triggers a buffer over-read.
References: [CVE-2009-2547]

Vulnerability in Halocon can cause a DoS (Denial of Service). The vulnerability is caused due to an error in the communication handling. This can be exploited to terminate the server socket by sending an empty UDP datagram to port 2305.
References: [SECUNIA-13868]

Port also IANA registered for MT ScaleServer (TCP/UDP)
 2308 tcp applications not scanned Heap-based buffer overflow in the Siemens WinCC Runtime Advanced Loader, as used in SIMATIC WinCC flexible Runtime and SIMATIC WinCC (TIA Portal) Runtime Advanced, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted packet to TCP port 2308.
References: [CVE-2011-3321]

Port also IANA registered for sdhelp (TCP/UDP)
 2311 tcp trojan Premium scan Studio 54
 2315 tcp applications not scanned IBM solidDB is vulnerable to a denial of service, caused by an error in the solid.exe database server. By sending specially-crafted TCP packets to TCP port 2315, a remote attacker could exploit this vulnerability to cause the service to crash.
References: [BID-37053]
 2322 tcp trojan Premium scan Backdoor.Shellbot [Symantec-2005-060316-4212-99]
 2323 tcp,udp 3d-nfsd not scanned Often used as alternate telnet port instead of 23 TCP

Philips TVs based on jointSPACE use port 2323 TCP

Hardcoded credentials in the Akuvox R50P VoIP phone 50.0.6.156 allow an attacker to get access to the device via telnet. The telnet service is running on port 2323; it cannot be turned off and the credentials cannot be changed.
References: [CVE-2019-12327], [XFDB-164224]

IANA registered for: 3d-nfsd
 2327 tcp,udp applications not scanned Netscape Conference H.323 HostCall
 2330 tcp trojan not scanned IRC Contact
 2331 tcp trojan not scanned IRC Contact
 2332 tcp trojans not scanned IRC Contact, Silent Spy
 2333 tcp trojans not scanned IRC Contact, backdoor.shellbot
 2334 tcp trojans Premium scan IRC Contact, Eyeveg.worm.c, Power
 2335 tcp trojans Premium scan IRC Contact, backdoor.shellbot
 2336 tcp trojan not scanned IRC Contact

OS X Portable Home Directories also uses this port.
 2337 tcp trojans not scanned IRC Contact, The Hobbit Daemon
 2338 tcp trojan not scanned IRC Contact
 2339 tcp,udp trojans not scanned IRC Contact, Voice Spy, VoiceSpy - OBS!!!
 2343 tcp trojans Premium scan Backdoor.Asylum (05.2000) - remote access trojan, uses ports 81, 2343, 23432 by default.

IANA registered for: nati logos
 2345 tcp worms Premium scan W32.Netsky.AE@mm [Symantec-2004-102522-4640-99] (2004.10.25) - a mass-mailing worm that uses its own SMTP engine to send itself to all email addresses it finds in the Windows address book on the infected computer. It also spreads by copying itself to the shared folders of various file-sharing and instant messaging programs.

W32.Yimfoca [Symantec-2010-050209-1610-99] (2010.05.02) - a worm that spreads by sending links through Yahoo! Messenger and displays surveys when popular websites are visited.

Buffer overflow in HP Openview Network Node Manager 6.1 allows remote attackers to execute arbitrary commands via the Alarm service (OVALARMSRV) on port 2345.
References: [CVE-2000-0558] [BID-1317]

By default, the port is used by Symon Communications - Symon2KpipeServer -can be changed by administrator to anything.

Doly trojan also uses this port
 2346 tcp games not scanned Rainbow Six (Client and Server), Rogue Spear, Ghost Recon (TCP/UDP)
 2347 tcp,udp games not scanned Ghost Recon
 2348 tcp,udp games not scanned Ghost Recon
 2350 udp games not scanned Commandos 3: Destination Berlin, Take No Prisoners, TrackMania (TCP/UDP), Virtual Skipper 3 and 4 (TCP/UDP)
 2350 tcp applications not scanned Nadeo Game Engine for Nadeo TrackMania and Nadeo Virtual Skipper 3 allows remote attackers to cause a denial of service (server crash) via malformed data to TCP port 2350, possibly due to long values or incorrect size fields.
References: [CVE-2004-2077], [BID-9604]
 2368 tcp,udp opentable not scanned Ghost Blogging Platform (TCP)

IANA registered for: OpenTable.
 2369 tcp,udp bif-p2p not scanned Blockchain Identifier InFrastructure P2P

Vulnerabilities listed: 100 (some use multiple ports)
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About