Port 12345 (tcp/udp) (2024)

Port 12345 (tcp/udp) (1)Login

Please Login

Port 12345 (tcp/udp) (2)Shortcuts

  • 5000+ Routers
  • 65535 Ports
  • FAQs
  • Glossary
  • SG Broadband Tools
  • SG IP Locator
  • SG Network Tools
  • SG Security Scan
  • SG Speed Test
  • TCP/IP Analyzer
  • TCP/IP Optimizer

Port 12345 (tcp/udp) (3) Home » Ports Database » Port Details

known port assignments and vulnerabilities

threat/application/port search:

Port(s)ProtocolServiceDetailsSource
12345 tcp NetBus Because of the common sequence of numbers "1 2 3 4 5" this port is commonly chosen when configuring programs, or as default port number.

Cubeworld Server uses port 12345 (TCP/UDP)

opendkim default port (may also use ports 8891,54321)

Tailscale (WireGuard-based open source app for secure private networks) uses port 12345

Some trojan horses/backdoors use this port: Ashley, Fat Bitch trojan, GabanBus, icmp_client.c, icmp_pipe.c, Mypic, NetBus Trojan, Pie Bill Gates, Whack Job, X-bill, ValvNet, TMListen, cron/crontab, Adoresshd.

Backdoor.Amitis.B [Symantec-2003-051915-1012-99] (2003.05.19) Windows remote access trojan. Listens on ports 3547, 7823, 12345, 13173, 44280, 44390, 47387, 64429. Other variants of Backdoor.Amitis also use ports 27, 551.

The Trend Micro OfficeScan uses port 12345. Client allows remote attackers to cause a denial of service by making 5 connections to port 12345, which raises CPU utilization to 100%.
References: [CVE-2000-0204] [BID-1013]

iSmartAlarm cube devices allow Denial of Service. Sending a SYN flood on port 12345 will freeze the "cube" and it will stop responding.
References: [CVE-2017-7730]

Incorrect access control for the diagnostic files of the iSmartAlarm Cube One through 2.2.4.10 allows an attacker to retrieve them via a specifically crafted TCP request to port 12345 and 22306, and access sensitive information from the device.
References: [CVE-2018-16224]

The Emerson DeltaV Distributed Control System (DCS) through 2022-04-29 mishandles authentication. It utilizes several proprietary protocols for a wide variety of functionality. These protocols include Firmware upgrade (18508/TCP, 18518/TCP); Plug-and-Play (18510/UDP); Hawk services (18507/UDP); Management (18519/TCP); Cold restart (18512/UDP); SIS communications (12345/TCP); and Wireless Gateway Protocol (18515/UDP). None of these protocols have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality.
References: [CVE-2022-29957]

SG
12345 tcp,udp NetBus - remote administration tool (often Trojan horse). Also used by NetBuster. Little Fighter 2 (TCP). (unofficial) Wikipedia
12345 tcp trojan Ashley, BlueIce 2000, Mypic , NetBus , Pie Bill Gates, Q-taz , Sensive, Snape, Vagr Nocker, ValvNet , Whack Job Trojans
12345 udp trojan BlueIce 2000 Trojans
12345 tcp NetBus [trojan] NetBus SANS
12345 tcp NetBus [trojan] NetBus backdoor trojan SANS
12345 tcp netbus NetBus backdoor trojan or Trend Micro Office Scan Nmap
12345 tcp Adoresshd [trojan] Adore sshd Neophasis
12345 tcp Ashley [trojan] Ashley Neophasis
12345 tcp cron/crontab [trojan] cron / crontab Neophasis
12345 tcp FatBitchtrojan [trojan] Fat Bitch trojan Neophasis
12345 tcp GabanBus [trojan] GabanBus Neophasis
12345 tcp icmp_client.c [trojan] icmp_client.c Neophasis
12345 tcp icmp_pipe.c [trojan] icmp_pipe.c Neophasis
12345 tcp Mypic [trojan] Mypic Neophasis
12345 tcp NetBusToy [trojan] NetBus Toy Neophasis
12345 tcp NetBusworm [trojan] NetBus worm Neophasis
12345 tcp PieBillGates [trojan] Pie Bill Gates Neophasis
12345 tcp TMListen TrendMicro OfficeScan TMListen Neophasis
12345 tcp ValvNet [trojan] ValvNet Neophasis
12345 tcp WhackJob [trojan] Whack Job Neophasis
12345 tcp X-bill [trojan] X-bill Neophasis
12345 tcp,udp threat Amitis Bekkoame
12345 tcp,udp threat Ashley Bekkoame
12345 tcp,udp threat cron / crontab Bekkoame
12345 tcp,udp threat Fat Bitch trojan Bekkoame
12345 tcp,udp threat GabanBus Bekkoame
12345 tcp,udp threat icmp_client.c Bekkoame
12345 tcp,udp threat icmp_pipe.c Bekkoame
12345 tcp,udp threat Mypic Bekkoame
12345 tcp,udp threat NetBus Bekkoame
12345 tcp,udp threat NetBus Toy Bekkoame
12345 tcp,udp threat NetBus worm Bekkoame
12345 tcp,udp threat Notice how this port is the sequence of numbers "1 2 3 4 5". This is common chosen whenever somebody is asked to configure a port number. It is likewise chosen by programmers when creating default port numbers for their products. One very famous such uses is with NetBus. Trend Micro's OfficeScan products use this port. Bekkoame
12345 tcp,udp threat Pie Bill Gates Bekkoame
12345 tcp,udp threat Whack Job Bekkoame
12345 tcp,udp threat X-bill Bekkoame
12345 tcp,udp italk Italk Chat System IANA
38 records found

SG security scan: port 12345

jump to:

Related ports: 27 551 2547 7823 8891 12346 20034 22306 54321 56789

« back to SG Ports


External Resources
SANS ISC: port 12345

Notes:
Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify a specific process, or network service. IANA is responsible for internet protocol resources, including the registration of commonly used port numbers for well-known internet services.
Well Known Ports: 0 through 1023.
Registered Ports: 1024 through 49151.
Dynamic/Private : 49152 through 65535.

TCP ports use the Transmission Control Protocol, the most commonly used protocol on the Internet and any TCP/IP network. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered in the same order in which they were sent. Guaranteed communication/delivery is the key difference between TCP and UDP.

UDP ports use the Datagram Protocol. Like TCP, UDP is used in combination with IP (the Internet Protocol) and facilitates the transmission of datagrams from one computer to applications on another computer, but unlike TCP, UDP is connectionless and does not guarantee reliable communication; it's up to the application that received the message to process any errors and verify correct delivery. UDP is often used with time-sensitive applications, such as audio/video streaming and realtime gaming, where dropping some packets is preferable to waiting for delayed data.

When troubleshooting unknown open ports, it is useful to find exactly what services/processes are listening to them. This can be accomplished in both Windows command prompt and Linux variants using the "netstat -aon" command. We also recommend runnig multiple anti-virus/anti-malware scans to rule out the possibility of active malicious software. For more detailed and personalized help please use our forums.

Please use the "Add Comment" button below to provide additional information or comments about port 12345.

User Reviews/Comments:

rate:

avg: Port 12345 (tcp/udp) (6)Port 12345 (tcp/udp) (7)Port 12345 (tcp/udp) (8)Port 12345 (tcp/udp) (9)Port 12345 (tcp/udp) (10)

Related Links:

  • SG Ports Database » Vulnerable Ports
  • SG Security Scan » Scanned Ports » Commonly Open Ports
  • SG Broadband Tools

Related Links

  • All Known Ports
  • All Vulnerable Ports
  • Scanned Ports
  • Open Ports
  • Recently Updated Ports
  • Popular Ports/Ranges
  • SG Security Scan
Port 12345 (tcp/udp) (2024)
Top Articles
You Only Need These Seven Vanguard ETFs to Build a Complete Portfolio
BB takes firm stance against state-owned banks over increasing default loans
Understanding different domain transfer statuses | Hostinger Help Center
Murrieta Aeries Portal
Obituary Times Herald Record
Terramia Brick Oven Pizza & Trattoria Menu
Argyle Skyward
Beau Burns Gofundme
Stellafrancisdior
Moana Nail Salon Katy Tx
Royal Cuts Kentlands
Explorer Map Aberration
Ilsos.gove
Vados X Male Reader
Alcon National Driving Center Inc
韓國KBJ美女視頻-2021051021-ssefth1203-小野猫福利
How to Sell Cars on Craigslist: A Guide for Car Dealers | ACV Auctions
Nail Shops That Are Open Now
Allmovieshub. In
Apartments For Rent Seattle Wa Craigslist
Nog Bible
Jabcomix News
What's My Wells Fargo Routing Number?
Movie Tavern Suwanee Menu
Www Craigslist Com Kansas Wichita
Round Yellow Adderall
Buhsd Studentvue
Watchmen On The Wall Bravenet
Craigslist Ludington Michigan
1971 Monte Carlo For Sale Craigslist
Vip Market Vetsource
Busted Bryan Tx
Recordpub Com Obits
Why Is 365 Market Troy Mi On My Bank Statement
Dr Frobish Possesses A
5Gomovies
How to Use Keyframes in CapCut
Cvs Min Clinic
Ric Flair's Net Worth (Updated 2023) | Inspirationfeed
Remax Mls
Bushnell Wingman Solid Orange Light
Solar Nails Port Lavaca
Restored Republic December 9 2022
Inland Empire Craigslist Macy's
Twin Cities Live Recipe Replay Today
Klay Thompson Finals Stats
Sarah Button Leaks
Gander Rv Hamburg Ny
Lowes.com Usa
Depew Garbage Schedule 2023
Space Quest III: The Pirates of Pestulon - PCGamingWiki PCGW
Myhr North Memorial
Latest Posts
Article information

Author: Kieth Sipes

Last Updated:

Views: 6136

Rating: 4.7 / 5 (47 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Kieth Sipes

Birthday: 2001-04-14

Address: Suite 492 62479 Champlin Loop, South Catrice, MS 57271

Phone: +9663362133320

Job: District Sales Analyst

Hobby: Digital arts, Dance, Ghost hunting, Worldbuilding, Kayaking, Table tennis, 3D printing

Introduction: My name is Kieth Sipes, I am a zany, rich, courageous, powerful, faithful, jolly, excited person who loves writing and wants to share my knowledge and understanding with you.