Port 666 Details

known port assignments and vulnerabilities

Port(s) Protocol Service Details Source 666 tcp,udp doom Doom game (ID Software) uses this port.

Dark and Light [game] uses this port.



Because of the cool connotations, this port is also used by numerous trojan horses/backdoors. Here is a list:

Attack FTP, Back Construction, BLA trojan, Cain & Abel, NokNok, Satans Back Door - SBD, ServU, Shadow Phyre, th3r1pp3rz (the rippers), lpdw0rm.

Backdoor.FTP_Ana.C [Symantec-2003-032708-3955-99] (2003.03.27) - Windows backdoor trojan.

Backdoor.Checkesp [Symantec-2003-060315-1236-99] (2003.06.03] - Windows backdoor trojan, 06.2003.

Backdoor.Private [Symantec-2003-052715-2101-99] (2003.05.27) - Windows backdoor trojan.

W32.Dreffort [Symantec-2005-040514-2341-99] (2005.04.05) - Infects .exe and .scr files, deletes files on Dec. 29th. Also opens a backdoor on the 29th of each month on port 666/tcp.

Backdoor.Microkos [Symantec-2005-081015-0341-99] (2005.08.10) - a trojan that opens a backdoor on the compromised computer. It listens for remote commands on port 65111/tcp, and can also open an additional backdoor on port 666/tcp.

Backdoor.Beasty [Symantec-2003-011711-1226-99] - a backdoor Trojan horse that allows complete access to an infected computer. By default, the Trojan listens on port 666 and notifies the hacker through ICQ. SG 666 udp Doom, first online first-person shooter (official) Wikipedia 666 tcp trojan Attack FTP, Back Construction, BLA trojan, NokNok, Reverse Trojan, Shadow Phyre, Unicorn, yoyo Trojans 666 tcp AttackFTP [trojan] Attack FTP SANS 666 tcp BackConstruction [trojan] Back Construction SANS 666 tcp BLAtrojan [trojan] BLA trojan SANS 666 tcp Cain&Abel [trojan] Cain & Abel SANS 666 tcp lpdw0rm [trojan] lpdw0rm SANS 666 tcp NokNok [trojan] NokNok SANS 666 tcp SatansBackDoor [trojan] Satans Back Door - SBD SANS 666 tcp ServU [trojan] ServU SANS 666 tcp ShadowPhyre [trojan] Shadow Phyre SANS 666 tcp th3r1pp3rz [trojan] th3r1pp3rz (= Therippers) SANS 666 tcp doom Id Software Doom Nmap 666 udp doom doom Id Software Nmap 666 tcp,udp mdqs mdqs Neophasis 666 tcp Cain&Abel [trojan] Cain & Abel Neophasis 666 tcp threat Beasty Bekkoame 666 tcp threat Cain & Abel Bekkoame 666 tcp threat Checkesp Bekkoame 666 tcp threat FTP_Ana Bekkoame 666 tcp threat Futro Bekkoame 666 tcp threat Microkos Bekkoame 666 tcp threat Private Bekkoame 666 tcp threat Sixca Bekkoame 666 tcp threat th3r1pp3rz Bekkoame 666 tcp threat W32.Dreffort Bekkoame 666 tcp,udp doom doom Id Software IANA

28 records found

Related ports: 13 620 65111

« back to SG Ports



External Resources

SANS Internet Storm Center: port 666

Notes:

Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify a specific process, or network service. IANA is responsible for internet protocol resources, including the registration of commonly used port numbers for well-known internet services.

Well Known Ports: 0 through 1023.

Registered Ports: 1024 through 49151.

Dynamic/Private : 49152 through 65535.



TCP ports use the Transmission Control Protocol, the most commonly used protocol on the Internet and any TCP/IP network. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered in the same order in which they were sent. Guaranteed communication/delivery is the key difference between TCP and UDP.



UDP ports use the Datagram Protocol. Like TCP, UDP is used in combination with IP (the Internet Protocol) and facilitates the transmission of datagrams from one computer to applications on another computer, but unlike TCP, UDP is connectionless and does not guarantee reliable communication; it's up to the application that received the message to process any errors and verify correct delivery. UDP is often used with time-sensitive applications, such as audio/video streaming and realtime gaming, where dropping some packets is preferable to waiting for delayed data.



When troubleshooting unknown open ports, it is useful to find exactly what services/processes are listening to them. This can be accomplished in both Windows command prompt and Linux variants using the "netstat -aon" command. We also recommend runnig multiple anti-virus/anti-malware scans to rule out the possibility of active malicious software. For more detailed and personalized help please use our forums.