The Broadband Guide
SG
search advanced

Port 7000 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
7000 tcp afs-fileserver AFS fileserver, Command and Conquer Renegade, Avira Server Management Console, Rumble Fighter (TCP/UDP)

Default for Vuze's built in HTTPS Bittorrent Tracker.

The game Aliens vs Predator 2 uses ports 7000-10000 (TCP).

W32.Gaobot.BQJ [Symantec-2004-110816-5549-99] (2004.11.08) - network-aware worm taht opens a backdoor and can be controlled via IRC. It can affect all current Windows versions. Connects to an IRC server on port 7000/tcp.
W32.Mydoom.BQ@mm [Symantec-2005-050910-1159-99] (2005.05.09) - mass-mailing worm with backdoor capabilities, that uses its own SMTP engine. It communicates with an IRC server and listens for remote commands on port 7000/tcp.

W32.Mytob.GC@mm [Symantec-2005-062415-4022-99] (2005.06.24) - mass-mailing worm that opens a backdoor on port 7000/tcp.

Some older trojan horses/backdoors that also use this port: Exploit Translation Server, Kazimas, Remote Grab, SubSeven, BackDoor-G

The control-plane access-list implementation in Cisco IPS Software before 7.1(8p2)E4 and 7.2 before 7.2(2)E4 allows remote attackers to cause a denial of service (MainApp process outage) via crafted packets to TCP port 7000, aka Bug ID CSCui67394.
References: [CVE-2014-0719], [BID-65667], [XFDB-91195]
SG
7000 udp citrix Citrix NetScaler cluster heart beat exchange SG
7000 tcp Default for Vuze's built in HTTPS Bittorrent Tracker (unofficial) Wikipedia
7000 tcp trojan Aladino, Gunsan, Remote Grab, SubSeven , SubSeven 2.1 Gold, Theef Trojans
7000 tcp afs3-fileserver file server itself msdos SANS
7000 tcp ExploitTranslation [trojan] Exploit Translation Server SANS
7000 tcp Kazimas [trojan] Kazimas SANS
7000 tcp RemoteGrab [trojan] Remote Grab SANS
7000 tcp SubSeven2.1Gold [trojan] SubSeven 2.1 Gold SANS
7000 tcp SubSeven [trojan] SubSeven SANS
7000 udp afs3-fileserver file server itself SANS
3000,5670,7777,7000-7100 tcp applications Active Worlds Portforward
7000-7100 udp applications City of Heroes Portforward
7000-7100 udp applications City of Villains Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Command and Conquer Red Alert Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Command and Conquer Red Alert 2 Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Command and Conquer Red Alert 2 Yuris Revenge Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Command and Conquer Red Alert Aftermath Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Command and Conquer Red Alert Counterstrike Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Command and Conquer Renegade Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Command and Conquer The Covert Operations Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Command and Conquer Tiberian Dawn Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Command and Conquer Tiberian Sun Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Command and Conquer Tiberian Sun Firestorm Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Dune2000 Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Emperor Battle for Dune Portforward
1024,7000 tcp applications Everquest Portforward
7000,7010 tcp applications Everquest 2 Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Nox Portforward
6970-7000 udp applications QuickTime 4 server Portforward
50000, 6000-7000, 10070-10080 udp applications Sony Playstation 3 Portforward
3840, 4005, 4808, 4810, 4995, 7000-7002 tcp applications Xwis Portforward
7000 tcp afs3-fileserver file server itself, msdos Nmap
7000 udp afs3-fileserver file server itself Nmap
7000 tcp irc2 IRC2 Neophasis
7000 tcp threat "xfont" (X Windows font server) Bekkoame
7000 tcp threat BAT.Boohoo.Worm Bekkoame
7000 tcp threat Spyboter Bekkoame
7000 tcp threat W32.Gaobot Bekkoame
7000 tcp threat W32.Mydoom Bekkoame
7000 tcp threat W32.Mytob Bekkoame
7000 tcp,udp afs3-fileserver file server itself IANA
6999-7001 tcp applications OfficePax Portforward
6970-7170 udp applications RealAudio Portforward
44 records found
jump to:
 go
previous next

Related ports: 3840  4005  4808  4810  7001  7002  7003  7004  7005  7006  

« back to SG Ports


External Resources
SANS Internet Storm Center: port 7000

Notes:
Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify a specific process, or network service. IANA is responsible for internet protocol resources, including the registration of commonly used port numbers for well-known internet services.
Well Known Ports: 0 through 1023.
Registered Ports: 1024 through 49151.
Dynamic/Private : 49152 through 65535.

TCP ports use the Transmission Control Protocol, the most commonly used protocol on the Internet and any TCP/IP network. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered in the same order in which they were sent. Guaranteed communication/delivery is the key difference between TCP and UDP.

UDP ports use the Datagram Protocol. Like TCP, UDP is used in combination with IP (the Internet Protocol) and facilitates the transmission of datagrams from one computer to applications on another computer, but unlike TCP, UDP is connectionless and does not guarantee reliable communication; it's up to the application that received the message to process any errors and verify correct delivery. UDP is often used with time-sensitive applications, such as audio/video streaming and realtime gaming, where dropping some packets is preferable to waiting for delayed data.

When troubleshooting unknown open ports, it is useful to find exactly what services/processes are listening to them. This can be accomplished in both Windows command prompt and Linux variants using the "netstat -aon" command. We also recommend runnig multiple anti-virus/anti-malware scans to rule out the possibility of active malicious software. For more detailed and personalized help please use our forums.

Please use the "Add Comment" button below to provide additional information or comments about port 7000.
  User Reviews/Comments:
    rate:
   avg:
by anonymous - 2014-09-17 22:57
EMC ViPR
News Glossary of Terms FAQs Polls Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Routers Wireless Firewalls / VPNs Software Hardware User Reviews
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About