TCP
Dangerous
Other
Port 1080 (SOCKS)
Learn about port 1080 (SOCKS) - security risks, vulnerabilities, and common uses. Find devices with port 1080 open.
Quick Info
Port Number
1080
Protocol
TCP
Service
SOCKS
IANA Name
SOCKS
Service Description
Network port 1080 (TCP) is most commonly associated with the SOCKS (Socket Secure) protocol. SOCKS is an internet protocol that routes network packets between a client and a server through a proxy server. Unlike HTTP proxies that understand HTTP traffic, SOCKS operates at a lower layer (layer 5 of the OSI model), providing a generic proxy for any TCP or UDP traffic. This makes it highly versatile for various applications, including web browsing, file transfer, and email. The client establishes a connection with the SOCKS server, authenticates if required, and then instructs the server to connect to a specified destination address and port. All subsequent traffic between the client and the destination flows through the SOCKS server. Several versions of SOCKS exist, with SOCKS5 being the most prevalent, adding authentication and UDP proxying capabilities.
The SOCKS protocol works by establishing a TCP connection between the client and the SOCKS server. The client then sends a request to the server, specifying the desired destination address (IP or domain name) and port. For SOCKS5, the client and server negotiate an authentication method. Common methods include no authentication, username/password authentication, and GSSAPI. Once authenticated (if required), the SOCKS server establishes a connection to the destination server on behalf of the client. All data transmitted between the client and the destination server is relayed through the SOCKS server. This process effectively masks the client's IP address, making it appear as if the traffic is originating from the SOCKS server itself. This capability is often used for circumventing network restrictions or enhancing privacy.
## Firewall Recommendations
Blocking port 1080 is a reasonable security measure if SOCKS proxies are not explicitly required within your network. If SOCKS proxies are necessary, restrict access to authorized users and IP addresses only. Implement strong authentication mechanisms (e.g., username/password, GSSAPI) to prevent unauthorized access. Regularly monitor SOCKS proxy logs for suspicious activity. Ensure that the SOCKS server software is up-to-date with the latest security patches to mitigate known vulnerabilities. Consider using a VPN instead of a SOCKS proxy for enhanced security and encryption. Employ intrusion detection and prevention systems (IDS/IPS) to detect and block malicious traffic attempting to exploit SOCKS proxies. Outbound port 1080 should be restricted on end-user devices unless specifically required and properly secured.
The SOCKS protocol works by establishing a TCP connection between the client and the SOCKS server. The client then sends a request to the server, specifying the desired destination address (IP or domain name) and port. For SOCKS5, the client and server negotiate an authentication method. Common methods include no authentication, username/password authentication, and GSSAPI. Once authenticated (if required), the SOCKS server establishes a connection to the destination server on behalf of the client. All data transmitted between the client and the destination server is relayed through the SOCKS server. This process effectively masks the client's IP address, making it appear as if the traffic is originating from the SOCKS server itself. This capability is often used for circumventing network restrictions or enhancing privacy.
## Firewall Recommendations
Blocking port 1080 is a reasonable security measure if SOCKS proxies are not explicitly required within your network. If SOCKS proxies are necessary, restrict access to authorized users and IP addresses only. Implement strong authentication mechanisms (e.g., username/password, GSSAPI) to prevent unauthorized access. Regularly monitor SOCKS proxy logs for suspicious activity. Ensure that the SOCKS server software is up-to-date with the latest security patches to mitigate known vulnerabilities. Consider using a VPN instead of a SOCKS proxy for enhanced security and encryption. Employ intrusion detection and prevention systems (IDS/IPS) to detect and block malicious traffic attempting to exploit SOCKS proxies. Outbound port 1080 should be restricted on end-user devices unless specifically required and properly secured.
Security Information
Port 1080, being the standard port for SOCKS proxies, is a frequent target for attackers. A misconfigured or unsecured SOCKS proxy can allow unauthorized users to route their traffic through the proxy, potentially using it for malicious activities like distributing malware, launching DDoS attacks, or accessing restricted resources. Open SOCKS proxies, those without proper authentication, are particularly vulnerable. Attackers actively scan the internet for open SOCKS proxies to exploit. Furthermore, vulnerabilities in the SOCKS server software itself can be exploited to gain control of the server or the network it resides on. Compromised machines within a network can be turned into SOCKS proxies, allowing attackers to move laterally and exfiltrate data undetected. The lack of encryption in older SOCKS versions also poses a risk, as traffic can be intercepted and monitored.
Known Vulnerabilities
| CVE | Name | Severity | Description |
|---|---|---|---|
| CVE-2019-1010001 | Heap buffer overflow in Dante SOCKS server | High | Уязвимость переполнения буфера кучи в Dante SOCKS сервере позволяет удаленному злоумышленнику вызвать отказ в обслуживании или выполнить произвольный код. |
| CVE-2017-1000201 | Dante SOCKS server information disclosure | Medium | Уязвимость раскрытия информации в Dante SOCKS сервере позволяет удаленному злоумышленнику получить конфиденциальную информацию. |
Malware Associations
- Proxy.Agent
- Zeus/Zbot
- Trickbot
- Qakbot
Common Software
- Proxychains
- Tor (в некоторых конфигурациях)
- Bitvise SSH Client
- PuTTY (с SOCKS-прокси туннелированием)
- OpenSSH (с динамической переадресацией портов)
- Dante
- 3proxy
- CCProxy
Find devices with this port
Discover all devices with port 1080 open in any country.
Search Port 1080Find all devices with port 1080 open
ScaniteX scans millions of IPs to find devices with specific ports open. Perfect for security research and network auditing.
Start Mass Scanning
EN
Русский