Threat Level: green Handler on Duty: Jim Clausing

SANS ISC: Port 389 (tcp/udp) Attack Activity Port 389 (tcp/udp) Attack Activity

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
[get complete service list]
Port Information
Protocol Service Name
tcp ldap Lightweight Directory Access Protocol
udp ldap Lightweight Directory Access Protocol
Top IPs Scanning
TodayYesterday (15) (5444) (6) (4767) (4) (3906)
Port diary mentions
LDAP Scan increase. Win98 ASN.1 patch, MyDoom Remover, Win98 free update CD
User Comments
Submitted By Date
Add a comment
CVE Links
CVE # Description
CVE-2016-3368 Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allow remote authenticated users to execute arbitrary code by leveraging a domain account to make a crafted request, aka "Windows Remote Code Execution Vulnerability."