Port Authority Edition – Internet Vulnerability Profiling
by Steve Gibson,  Gibson Research Corporation.





Goto Port 160
Probe Port 161
Enter Port: 0-65535
Goto Port 162



Port Authority Database

Port 161

Name: 
snmp

Purpose: 
Simple Network Management Protocol

Description: 
Whereas "Telnet" is a console-oriented protocol oriented toward allowing people to remotely connect to, query, and "converse with" equipment over the Internet in a textual format, SNMP provides a similar "machine-to-machine" facility allowing one device to interact with another.

Related Ports: 
23




Background and Additional Information:

SNMP servers open port 161. They listen for and respond to incoming client requests and commands and are also able to issue alerts, called "traps" in response to specified events. SNMP client programs generally present their users with a comfortable abstraction of the remotely controlled device, then translate their user's desires into SNMP protocol for interaction with the remote equipment.

Most users will not be exposed to SNMP (nor will they ever find port 161 open) unless some piece of their networking equipment has an active and open SNMP service port. If our port analysis ever shows that a router (for example) or other network device exposed to the Internet has its SNMP interface open you will want to arrange to disable and close that port immediately. Malicious hackers know that some consumer networking equipment has been shipped with exposed SNMP ports and with default access passwords. Therefore, it would not be at all unlikely that such a router or other equipment would be quickly discovered and exploited. Malicious hackers would find this amusing, but you would probably not.

SNMP RFC

The complete specification of the "Simple" (yeah, right) Network Management Protocol:

  http://www.ietf.org/rfc/rfc1157.txt

  http://www.faqs.org/rfcs/rfc1157.html

The entire contents of this page is copyright © 2008 by Gibson Research Corporation.


Jump to top of page
Gibson Research Corporation is owned and operated by Steve Gibson.  The contents
of this page are Copyright (c) 2016 Gibson Research Corporation. SpinRite, ShieldsUP,
NanoProbe, and any other indicated trademarks are registered trademarks of Gibson
Research Corporation, Laguna Hills, CA, USA. GRC's web and customer privacy policy.
Jump to top of page