TCP 4444
Synopsis
- Selenium Server/Selenium Grid listens on TCP 4444 by default for WebDriver (/wd/hub) connections (e.g., http://localhost:4444).
- The I2P router’s built-in HTTP proxy (eeproxy) defaults to localhost:4444 to tunnel web traffic through the I2P network.
- Sophos UTM (Astaro) and Sophos XG Firewall use HTTPS on port 4444 for their WebAdmin interface (e.g., https://
:4444). - The Metasploit Framework commonly uses port 4444 as the default LPORT for reverse shells/Meterpreter handlers; attackers also abuse this convention.
- The W32.Blaster (MSBlast) worm opened a backdoor listening on TCP 4444 on infected Windows systems to accept commands.
- Older JBoss Application Server (3.x/4.x) exposed a JBoss Remoting/JRMP invoker on TCP 4444 by default, which has been targeted in remote code execution attacks when left unsecured.
Observed activity
Last 30 days
Detailed chart