← Port Encyclopedia
290
Port-290
TCP
System
Low Risk
Reserved or unassigned port 290 — may appear in network scans as open, closed, or filtered
🔍 How to Scan Port 290
nmap -sV -p 290 target
nmap -sV -sC --script=banner -p 290 target
nc -zv target 290
🛡️ Security Considerations
- Scan port 290 with
nmap -sVto identify the exact service and version - If Port-290 is not needed, close or firewall this port immediately
- Check for default credentials if a management interface runs on this port
- Use
searchsploit port-290to find known exploits - Monitor traffic on port 290 with Wireshark or tcpdump for anomalies
- Ensure the service is patched to the latest version to prevent known CVE exploitation