TCP 47001

ProtocolTCP
Port47001
Labels

Synopsis

  • TCP port 47001 is used by Microsoft Windows Remote Management (WinRM) for its “Compatibility” HTTP listener on many Windows versions (e.g., Windows 7/10 and Windows Server 2008 R2/2012+).
  • The protocol carried is WS-Management (WS-Man).
  • Real-world tools and services that can use this listener include PowerShell Remoting (Enter-PSSession/Invoke-Command), Windows Event Forwarding (Windows Event Collector service), System Center Configuration Manager (SCCM) client operations, and third-party automation tools such as Ansible/Chef when configured to use WinRM.
  • Windows Remote Shell (winrs.exe) also uses WinRM and can operate via this port when the compatibility listener is enabled.
  • On these systems you’ll often see a corresponding Windows Firewall rule named “Windows Remote Management (Compatibility – HTTP-In)” for TCP 47001.
  • Security note: WinRM is commonly abused by attackers for remote command execution and lateral movement; if port 47001 is open and WinRM is enabled, it can be leveraged in the same way.

Observed activity

Last 30 days Detailed chart

More information