TCP 514

ProtocolTCP
Port514
Labelsshell cmd syslog, no passwords used

Synopsis

  • TCP 514 is used by the legacy BSD Remote Shell service (rsh/rcmd, service name “shell”), provided by in.rshd/remshd on Unix systems such as Solaris, AIX, HP‑UX, and older Linux.
  • Many network/storage platforms expose rsh on 514/TCP for command execution, including Cisco IOS routers/switches (ip rcmd rsh) and NetApp ONTAP.
  • Several real-world syslog implementations accept plain syslog over TCP on port 514, notably rsyslog and syslog‑ng, as well as collectors like Graylog; network devices such as Cisco IOS, Juniper Junos, Palo Alto, and Fortinet can send syslog to 514/TCP when configured.
  • Older HPC/cluster tools have used rsh on 514/TCP for launching jobs (e.g., historical MPICH and PBS/Torque setups).
  • Security note: rsh on 514/TCP is commonly abused because it is unencrypted and relies on weak host-based trust (.rhosts/hosts.equiv), enabling spoofing and lateral movement; attackers have historically exploited rsh trust relationships (e.g., in the Morris Worm) and it remains a frequent pentest target.

Observed activity

Last 30 days Detailed chart

More information