← Back to all network ports
TCP
Vulnerable

135 MS RPC

Microsoft RPC endpoint mapping supports Windows administration and many domain-integrated services.

Security Context

Port 135 is high-risk when broadly exposed. Treat it as an attack-surface decision, not just a connectivity setting, and confirm whether the listener truly needs to be reachable.

  • !RPC exposure increases the attack surface on unmanaged Windows hosts.

Nmap Check

Use a version probe first so you confirm whether the expected service is really what is listening on this port.

nmap -sV -p 135 <host>

Firewall Commands

UFW
sudo ufw allow 135/tcp
iptables
sudo iptables -A INPUT -p tcp --dport 135 -j ACCEPT

Related TCP Ports