← Back to all network ports
TCP
Vulnerable

6379 Redis

Redis serves caching, queues, and ephemeral data, but should rarely be exposed beyond trusted application networks.

Security Context

Port 6379 is high-risk when broadly exposed. Treat it as an attack-surface decision, not just a connectivity setting, and confirm whether the listener truly needs to be reachable.

  • !Unauthenticated Redis exposure can enable data loss or remote code execution chains.

Nmap Check

Use a version probe first so you confirm whether the expected service is really what is listening on this port.

nmap -sV -p 6379 <host>

Firewall Commands

UFW
sudo ufw allow 6379/tcp
iptables
sudo iptables -A INPUT -p tcp --dport 6379 -j ACCEPT

Related TCP Ports