← Back to all network ports
TCP
Vulnerable
6379 Redis
Redis serves caching, queues, and ephemeral data, but should rarely be exposed beyond trusted application networks.
Security Context
Port 6379 is high-risk when broadly exposed. Treat it as an attack-surface decision, not just a connectivity setting, and confirm whether the listener truly needs to be reachable.
- !Unauthenticated Redis exposure can enable data loss or remote code execution chains.
Nmap Check
Use a version probe first so you confirm whether the expected service is really what is listening on this port.
nmap -sV -p 6379 <host>Firewall Commands
UFW
sudo ufw allow 6379/tcpiptables
sudo iptables -A INPUT -p tcp --dport 6379 -j ACCEPT