1. Ports
  2. Port 1786

Port 1786 belongs to the registered port range (1024-49151). This range is managed by the Internet Assigned Numbers Authority (IANA), which maintains the official registry of which services are supposed to use which ports. Port 1786 is not on that list. IANA has no assigned service for it.1

That doesn't make it empty in practice.

What the Registered Range Means

Ports divide into three ranges by convention:

  • Well-known ports (0-1023): Reserved for core Internet services. SSH, HTTP, DNS. Touching these requires root privileges on most systems.
  • Registered ports (1024-49151): Applications can apply to IANA to claim a port here. Thousands are assigned. Thousands are not.
  • Dynamic/ephemeral ports (49152-65535): Handed out temporarily for outbound connections. Your browser uses one every time it loads a page.

Port 1786 sits in the middle category. IANA manages it but has assigned it to no one. It's registered land with no building permit on file.

Observed Unofficial Uses

Building Automation (BACnet)

The most frequently observed unofficial use of port 1786 involves BACnet, the protocol that lets building systems talk to each other. Your office's HVAC, lighting controls, fire detection panels, and access control systems often communicate over BACnet.2

BACnet's standard port is 47808 (0xBAC0, which is memorably hexadecimal for "BAC-zero"). But building automation installers sometimes move traffic to non-standard ports for firewall or segmentation reasons. Port 1786 appears in some BACnet firewall configuration documentation as an alternative.3

This means if you're in a building with a BACnet system and someone decided to run it on a non-standard port, 1786 might be carrying signals that tell the thermostat what temperature to maintain. The protocol predates widespread Internet security awareness and was designed for isolated building networks, not public exposure.

Security Footnote

Port 1786 appears on historical lists of ports associated with malware activity.4 This is not unusual. Malware authors use unassigned ports specifically because they don't attract immediate attention the way port 23 (Telnet) or port 4444 (a known reverse shell default) might. An unassigned port blending into normal traffic is exactly what they want.

This doesn't mean traffic on port 1786 is malicious. It means it warrants scrutiny.

How to Check What's Listening

If you see port 1786 active on your system, these commands will tell you what's using it:

Linux/macOS:

# Show process listening on port 1786
ss -tlnp | grep 1786

# Or with lsof
lsof -i :1786

Windows:

netstat -ano | findstr :1786

The process ID in the output can then be matched against Task Manager or tasklist to identify the application.

Network-wide:

# Scan for hosts with port 1786 open on your network
nmap -p 1786 192.168.1.0/24

Why Unassigned Ports Matter

The port system works because assignment creates shared expectations. When a packet arrives on port 443, everyone on both ends knows HTTPS is expected. When a packet arrives on port 1786, nothing is established. Both legitimate applications and malicious software exploit this ambiguity.

Unassigned ports are a feature, not a bug. Applications need room to operate before they're formally standardized, and some never need formal standardization at all. But they require more vigilance: without a known service, you have to look at the traffic itself to know what it is.

Cette page vous a-t-elle été utile ?

😔
🤨
😃