Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!

Hetzner Offene Portmapper Dienste
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Hetzner Offene Portmapper Dienste

hello i am received this type of alerts from hetzner several times :
Abuse Message [AbuseID:8XXXXX]: AbuseBSI: [CB-Report#2XXXXX-XXXX] Offene Portmapper-Dienste in AS2XXX

We have received a security alert from the German Federal Office for Information Security (BSI).
Please see the original report included below for details.

We are automatically forwarding this alert on to you, for your information.
You do not need to send us, or the BSI, a response.
However, we do ask that you check the alert and to resolve any potential issues.

Additional information is provided with the HOWTOs referenced in the report.
In case of further questions, please contact [email protected] and keep the ticket number of the original report [CB-Report#...] in the subject line. Do not reply to as this is just the sender address for the reports and messages sent to this address will not be read.

Kind regards

Abuse Team

Dear Sir or Madam,


the Portmapper service (portmap, rpcbind) is required for mapping RPC
requests to a network service. The Portmapper service is needed e.g.
for mounting network shares using the Network File System (NFS).
The Portmapper service runs on port 111 tcp/udp.


In addition to being abused for DDoS reflection attacks, the
Portmapper service can be used by attackers to obtain information
on the target network like available RPC services or network shares.


Over the past months, systems responding to Portmapper requests from
anywhere on the Internet have been increasingly abused DDoS reflection
attacks against third parties.


Please find below a list of affected systems hosted on your network.
The timestamp (timezone UTC) indicates when the openly accessible
Portmapper service was identified.


We would like to ask you to check this issue and take appropriate
steps to secure the Portmapper services on the affected systems or
notify your customers accordingly.


If you have recently solved the issue but received this notification
again, please note the timestamp included below. You should not
receive any further notifications with timestamps after the issue
has been solved.


Additional information on this notification, advice on how to fix
reported issues and answers to frequently asked questions:


This message is digitally signed using PGP.
Information on the signature key is available at:


Please note:
This is an automatically generated message. Replies to the
sender address will NOT be read
but silently be discarded. In case of questions, please contact and keep the ticket number [CB-Report#...]
of this message in the subject line.


Affected systems on your network:


Format: ASN | IP | Timestamp (UTC) | RPC response
24940 | MY_IP_ADDRESS_HERE | 2021-04-13 05:20:30 | 100000 4 111/udp; 100000 3 111/udp; 100000 2 111/udp; 100000 4 111/udp; 100000 3 111/udp; 100000 2 111/udp;

i am using cPanel/WHM , CLoudLinux, litespeed on my server.

anyone can help me why i am getting this?


  • FalzoFalzo Member
    edited April 2021

    you could have google'd it...

    there is a german "service" run by the government which does (port-)scans for services with known vulnerabilities and then send out these notifications to the provider. it's all automated and is just passed through by hetzner (they are required to do so).

    this is one of the abuse messages you do not need to react to, as it is stated in Hetzner mail. however they will keep on coming and be annoying. and for sure you do not want to block that sender...

    for the issue at hand, simply read again. it'S a notification that you have port 111 (udp) open to public, which is a potential risk because it could be abused. rpcbind is the service in question here which usually comes as depency if you install nfs for whatever reason.

    you can either mask/uninstall rpcbind or block that port on hetzners firewall for your server.

    Thanked by 1hanoi
  • @Falzo said:
    there is a german "service" run by the government which does (port-)scans for services with known vulnerabilities...

    this is one of the abuse messages you do not need to react to...

    Didn't realise Hetzner don't enforce this DE initiative. Not all German providers have such a light touch, send the following:

    We will suspend or nullroute server with open portmapper services running insecured within our network! Please take appropriate measures to secure or stop the portmapper service on your server within 24 hours.

    But at least they're clear on what you need to do.

  • In your other threads people suggested that you should not start web hosting business at this moment as you are not capable. Also specifically told you about Hetzner abuse system. You didn't listen. Why bother us now?

    Thanked by 1angstrom
  • angstromangstrom Moderator

    Nigh, the end is

Sign In or Register to comment.