🔌 Open Ports & StudiosSSH + curl recipes

Catalog of dev studios, SSH daemons, and packet/file-handling apps — overlaid with live handshake observation. Recipes below are scoped to your device fingerprint.

fp = (loading)
Catalog entries
22
Public listeners
7
Observed live
0
Touch files
18
Visibility:
VisibilityStudioProcessPortTouchesLiveNotes
LOOPBACK
SSH
ssh-agent
ssh-agentunix/tcp📁 filesLocal key cache (Unix socket). Holds private keys in memory; never bind to a public port.
LOOPBACK
RF studio
GNU Radio Companion (ZMQ)
gnuradio-companion1234/tcp📁 files📡 packetsZMQ source/sink for SDR flowgraphs. Streams I/Q packets.
LOOPBACK
Web dev
Next.js / Node dev
node3000/tcp📁 files📡 packetsCommon dev port. Loopback unless 0.0.0.0.
LOOPBACK
Media
OBS Studio (WebSocket)
obs4455/tcp📁 files📡 packetsScene/source control. Loopback by default; password-protected.
LOOPBACK
Web dev
Vite dev server
node5173/tcp📁 files📡 packetsHMR WebSocket + module graph. Loopback by default; --host exposes it.
LOOPBACK
IDE
VS Code Server
node8000/tcp📁 files📡 packetsRemote-SSH / code-server. Serves your workspace files over HTTP/WebSocket.
LOOPBACK
IDE
Cursor IDE
cursor8765/tcp📁 files📡 packetsLocal RPC for AI completions and file indexing.
LOOPBACK
IDE
Jupyter notebook
jupyter8888/tcp📁 files📡 packetsNotebook kernel + WebSocket. Loopback unless --ip=0.0.0.0.
LOOPBACK
DNA studio
SnapGene (file watch)
snapgene9001/tcp📁 filesLocal sequence file watcher.
LOOPBACK
IDE
JetBrains IDE (IntelliJ/PyCharm)
idea63342/tcp📁 filesBuilt-in HTTP server for previews + LSP. Loopback by default.
PRIVATE
RF studio
SoapySDR remote
SoapySDRServer1350/tcp📡 packetsRemote SDR control + samples. Private/VPN only.
PRIVATE
Container
Docker daemon (TLS)
dockerd2376/tcp📁 files📡 packetsTLS-protected Docker API.
PRIVATE
Database
PostgreSQL
postgres5432/tcp📁 files📡 packetsShould be private. Reads/writes WAL + heap files.
PRIVATE
Database
Redis
redis-server6379/tcp📁 files📡 packetsRDB/AOF on disk. Public Redis = full RCE — keep private.
PRIVATE
Container
Kubernetes API server
kube-apiserver6443/tcp📁 files📡 packetsCluster control plane. Private/VPC only.
PUBLIC
SSH
OpenSSH server
sshd22/tcp📁 files📡 packetsEncrypted shell + SCP/SFTP file transfer + port forwarding. Public if exposed to LAN/WAN.
PUBLIC
DNA studio
Benchling sync agent
benchling-agent443/tcp📁 files📡 packetsOutbound HTTPS to Benchling. Carries plasmid + sequence files.
PUBLIC
Messaging
MQTT broker
mosquitto1883/tcp📡 packetsPub/sub for IoT. Often public for sensors. TLS variant on 8883.
PUBLIC
Container
Docker daemon (TCP)
dockerd2375/tcp📁 files📡 packetsUNENCRYPTED Docker API. If public, attacker can spawn containers — always use 2376 with TLS.
PUBLIC
IDE
VS Code Live Share
code5990/tcp📁 files📡 packetsReal-time collaborative editing. Tunnels file ops + cursor packets to peers.
PUBLIC
VPN
WireGuard
wireguard51820/udp📡 packetsEncrypted UDP tunnel.
PUBLIC
Remote shell
Mosh (mobile shell)
mosh-server60001/udp📡 packetsRoaming UDP shell. Range 60000-61000. Public to allow client roaming.

📜 SSH + curl recipes (device-scoped)

All recipes are pre-filled with your device fingerprint (loading)so OS-BOT and the bounty pipeline can attribute results to this machine.

Ask OS-BOT about your ports (text)
curl 'https://YOUR-APP/api/os-bot?q=which+studios+are+listening+on+my+device&fp=YOUR_FP'
Mint a local bounty via OS-BOT (POST)
curl -X POST 'https://YOUR-APP/api/os-bot' \
  -H 'Content-Type: application/json' \
  -d '{"messages":[{"role":"user","content":"/mint sshd exposed publicly σ=5"}],"device_fingerprint":"YOUR_FP"}'
Probe an external endpoint
curl -X POST 'https://YOUR-APP/api/probe' \
  -H 'Content-Type: application/json' \
  -d '{"target":"https://example.com"}'
OpenSSH local-forward to OS-BOT (8080 → app)
ssh -N -L 8080:localhost:443 -o ServerAliveInterval=30 user@your-bastion.example
OpenSSH reverse tunnel (expose local 5173 to bastion:5173)
ssh -N -R 5173:localhost:5173 user@your-bastion.example
Generate a strong ed25519 key for OS-BOT-tagged operations
ssh-keygen -t ed25519 -C "osbot-fp-(loading)" -f ~/.ssh/osbot_(loading)
Install OS-BOT toolkit on this device
curl -fsSL 'https://YOUR-APP/api/toolkit.installer.sh' | bash
Pull recent OS-BOT corpus (JSON)
curl 'https://YOUR-APP/api/osbot-corpus'

⚠ This is a CATALOG with live handshake correlation — not a host-OS port scan. Browsers cannot read your real socket table; ask OS-BOT or run ss -tulpn on the host for ground truth.