Accessible Erlang Port Mapper Daemon Report

LAST UPDATED: 2022-10-16


This report identifies accessible Erlang Port Mapper Daemon (EPMD) servers on port 4369/tcp. This daemon acts as a name server for hosts involved in distributed Erlang computations. It is included in Erlang/OTP. As described by Erlang:

Erlang is a programming language used to build massively scalable soft real-time systems with requirements on high availability. Some of its uses are in telecoms, banking, e-commerce, computer telephony and instant messaging. Erlang’s runtime system has built-in support for concurrency, distribution and fault tolerance.

OTP is set of Erlang libraries and design principles providing middle-ware to develop these systems.

EPMD on port 4369/tcp is used by default on RabbitMQ and Apache CouchDB installations.

As of 2022-06-01 we find around 116 000 EPMD instances accessible.

How we scan 

We scan by sending a “\x00\x01\x6erequest to retrieve a list of nodes with their respective ports to the default EPMD port (4369/tcp) and collect the response.

You can replicate our scan by running nmap -sV -Pn -n -T4 -p 4369 –script epmd-info <IP>

We do not perform any intrusive checks on a discovered service.


You can track latest EPMD scan results on the Shadowserver Dashboard.


It is unlikely that you need to have an EPMD server allowing for external connections from the Internet (and thus a possible external attack surface). If you do receive this report from us for your network or constituency make sure to firewall traffic to this service.

In some cases access may be exploitable. A recent example is a CVSS 9.8 remote code execution vulnerability in Apache CouchDB (CVE-2022-24706).

For more information on our scanning efforts, check out our Internet scanning summary page.

Filename: scan_epmd


  • timestamp
    Time that the IP was probed in UTC+0
  • ip
    The IP address of the device in question
  • protocol
    Protocol that response came on (always TCP)
  • port
    Port that is being queried (port 4369)
  • hostname
    Reverse DNS name of the device in question
  • tag
    Tag set to "epmd"
  • asn
    ASN of where the device in question resides
  • geo
    Country where the device in question resides
  • region
    State / Province / Administrative region where the device in question resides
  • city
    City in which the device in question resides
  • naics
    North American Industry Classification System Code
  • sic
    Standard Industrial Classification System Code
  • sector
    Sector the identified device belongs to
  • nodes
    List of Erlang nodes discovered, with port numbers


"2010-02-10 00:00:00",,tcp,4369,,epmd,64512,ZZ,Region,City,0,0,,"ns_1,21100"
"2010-02-10 00:00:01",,tcp,4369,,epmd,64512,ZZ,Region,City,0,0,"Retail Trade","rabbit,25672"
"2010-02-10 00:00:02",,tcp,4369,,epmd,64512,ZZ,Region,City,0,0,"Communications, Service Provider, and Hosting Service","vpnu-radius,36657"

Our 137 Report Types