HIGH: Accessible VNC Report



This report identifies hosts that have a VNC instance running on port 5900/TCP and 5901/TCP that are accessible on the Internet.

If improperly configured, VNC may allow remote access to a desktop in an unintended manner.

You can track VNC scan results on our Dashboard.

Severity levels are described here.

For more information on our scanning efforts, check out our Internet scanning summary page..

This report has an IPv4 and IPv6 version.

Filename(s): scan_vnc, scan6_vnc


  • timestamp
    Time that the IP was probed in UTC+0
  • severity
    Severity level
  • ip
    The IP address of the device in question
  • protocol
    Protocol that the response came on (always TCP)
  • port
    Port that the response came from (5900/TCP)
  • hostname
    Reverse DNS name of the device in question
  • tag
    This will always be vnc
  • asn
    ASN of where the device in question resides
  • geo
    Country where the device in question resides
  • region
    State / Province / Administrative region where the device in question resides
  • city
    City in which the device in question resides
  • naics
    North American Industry Classification System Code
  • hostname_source
    Hostname source
  • product
    The product name and version of the VNC server, if we know what it is
  • banner
    The raw response from the VNC server
  • sector
    Sector the IP belongs to


"2010-02-10 00:00:00",high,,tcp,5900,node01.example.com,vnc,64512,ZZ,Region,City,0,,"RealVNC Enterprise protocol 4.1","RFB 004.001","Communications, Service Provider, and Hosting Service"
"2010-02-10 00:00:01",high,,tcp,5900,node02.example.com,vnc,64512,ZZ,Region,City,0,ptr,"RealVNC Enterprise v5.3 or later","RFB 005.000","Communications, Service Provider, and Hosting Service"
"2010-02-10 00:00:02",high,,tcp,5900,node03.example.com,vnc,64512,ZZ,Region,City,0,,,"RFB 003.008",

Our 125 Report Types