# 8089 - Pentesting Splunkd **Default port:** 8089 ``` PORT STATE SERVICE VERSION 8089/tcp open http Splunkd httpd ``` In the following page you can find an explanation how this service can be abused to escalate privileges and obtain persistence: {% content-ref url="../linux-unix/privilege-escalation/splunk-lpe-and-persistence.md" %} [splunk-lpe-and-persistence.md](../linux-unix/privilege-escalation/splunk-lpe-and-persistence.md) {% endcontent-ref %} ### Shodan * `Splunk build`