docker-proxy

Docker Port Proxy (docker-proxy)

CPU Usage
N/A
Memory
N/A
Location
N/A
Publisher
N/A

Notes
In enterprise environments, enable signing checks in CI/CD, log docker-proxy activity, and regularly audit network configurations. If you suspect tampering, isolate the host, quarantine the binary, and perform a full security scan.
Recommended Actions
Keep Docker up to date, review published ports, and monitor docker-proxy processes for unexpected activity. Use signed binaries from Docker, verify file locations, and restrict unnecessary port mappings to minimize surface area.

What is docker-proxy?

docker-proxy is a small helper binary used by Docker to forward host port requests to container ports. It starts automatically when a container publishes a port, and it forwards connections from the host network into the target container. It runs with minimal privileges and is designed to be ephemeral and scoped to the life of the port mapping.

docker-proxy binds to the host port and forwards traffic to the corresponding container port using the Docker network bridge. It configures port mappings when containers start and uses firewall rules to isolate traffic. It does not perform content inspection; container isolation remains via Docker's namespace model.

Is docker-proxy Safe?

docker-proxy is a legitimate Docker component that participates in port forwarding for containers. When installed from official Docker releases (Docker Desktop or the Docker Engine package) and located in the standard directories, it operates with signed binaries and follows Docker's update cadence. It does not read or modify container data, and its network activity is constrained to port-forwarding paths defined by Docker's configuration.

Is docker-proxy a Virus?

Under normal circumstances, docker-proxy is not a virus; it is a sanctioned part of Docker's port-mapping mechanism. However, attackers may attempt to impersonate it by placing a rogue executable with the same name in non-standard folders. Always verify origin, path, and digital signature to distinguish legitimate binaries from malware.

How to Verify Legitimacy

  1. Check File Location: On Windows, verify the binary is at C:\Program Files\Docker\Docker\resources\bin\docker-proxy.exe. If you find an executable with that name elsewhere, investigate its origin.
  2. Verify Digital Signature: Run 'signtool verify /pa C:\Program Files\Docker\Docker\resources\bin\docker-proxy.exe' to confirm it is signed by Docker, Inc.
  3. Check File Hash: Compute the SHA-256 hash with Get-FileHash 'C:\Program Files\Docker\Docker\resources\bin\docker-proxy.exe' and compare to Docker's official release checksum or repository.
  4. Scan for Malware: Run a full malware scan on the binary with Windows Defender or your AV to ensure it is clean and not a spoof.

Red Flags: Docker-proxy binaries found outside official Docker installation folders, mismatched digital signatures, unexpected recent modification times, or unusual network behavior suggesting port-forwarding activity without Docker's control plane.

Why is it Running?

Reasons it's running:

Can I Disable or Remove It?

Common Problems

Common Causes & Solutions

Frequently Asked Questions

Related Processes