diff --git a/monkey/infection_monkey/exploit/web_rce.py b/monkey/infection_monkey/exploit/web_rce.py
index 7f268b18f..5620c425a 100644
--- a/monkey/infection_monkey/exploit/web_rce.py
+++ b/monkey/infection_monkey/exploit/web_rce.py
@@ -25,7 +25,7 @@ from infection_monkey.model import (
     RUN_MONKEY,
     WGET_HTTP_UPLOAD,
 )
-from infection_monkey.network.tools import check_tcp_port, tcp_port_to_service
+from infection_monkey.network.tools import tcp_port_to_service
 from infection_monkey.telemetry.attack.t1197_telem import T1197Telem
 from infection_monkey.telemetry.attack.t1222_telem import T1222Telem
 
@@ -188,13 +188,6 @@ class WebRCE(HostExploiter):
 
         return valid_ports
 
-    def check_if_port_open(self, port):
-        is_open, _ = check_tcp_port(self.host.ip_addr, port)
-        if not is_open:
-            LOG.info("Port %d is closed on %r, skipping", port, self.host)
-            return False
-        return True
-
     def get_command(self, path, http_path, commands):
         try:
             if "linux" in self.host.os["type"]: