Port Reference Database
Comprehensive database of network ports, protocols, and services. Essential for network administrators, security professionals, and developers.
Key Features
- Complete Database – All well-known and registered ports
- Quick Search – Find ports by number or service name
- Protocol Info – TCP, UDP, SCTP details
- Service Descriptions – What each port is used for
- Security Notes – Common vulnerabilities and risks
- Category Filtering – Web, email, database, etc.
- IANA Registry – Official port assignments
- Common Services – Most frequently used ports
- Mobile Friendly – Responsive design
- Always Updated – Latest IANA registry
Most Common Ports
Port 80 – HTTP
Protocol: TCP
Service: Hypertext Transfer Protocol
Use: Web traffic (unencrypted)
Common for: Web servers, APIs, unencrypted websites
Port 443 – HTTPS
Protocol: TCP
Service: HTTP over TLS/SSL
Use: Secure web traffic
Common for: Secure websites, encrypted APIs, e-commerce
Port 22 – SSH
Protocol: TCP
Service: Secure Shell
Use: Remote server access
Common for: Server administration, SFTP, Git over SSH
Port 3306 – MySQL
Protocol: TCP
Service: MySQL Database
Use: Database connections
Common for: MySQL/MariaDB servers, database applications
Port 5432 – PostgreSQL
Protocol: TCP
Service: PostgreSQL Database
Use: Database connections
Common for: PostgreSQL servers, advanced database features
Port 53 – DNS
Protocol: TCP/UDP
Service: Domain Name System
Use: Domain name resolution
Common for: DNS servers, domain lookups, name resolution
Port Categories
🌐 Web Services
- 80 – HTTP (unencrypted web)
- 443 – HTTPS (encrypted web)
- 8080 – HTTP alternate (proxy, testing)
- 8443 – HTTPS alternate
📧 Email Services
- 25 – SMTP (sending email)
- 110 – POP3 (receiving email)
- 143 – IMAP (email management)
- 587 – SMTP submission (TLS)
🗄️ Database Services
- 3306 – MySQL/MariaDB
- 5432 – PostgreSQL
- 1433 – Microsoft SQL Server
- 27017 – MongoDB
🔧 Remote Access
- 22 – SSH (secure shell)
- 23 – Telnet (insecure, deprecated)
- 3389 – RDP (Windows Remote Desktop)
- 5900 – VNC (Virtual Network Computing)
Port Security Best Practices
✅ Best Practices
- Close unused ports – Reduce attack surface
- Use firewalls – Control inbound/outbound traffic
- Regular port scans – Audit open ports
- Use non-standard ports – For added obscurity
- Monitor traffic – Detect suspicious activity
- Keep services updated – Patch vulnerabilities
❌ Avoid These
- Don’t expose databases – Keep ports 3306, 5432 internal
- Don’t use Telnet (23) – Unencrypted, use SSH instead
- Avoid default ports – For critical services
- Don’t trust port forwarding – Without VPN/tunneling
- Don’t ignore logs – Monitor connection attempts
- Don’t open all ports – Only what’s necessary
Frequently Asked Questions
What are the three port ranges?
Ports are divided into three ranges: Well-known ports (0-1023) assigned by IANA for standard services. Registered ports (1024-49151) listed by IANA for specific applications. Dynamic/private ports (49152-65535) used for temporary connections and custom applications.
What’s the difference between TCP and UDP?
TCP is connection-oriented and reliable. Establishes connection, guarantees delivery, orders packets (used for HTTP, SSH, FTP). UDP is connectionless and fast. No connection setup, no delivery guarantee, no ordering (used for DNS, streaming, gaming).
How do I check what ports are open on my system?
Use command-line tools: netstat -an
(Windows/Linux), lsof -i
(macOS/Linux), ss -tuln
(Linux). For network scanning: nmap localhost
. These show listening ports and active connections. Always scan your own systems only.
Should I change default ports for security?
It provides security through obscurity. Changing SSH from port 22 to a non-standard port reduces automated attacks. However, it’s not real security – use strong authentication, firewalls, and monitoring. Non-standard ports can also cause compatibility issues with some tools.
What are commonly attacked ports?
Most targeted ports: 22 (SSH brute force), 23 (Telnet exploits), 80/443 (web vulnerabilities), 3306/5432 (database attacks), 3389 (RDP attacks), 445 (SMB exploits), 21 (FTP attacks). Always secure these with firewalls, strong auth, and monitoring.
Related Network Tools
🌐 HTTP Status Codes
Complete reference for HTTP status codes with descriptions and troubleshooting.
🎯 Regex Tester
Test and debug regular expressions for log parsing and text processing.
🛠️ All Developer Tools
Explore our complete suite of free developer and security tools.
Need Help with Network Security?
Our cybersecurity experts can help secure your network infrastructure, implement firewalls, and monitor for threats.