Home/Tools/Port Reference

Network Port Reference

Comprehensive database of 5,900+ network ports, protocols, and services. Search by port number, service name, or category to find detailed information and security recommendations.

Ethical Use Notice

This tool is provided for educational, defensive security, and authorized testing purposes only. Unauthorized access to computer systems, networks, or data is illegal. Always obtain proper authorization before conducting security assessments or testing. Use this tool responsibly and in compliance with all applicable laws and regulations.

Reference Database

This tool provides information about common network ports and their services. To scan for open ports on a system, use tools like nmap, netstat, or specialized network scanners.

Showing 5986 of 5986 ports
PortProtocolServiceDescriptionCategorySecurity
1Both
tcpmux
Multiplexer
Other
Configure firewall rules and authentication appropriately.
5Both
rje
Entry
Other
Configure firewall rules and authentication appropriately.
7Both
echo
Echo
Network
Configure firewall rules and authentication appropriately.
9Both
discard
Discard
Network
Configure firewall rules and authentication appropriately.
11Both
systat
Users
Other
Configure firewall rules and authentication appropriately.
13Both
daytime
Daytime
Network
Configure firewall rules and authentication appropriately.
17Both
qotd
Day
Network
Configure firewall rules and authentication appropriately.
18Both
msp
(historic)
Other
Configure firewall rules and authentication appropriately.
19Both
chargen
Generator
Network
Configure firewall rules and authentication appropriately.
20Both
ftp-data
Data]
File Transfer
Configure firewall rules and authentication appropriately.
21Both
ftp
[Control]
File Transfer
🟡 Unencrypted. Use encrypted alternative or VPN. Restrict network access.
22Both
ssh
Protocol
File Transfer
🟢 Encrypted protocol. Ensure strong cipher suites and valid certificates.
23Both
telnet
Telnet
Remote Access
🔴 Critical risk. Frequently exploited. Never expose to internet.
25Both
smtp
Transfer
Mail
🟡 Unencrypted. Use encrypted alternative or VPN. Restrict network access.
27Both
nsw-fe
FE
Other
Configure firewall rules and authentication appropriately.
29Both
msg-icp
ICP
Other
Configure firewall rules and authentication appropriately.
31Both
msg-auth
Authentication
Other
Configure firewall rules and authentication appropriately.
33Both
dsp
Protocol
Other
Configure firewall rules and authentication appropriately.
37Both
time
Time
Time
Configure firewall rules and authentication appropriately.
38Both
rap
Protocol
Other
Configure firewall rules and authentication appropriately.
39Both
rlp
Protocol
Other
Configure firewall rules and authentication appropriately.
41Both
graphics
Graphics
Other
Configure firewall rules and authentication appropriately.
42Both
name
Server
Other
Configure firewall rules and authentication appropriately.
43Both
nicname
Is
Other
Configure firewall rules and authentication appropriately.
44Both
mpm-flags
Protocol
Other
Configure firewall rules and authentication appropriately.
45Both
mpm
[recv]
Other
Configure firewall rules and authentication appropriately.
46Both
mpm-snd
send]
Other
Configure firewall rules and authentication appropriately.
48Both
auditd
Daemon
Other
Configure firewall rules and authentication appropriately.
49Both
tacacs
(TACACS)
Other
Configure firewall rules and authentication appropriately.
50Both
re-mail-ck
Protocol
Mail
Configure firewall rules and authentication appropriately.
52Both
xns-time
Protocol
Time
Configure firewall rules and authentication appropriately.
53Both
domain
Server
DNS
Configure firewall rules and authentication appropriately.
54Both
xns-ch
Clearinghouse
Other
Configure firewall rules and authentication appropriately.
55Both
isi-gl
Language
Other
Configure firewall rules and authentication appropriately.
56Both
xns-auth
Authentication
Other
Configure firewall rules and authentication appropriately.
58Both
xns-mail
Mail
Mail
Configure firewall rules and authentication appropriately.
62Both
acas
Services
Other
Configure firewall rules and authentication appropriately.
63Both
whoispp
whois++
Other
Configure firewall rules and authentication appropriately.
64Both
covia
(CI)
Other
Configure firewall rules and authentication appropriately.
65Both
tacacs-ds
Service
Other
Configure firewall rules and authentication appropriately.
66Both
sql-net
SQL*NET
Database
Configure firewall rules and authentication appropriately.
67Both
bootps
Server
Network
Configure firewall rules and authentication appropriately.
68Both
bootpc
Client
Network
Configure firewall rules and authentication appropriately.
69Both
tftp
Transfer
File Transfer
🟡 Unencrypted. Use encrypted alternative or VPN. Restrict network access.
70Both
gopher
Gopher
Other
Configure firewall rules and authentication appropriately.
71Both
netrjs-1
Service
Other
Configure firewall rules and authentication appropriately.
72Both
netrjs-2
Service
Other
Configure firewall rules and authentication appropriately.
73Both
netrjs-3
Service
Other
Configure firewall rules and authentication appropriately.
74Both
netrjs-4
Service
Other
Configure firewall rules and authentication appropriately.
76Both
deos
Store
Other
Configure firewall rules and authentication appropriately.
Page 1 of 120

Security Indicator Legend

Green: Secure/Encrypted
Yellow: Conditional Security
Red: Critical/Dangerous
Gray: Unknown/Not in DB

Common Port Groups

Security Best Practices

  • Never expose database ports (3306, 5432, 1433, 27017, 6379) to the internet. Use SSH tunnels or VPNs.
  • Disable legacy protocols like Telnet (23), FTP (21), and HTTP (80) in favor of encrypted alternatives.
  • Use firewalls to restrict access to only necessary ports and trusted IP addresses.
  • Enable authentication on all services, especially those that default to no auth (Redis, Memcached, MongoDB).
  • Regularly audit open ports using tools like nmap, netstat, or ss to identify unexpected services.

Understanding Network Ports

Network ports are virtual endpoints for communication in computer networks. Think of them as doors through which data enters and leaves a computer. Each port is identified by a number (0-65535) and associated with specific protocols and services.

Well-Known Ports

Ports 0-1023

  • • Assigned by IANA
  • • Standard services
  • • Require elevated privileges
  • • Examples: HTTP (80), HTTPS (443)

Registered Ports

Ports 1024-49151

  • • Registered with IANA
  • • User-level applications
  • • Vendor-specific services
  • • Examples: MySQL (3306), PostgreSQL (5432)

Dynamic/Private Ports

Ports 49152-65535

  • • Ephemeral ports
  • • Temporary client connections
  • • Private/custom services
  • • Assigned dynamically by OS

Common Network Protocols

TCPTransmission Control Protocol

Connection-oriented protocol that ensures reliable, ordered delivery of data with error checking and automatic retransmission.

Characteristics:
  • Three-way handshake (SYN, SYN-ACK, ACK)
  • Guaranteed delivery and order
  • Flow control and congestion control
  • Higher overhead, slower than UDP
Common Uses: Web browsing (HTTP/HTTPS), email (SMTP, IMAP), file transfer (FTP, SFTP), remote access (SSH, RDP)

UDPUser Datagram Protocol

Connectionless protocol that sends data without establishing a connection or guaranteeing delivery. Faster but less reliable than TCP.

Characteristics:
  • No connection establishment
  • No delivery guarantee or ordering
  • No flow or congestion control
  • Lower overhead, faster than TCP
Common Uses: DNS queries, video/audio streaming, online gaming, VoIP, DHCP, NTP (time sync)

Most Commonly Used Ports

80

TCP

HTTP - Web Traffic

Hypertext Transfer Protocol for unencrypted web browsing. Deprecated in favor of HTTPS (port 443).

Unencrypted - use HTTPS instead

443

TCP

HTTPS - Secure Web

HTTP over TLS/SSL for encrypted web browsing. Standard for all modern websites.

Encrypted and secure

22

TCP

SSH - Secure Shell

Encrypted remote access and secure file transfer. Use key-based authentication.

Secure with proper config

3306

TCP

MySQL Database

MySQL/MariaDB database server. Never expose to the internet.

Never expose publicly

5432

TCP

PostgreSQL Database

PostgreSQL database server. Use SSH tunnels or VPNs for remote access.

Never expose publicly

53

Both

DNS - Domain Name System

Translates domain names to IP addresses. UDP for queries, TCP for zone transfers.

Essential network service

Quick Port Lookup Tips

  • Use the search box above to find any port by number, service name, or description
  • Filter by category (Web, Database, Mail, etc.) to browse related services
  • Filter by protocol (TCP, UDP, or Both) to narrow your search
  • Pay attention to security indicators - red means never expose, yellow means conditional, green means generally secure

Port Security Best Practices

Never Expose to Internet

  • Database Ports: MySQL (3306), PostgreSQL (5432), MongoDB (27017), Redis (6379), SQL Server (1433)
  • Remote Desktop: RDP (3389), VNC (5900)
  • File Sharing: SMB (445), NetBIOS (139)
  • Management Interfaces: Docker API (2375/2376), Kubernetes API (6443)

Security Best Practices

  • Use Firewalls: Configure strict ingress/egress rules. Allow only necessary ports from trusted IPs.
  • Encrypt Everything: Use TLS/SSL for all services. Replace HTTP with HTTPS, FTP with SFTP, Telnet with SSH.
  • Use VPNs/Tunnels: Access internal services through VPN or SSH tunnels instead of exposing ports.
  • Regular Audits: Use nmap, netstat, or ss to scan for unexpected open ports regularly.

Common Attack Vectors

Port Scanning: Attackers scan for open ports to identify services and potential vulnerabilities. Use intrusion detection systems (IDS) to detect scanning activity.
Service Exploitation: Once open ports are found, attackers attempt to exploit known vulnerabilities in the services running on those ports. Keep all services updated.
Brute Force Attacks: Services like SSH (22), RDP (3389), and FTP (21) are common targets for password guessing. Use key-based authentication and rate limiting.
DDoS Amplification: Open DNS (53), NTP (123), and SNMP (161) services can be abused for reflection attacks. Configure services to only respond to trusted sources.

Frequently Asked Questions

Find answers to common questions

A network port is a virtual point where network connections start and end. Ports are identified by numbers (0-65535) and associated with specific protocols (TCP or UDP). They allow a single computer to handle multiple network services simultaneously by directing traffic to the appropriate application or service.

Need Help with Network Security?

Our cybersecurity experts can help you configure firewalls, audit open ports, implement network segmentation, and secure your infrastructure.