Ethical Use Notice
This tool is provided for educational, defensive security, and authorized testing purposes only. Unauthorized access to computer systems, networks, or data is illegal. Always obtain proper authorization before conducting security assessments or testing. Use this tool responsibly and in compliance with all applicable laws and regulations.
Reference Database
This tool provides information about common network ports and their services. To scan for open ports on a system, use tools like nmap, netstat, or specialized network scanners.
| Port | Protocol | Service | Description | Category | Security |
|---|---|---|---|---|---|
| 1 | Both | tcpmux | Multiplexer | Other | Configure firewall rules and authentication appropriately. |
| 5 | Both | rje | Entry | Other | Configure firewall rules and authentication appropriately. |
| 7 | Both | echo | Echo | Network | Configure firewall rules and authentication appropriately. |
| 9 | Both | discard | Discard | Network | Configure firewall rules and authentication appropriately. |
| 11 | Both | systat | Users | Other | Configure firewall rules and authentication appropriately. |
| 13 | Both | daytime | Daytime | Network | Configure firewall rules and authentication appropriately. |
| 17 | Both | qotd | Day | Network | Configure firewall rules and authentication appropriately. |
| 18 | Both | msp | (historic) | Other | Configure firewall rules and authentication appropriately. |
| 19 | Both | chargen | Generator | Network | Configure firewall rules and authentication appropriately. |
| 20 | Both | ftp-data | Data] | File Transfer | Configure firewall rules and authentication appropriately. |
| 21 | Both | ftp | [Control] | File Transfer | 🟡 Unencrypted. Use encrypted alternative or VPN. Restrict network access. |
| 22 | Both | ssh | Protocol | File Transfer | 🟢 Encrypted protocol. Ensure strong cipher suites and valid certificates. |
| 23 | Both | telnet | Telnet | Remote Access | 🔴 Critical risk. Frequently exploited. Never expose to internet. |
| 25 | Both | smtp | Transfer | 🟡 Unencrypted. Use encrypted alternative or VPN. Restrict network access. | |
| 27 | Both | nsw-fe | FE | Other | Configure firewall rules and authentication appropriately. |
| 29 | Both | msg-icp | ICP | Other | Configure firewall rules and authentication appropriately. |
| 31 | Both | msg-auth | Authentication | Other | Configure firewall rules and authentication appropriately. |
| 33 | Both | dsp | Protocol | Other | Configure firewall rules and authentication appropriately. |
| 37 | Both | time | Time | Time | Configure firewall rules and authentication appropriately. |
| 38 | Both | rap | Protocol | Other | Configure firewall rules and authentication appropriately. |
| 39 | Both | rlp | Protocol | Other | Configure firewall rules and authentication appropriately. |
| 41 | Both | graphics | Graphics | Other | Configure firewall rules and authentication appropriately. |
| 42 | Both | name | Server | Other | Configure firewall rules and authentication appropriately. |
| 43 | Both | nicname | Is | Other | Configure firewall rules and authentication appropriately. |
| 44 | Both | mpm-flags | Protocol | Other | Configure firewall rules and authentication appropriately. |
| 45 | Both | mpm | [recv] | Other | Configure firewall rules and authentication appropriately. |
| 46 | Both | mpm-snd | send] | Other | Configure firewall rules and authentication appropriately. |
| 48 | Both | auditd | Daemon | Other | Configure firewall rules and authentication appropriately. |
| 49 | Both | tacacs | (TACACS) | Other | Configure firewall rules and authentication appropriately. |
| 50 | Both | re-mail-ck | Protocol | Configure firewall rules and authentication appropriately. | |
| 52 | Both | xns-time | Protocol | Time | Configure firewall rules and authentication appropriately. |
| 53 | Both | domain | Server | DNS | Configure firewall rules and authentication appropriately. |
| 54 | Both | xns-ch | Clearinghouse | Other | Configure firewall rules and authentication appropriately. |
| 55 | Both | isi-gl | Language | Other | Configure firewall rules and authentication appropriately. |
| 56 | Both | xns-auth | Authentication | Other | Configure firewall rules and authentication appropriately. |
| 58 | Both | xns-mail | Mail | Configure firewall rules and authentication appropriately. | |
| 62 | Both | acas | Services | Other | Configure firewall rules and authentication appropriately. |
| 63 | Both | whoispp | whois++ | Other | Configure firewall rules and authentication appropriately. |
| 64 | Both | covia | (CI) | Other | Configure firewall rules and authentication appropriately. |
| 65 | Both | tacacs-ds | Service | Other | Configure firewall rules and authentication appropriately. |
| 66 | Both | sql-net | SQL*NET | Database | Configure firewall rules and authentication appropriately. |
| 67 | Both | bootps | Server | Network | Configure firewall rules and authentication appropriately. |
| 68 | Both | bootpc | Client | Network | Configure firewall rules and authentication appropriately. |
| 69 | Both | tftp | Transfer | File Transfer | 🟡 Unencrypted. Use encrypted alternative or VPN. Restrict network access. |
| 70 | Both | gopher | Gopher | Other | Configure firewall rules and authentication appropriately. |
| 71 | Both | netrjs-1 | Service | Other | Configure firewall rules and authentication appropriately. |
| 72 | Both | netrjs-2 | Service | Other | Configure firewall rules and authentication appropriately. |
| 73 | Both | netrjs-3 | Service | Other | Configure firewall rules and authentication appropriately. |
| 74 | Both | netrjs-4 | Service | Other | Configure firewall rules and authentication appropriately. |
| 76 | Both | deos | Store | Other | Configure firewall rules and authentication appropriately. |
Security Indicator Legend
Common Port Groups
Security Best Practices
- •Never expose database ports (3306, 5432, 1433, 27017, 6379) to the internet. Use SSH tunnels or VPNs.
- •Disable legacy protocols like Telnet (23), FTP (21), and HTTP (80) in favor of encrypted alternatives.
- •Use firewalls to restrict access to only necessary ports and trusted IP addresses.
- •Enable authentication on all services, especially those that default to no auth (Redis, Memcached, MongoDB).
- •Regularly audit open ports using tools like nmap, netstat, or ss to identify unexpected services.
Understanding Network Ports
Network ports are virtual endpoints for communication in computer networks. Think of them as doors through which data enters and leaves a computer. Each port is identified by a number (0-65535) and associated with specific protocols and services.
Well-Known Ports
Ports 0-1023
- • Assigned by IANA
- • Standard services
- • Require elevated privileges
- • Examples: HTTP (80), HTTPS (443)
Registered Ports
Ports 1024-49151
- • Registered with IANA
- • User-level applications
- • Vendor-specific services
- • Examples: MySQL (3306), PostgreSQL (5432)
Dynamic/Private Ports
Ports 49152-65535
- • Ephemeral ports
- • Temporary client connections
- • Private/custom services
- • Assigned dynamically by OS
Common Network Protocols
TCPTransmission Control Protocol
Connection-oriented protocol that ensures reliable, ordered delivery of data with error checking and automatic retransmission.
- Three-way handshake (SYN, SYN-ACK, ACK)
- Guaranteed delivery and order
- Flow control and congestion control
- Higher overhead, slower than UDP
UDPUser Datagram Protocol
Connectionless protocol that sends data without establishing a connection or guaranteeing delivery. Faster but less reliable than TCP.
- No connection establishment
- No delivery guarantee or ordering
- No flow or congestion control
- Lower overhead, faster than TCP
Most Commonly Used Ports
80
TCPHTTP - Web Traffic
Hypertext Transfer Protocol for unencrypted web browsing. Deprecated in favor of HTTPS (port 443).
443
TCPHTTPS - Secure Web
HTTP over TLS/SSL for encrypted web browsing. Standard for all modern websites.
22
TCPSSH - Secure Shell
Encrypted remote access and secure file transfer. Use key-based authentication.
3306
TCPMySQL Database
MySQL/MariaDB database server. Never expose to the internet.
5432
TCPPostgreSQL Database
PostgreSQL database server. Use SSH tunnels or VPNs for remote access.
53
BothDNS - Domain Name System
Translates domain names to IP addresses. UDP for queries, TCP for zone transfers.
Quick Port Lookup Tips
- •Use the search box above to find any port by number, service name, or description
- •Filter by category (Web, Database, Mail, etc.) to browse related services
- •Filter by protocol (TCP, UDP, or Both) to narrow your search
- •Pay attention to security indicators - red means never expose, yellow means conditional, green means generally secure
Port Security Best Practices
Never Expose to Internet
- •Database Ports: MySQL (3306), PostgreSQL (5432), MongoDB (27017), Redis (6379), SQL Server (1433)
- •Remote Desktop: RDP (3389), VNC (5900)
- •File Sharing: SMB (445), NetBIOS (139)
- •Management Interfaces: Docker API (2375/2376), Kubernetes API (6443)
Security Best Practices
- •Use Firewalls: Configure strict ingress/egress rules. Allow only necessary ports from trusted IPs.
- •Encrypt Everything: Use TLS/SSL for all services. Replace HTTP with HTTPS, FTP with SFTP, Telnet with SSH.
- •Use VPNs/Tunnels: Access internal services through VPN or SSH tunnels instead of exposing ports.
- •Regular Audits: Use nmap, netstat, or ss to scan for unexpected open ports regularly.
Common Attack Vectors
Frequently Asked Questions
Find answers to common questions
Key Security Terms
Understand the essential concepts behind this tool
MAC Address
A unique hardware identifier assigned to network interfaces for local network communication.
Port Numbers
Numerical identifiers (0-65535) used to route network traffic to specific services on a device.
Subnet Mask
A 32-bit number that divides an IP address into network and host portions for routing.
Penetration Testing
Authorized simulated cyberattacks against systems to identify security vulnerabilities before malicious actors exploit them.
Need Help with Network Security?
Our cybersecurity experts can help you configure firewalls, audit open ports, implement network segmentation, and secure your infrastructure.