Port Reference Guide

BetaThis tool is in beta. Some features may change or have limited functionality.

Interactive reference for common network ports used by system administrators and security architects. Search by port number or service, filter by protocol and category, with security notes.

82 ports found

PortProtocolServiceSecurity
80TCPHTTPInsecure
443TCPHTTPSSafe
8080TCPHTTP AltCaution
8443TCPHTTPS AltSafe
25TCPSMTPInsecure
465TCPSMTPSSafe
587TCPSMTP SubmissionSafe
110TCPPOP3Insecure
995TCPPOP3SSafe
143TCPIMAPInsecure
993TCPIMAPSSafe
20TCPFTP DataInsecure
21TCPFTP ControlInsecure
22TCPSFTP/SSHSafe
69UDPTFTPInsecure
989TCPFTPS DataSafe
990TCPFTPS ControlSafe
22TCPSSHSafe
23TCPTelnetInsecure
3389TCPRDPCaution
5900TCPVNCCaution
53TCP/UDPDNSCaution
67UDPDHCP ServerCaution
68UDPDHCP ClientCaution
123UDPNTPCaution
161UDPSNMPCaution
162UDPSNMP TrapCaution
853TCPDNS over TLSSafe
3306TCPMySQLCaution
5432TCPPostgreSQLCaution
1433TCPMSSQLCaution
1521TCPOracle DBCaution
27017TCPMongoDBCaution
6379TCPRedisCaution
9200TCPElasticsearchCaution
5984TCPCouchDBCaution
9042TCPCassandraCaution
11211TCPMemcachedCaution
500UDPIKESafe
1194TCP/UDPOpenVPNSafe
1723TCPPPTPInsecure
4500UDPIPSec NAT-TSafe
51820UDPWireGuardSafe
5222TCPXMPP ClientCaution
5269TCPXMPP ServerCaution
6667TCPIRCInsecure
6697TCPIRC TLSSafe
1883TCPMQTTCaution
8883TCPMQTT TLSSafe
5672TCPAMQPCaution
5671TCPAMQP TLSSafe
3000TCPDev ServerCaution
4200TCPAngular CLICaution
5173TCPViteCaution
8000TCPPython/PHP DevCaution
9090TCPPrometheusCaution
3100TCPGrafana LokiCaution
2375TCPDocker (unenc)Insecure
2376TCPDocker TLSSafe
6443TCPKubernetes APISafe
10250TCPKubeletCaution
2379TCPetcd ClientCaution
2380TCPetcd PeerCaution
8500TCPConsulCaution
554TCPRTSPCaution
1935TCPRTMPCaution
8554TCPRTSP AltCaution
3128TCPSquid ProxyCaution
8081TCPHTTP ProxyCaution
9443TCPHTTPS ProxySafe
514UDPSyslogCaution
6514TCPSyslog TLSSafe
9100TCPNode ExporterCaution
3000TCPGrafanaCaution
5601TCPKibanaCaution
8080TCPJenkinsCaution
9000TCPSonarQubeCaution
8200TCPVaultSafe
9092TCPKafkaCaution
4369TCPEPMDCaution
15672TCPRabbitMQ MgmtCaution
4222TCPNATSCaution

Why Use Port Reference Guide?

Understanding network ports is essential for system architects designing secure infrastructure, firewall administrators writing access control rules, and security teams performing penetration tests or incident response. This interactive reference covers the most commonly used TCP and UDP ports with security ratings and detailed notes. Use it to quickly identify what services run on specific ports, assess their security implications, and make informed decisions about which ports to open or block in your firewall configurations.

Frequently Asked Questions

What is a network port?
A network port is a virtual endpoint for communication. It's a 16-bit number (0-65535) that identifies a specific process or service on a device. When combined with an IP address, a port creates a unique socket for network communication. For example, web servers typically listen on port 443 (HTTPS).
What is the difference between TCP and UDP?
TCP (Transmission Control Protocol) provides reliable, ordered delivery with error checking and flow control. It's used for web browsing, email, and file transfers. UDP (User Datagram Protocol) is faster but unreliable — it doesn't guarantee delivery or order. It's used for DNS queries, video streaming, and gaming.
Which ports should I block in my firewall?
Block all ports that aren't needed for your services. Common ports to block include: 23 (Telnet - unencrypted), 21 (FTP - unencrypted), 135-139 (NetBIOS), 445 (SMB), and 1433/3306 (databases) from external access. Always use the principle of least privilege — only open ports that are absolutely necessary.
What are well-known ports?
Well-known ports (0-1023) are assigned by IANA for common services. Registered ports (1024-49151) are for vendor applications. Dynamic/private ports (49152-65535) are used for temporary connections. On Unix/Linux systems, binding to well-known ports requires root privileges.
How do I check which ports are open on my server?
Use `netstat -tlnp` or `ss -tlnp` on Linux to see listening ports. On Windows, use `netstat -an`. For external scanning, tools like nmap can probe a host's open ports. Always ensure you have authorization before scanning — unauthorized port scanning may violate security policies or laws.