Port Scanner Info

Complete reference guide for common network ports. Look up what service runs on any port, security notes, and protocol details. Search and filter by port number or service name.

0uses
0/10(0)

Showing 75 of 75 ports

20TCP
FTP DataInsecure

File Transfer Protocol - data transfer channel

Unencrypted data transfer. Use SFTP (port 22) or FTPS (port 990) instead.

21TCP
FTP ControlInsecure

File Transfer Protocol - command/control channel

Credentials sent in plaintext. Use SFTP or FTPS for secure file transfer.

22TCP
SSH / SFTPSecure

Secure Shell - encrypted remote login and file transfer

Encrypted protocol. Use key-based authentication and disable root login.

23TCP
TelnetInsecure

Unencrypted remote terminal access

Completely unencrypted. Never use - replace with SSH (port 22).

25TCP
SMTPCaution

Simple Mail Transfer Protocol - email sending

Often used unencrypted. Use port 587 with STARTTLS or port 465 with TLS.

43TCP
WHOISCaution

WHOIS domain registration lookup

Read-only protocol. Be aware of data returned in queries.

53TCP/UDP
DNSCaution

Domain Name System - name resolution

Queries are typically unencrypted. Consider DNS-over-HTTPS (DoH) or DNS-over-TLS (DoT).

67UDP
DHCP ServerCaution

Dynamic Host Configuration Protocol - server side

Vulnerable to rogue DHCP server attacks. Use DHCP snooping on managed switches.

68UDP
DHCP ClientCaution

Dynamic Host Configuration Protocol - client side

Client-side DHCP. Ensure network is trusted.

69UDP
TFTPInsecure

Trivial File Transfer Protocol - simple file transfer

No authentication or encryption. Only use on isolated/trusted networks.

80TCP
HTTPInsecure

Hypertext Transfer Protocol - unencrypted web traffic

Unencrypted web traffic. Always redirect to HTTPS (port 443).

88TCP/UDP
KerberosSecure

Kerberos authentication system

Strong authentication protocol. Keep implementation patched and updated.

110TCP
POP3Insecure

Post Office Protocol v3 - email retrieval

Passwords sent in plaintext. Use POP3S (port 995) with TLS.

119TCP
NNTPInsecure

Network News Transfer Protocol - Usenet

Generally unencrypted. Use NNTPS (port 563) if needed.

123UDP
NTPCaution

Network Time Protocol - time synchronization

Can be exploited for DDoS amplification. Use NTS (Network Time Security) where possible.

135TCP
MS RPCCaution

Microsoft Remote Procedure Call

Common target for worms. Block from external access with firewall.

137UDP
NetBIOS NameCaution

NetBIOS Name Service

Can leak system information. Block from external networks.

138UDP
NetBIOS DatagramCaution

NetBIOS Datagram Service

Can be exploited for information gathering. Block externally.

139TCP
NetBIOS SessionInsecure

NetBIOS Session Service - Windows file sharing

Major attack vector. Block from internet. Use port 445 with SMBv3 instead.

143TCP
IMAPCaution

Internet Message Access Protocol - email retrieval

Can be unencrypted. Always use IMAPS (port 993) with TLS.

161UDP
SNMPCaution

Simple Network Management Protocol

SNMPv1/v2c use community strings (plaintext). Use SNMPv3 with authentication.

162UDP
SNMP TrapCaution

SNMP Trap messages

Same concerns as SNMP. Use SNMPv3 for trap receivers.

179TCP
BGPCaution

Border Gateway Protocol - internet routing

Critical infrastructure protocol. Use MD5 authentication and RPKI.

194TCP
IRCInsecure

Internet Relay Chat

Typically unencrypted. Use IRC with TLS (port 6697) if needed.

389TCP/UDP
LDAPCaution

Lightweight Directory Access Protocol

Often unencrypted. Use LDAPS (port 636) or STARTTLS.

443TCP
HTTPSSecure

HTTP Secure - encrypted web traffic

Standard for secure web traffic. Use TLS 1.2+ and strong cipher suites.

445TCP
SMBCaution

Server Message Block - Windows file/printer sharing

Target of many exploits (WannaCry, EternalBlue). Use SMBv3, block from internet.

465TCP
SMTPSSecure

SMTP over TLS - secure email sending

Implicit TLS for SMTP. Preferred for secure email submission.

514UDP
SyslogInsecure

System logging protocol

Unencrypted and unauthenticated. Use Syslog over TLS (port 6514).

515TCP
LPDCaution

Line Printer Daemon - printing

Legacy printing protocol. Use IPP (port 631) with TLS instead.

543TCP
KloginCaution

Kerberos login

Largely deprecated. Use SSH with Kerberos authentication.

544TCP
KshellCaution

Kerberos remote shell

Largely deprecated. Use SSH instead.

548TCP
AFPCaution

Apple Filing Protocol - macOS file sharing

Deprecated by Apple in favor of SMB. Migrate to SMBv3.

554TCP
RTSPCaution

Real Time Streaming Protocol

Often unencrypted. Use RTSPS where possible. Common in IP cameras.

587TCP
SMTP SubmissionSecure

Email submission with STARTTLS

Standard port for authenticated email submission with STARTTLS.

631TCP
IPPCaution

Internet Printing Protocol - CUPS

Restrict access to trusted networks. Enable TLS for IPPS.

636TCP
LDAPSSecure

LDAP over TLS/SSL

Encrypted LDAP. Preferred over plain LDAP (port 389).

873TCP
RsyncCaution

Remote file synchronization

Can be unencrypted. Run rsync over SSH for encryption.

993TCP
IMAPSSecure

IMAP over TLS/SSL - secure email retrieval

Encrypted IMAP. Always use this instead of plain IMAP (port 143).

995TCP
POP3SSecure

POP3 over TLS/SSL - secure email retrieval

Encrypted POP3. Always use this instead of plain POP3 (port 110).

1080TCP
SOCKS ProxyCaution

SOCKS proxy protocol

Ensure authentication is required. Can be abused as open proxy.

1194UDP
OpenVPNSecure

OpenVPN - VPN tunnel

Well-regarded VPN solution. Use strong ciphers and certificate authentication.

1433TCP
MS SQLCaution

Microsoft SQL Server database

Never expose to internet. Use encrypted connections and strong authentication.

1434UDP
MS SQL BrowserCaution

Microsoft SQL Server Browser Service

Can reveal SQL instances. Disable if not needed or block externally.

1521TCP
Oracle DBCaution

Oracle Database default listener

Never expose to internet. Use Oracle Net encryption.

1723TCP
PPTPInsecure

Point-to-Point Tunneling Protocol - VPN

Known cryptographic weaknesses. Use OpenVPN or WireGuard instead.

2049TCP/UDP
NFSCaution

Network File System

Use NFSv4 with Kerberos authentication. Never expose to internet.

2082TCP
cPanelInsecure

cPanel web hosting control panel (HTTP)

Unencrypted. Use port 2083 (HTTPS) instead.

2083TCP
cPanel SSLSecure

cPanel web hosting control panel (HTTPS)

Encrypted cPanel access. Restrict to admin IPs.

3306TCP
MySQLCaution

MySQL / MariaDB database server

Never expose to internet. Use SSL/TLS connections and strong passwords.

3389TCP
RDPCaution

Remote Desktop Protocol - Windows remote access

Major ransomware target. Use VPN + NLA + MFA. Never expose directly to internet.

3478TCP/UDP
STUN/TURNCaution

Session Traversal Utilities for NAT

Used for WebRTC. Ensure proper authentication on TURN servers.

4443TCP
PharosCaution

Alternative HTTPS / Pharos Notify

Often used as alternative HTTPS port. Verify what service is running.

5060TCP/UDP
SIPCaution

Session Initiation Protocol - VoIP signaling

Unencrypted SIP. Use SIPS (port 5061) with TLS.

5061TCP
SIPSSecure

SIP over TLS - secure VoIP signaling

Encrypted SIP. Preferred for VoIP deployments.

5432TCP
PostgreSQLCaution

PostgreSQL database server

Never expose to internet. Use SSL, strong passwords, and pg_hba.conf.

5672TCP
AMQPCaution

Advanced Message Queuing Protocol (RabbitMQ)

Use AMQPS (port 5671) for encrypted connections.

5900TCP
VNCInsecure

Virtual Network Computing - remote desktop

Weak encryption. Always tunnel through SSH or VPN.

5984TCP
CouchDBCaution

Apache CouchDB database

Requires authentication configuration. Never expose without auth.

6379TCP
RedisCaution

Redis in-memory data store

No authentication by default. Enable AUTH, rename dangerous commands, bind to localhost.

6443TCP
Kubernetes APICaution

Kubernetes API server

Critical infrastructure endpoint. Use RBAC, network policies, and audit logging.

6697TCP
IRC over TLSSecure

Internet Relay Chat with encryption

Encrypted IRC. Preferred over plain IRC (port 194).

8080TCP
HTTP Proxy/AltCaution

HTTP alternative / proxy server / development

Common for proxies and dev servers. Not inherently secure - add TLS if production.

8443TCP
HTTPS AltSecure

HTTPS alternative / Tomcat SSL

Common alternative HTTPS port. Ensure proper TLS configuration.

8888TCP
HTTP AltCaution

Alternative HTTP / Jupyter Notebook

Common for development. Secure Jupyter with password and HTTPS.

9090TCP
PrometheusCaution

Prometheus monitoring / Cockpit

Restrict access to internal networks. Exposes system metrics.

9200TCP
ElasticsearchCaution

Elasticsearch REST API

No auth by default. Enable X-Pack security. Never expose to internet.

9300TCP
Elasticsearch TransportCaution

Elasticsearch inter-node communication

Internal communication port. Block from external access.

9418TCP
GitInsecure

Git protocol (unencrypted)

No authentication or encryption. Use SSH (port 22) or HTTPS (port 443) for Git.

11211TCP/UDP
MemcachedCaution

Memcached distributed caching

No authentication. Bind to localhost only. UDP can be exploited for DDoS.

27017TCP
MongoDBCaution

MongoDB NoSQL database

Enable authentication (disabled by default). Never expose to internet without auth.

27018TCP
MongoDB ShardCaution

MongoDB shard server

Internal MongoDB port. Restrict to cluster network.

27019TCP
MongoDB ConfigCaution

MongoDB config server

Internal MongoDB port. Restrict to cluster network.

33060TCP
MySQL X ProtocolCaution

MySQL X Protocol / Document Store

MySQL extended protocol. Same security practices as port 3306.

51820UDP
WireGuardSecure

WireGuard VPN

Modern, fast VPN with strong cryptography. Keep keys secure.

About Network Ports

Network ports are logical endpoints for communication. Ports 0-1023 are “well-known” ports assigned to common protocols. Ports 1024-49151 are “registered” ports, and 49152-65535 are “dynamic” or “ephemeral” ports used for temporary connections.

Port Security Best Practices

  • Only open ports that are actively needed
  • Use encrypted alternatives when available (HTTPS over HTTP, SFTP over FTP)
  • Never expose database ports (3306, 5432, 27017) to the internet
  • Use firewalls to restrict access to sensitive ports
  • Regularly audit open ports with tools like nmap
  • Keep services updated to patch security vulnerabilities

Features

  • 70+ commonly used ports documented
  • Security rating for each port/service
  • Search by port number or service name
  • Filter by security level and protocol
  • Detailed security recommendations
  • 100% client-side - no data sent anywhere

Disclaimer:This tool is provided “as is” for informational and educational purposes only. Results may not be 100% accurate. ToolBird makes no warranties, express or implied, regarding the accuracy, reliability, or completeness of any output generated by this tool. This tool does not constitute professional, legal, financial, medical, or tax advice. Always consult a qualified professional for important decisions. By using this tool, you agree that ToolBird and its operators shall not be held liable for any damages, losses, or consequences arising from the use of this tool or reliance on its results. All processing occurs in your browser — we do not store, transmit, or access your data. Use at your own risk.