Navigation
Cheat Sheet · Free Reference

Common Network Ports

Complete networking ports reference with TCP/UDP port numbers, protocols, and service descriptions.
Searchable, copyable, always up to date.

Well-Known Ports (0-1023)

Reserved ports assigned by IANA to common network services. Typically require root/administrator privileges to bind.

PortProtocolServiceDescription
20TCPFTP DataFile Transfer Protocol — data transfer channel
21TCPFTP ControlFile Transfer Protocol — command/control channel
22TCPSSHSecure Shell — encrypted remote login and command execution
23TCPTelnetUnencrypted remote login (insecure, avoid in production)
25TCPSMTPSimple Mail Transfer Protocol — email routing between servers
53TCP/UDPDNSDomain Name System — hostname-to-IP resolution
67UDPDHCP ServerDynamic Host Configuration Protocol — server listening port
68UDPDHCP ClientDynamic Host Configuration Protocol — client listening port
69UDPTFTPTrivial File Transfer Protocol — simple, unauthenticated file transfer
80TCPHTTPHypertext Transfer Protocol — unencrypted web traffic
110TCPPOP3Post Office Protocol v3 — email retrieval (unencrypted)
111TCP/UDPRPCRemote Procedure Call — SunRPC portmapper
119TCPNNTPNetwork News Transfer Protocol — Usenet newsgroups
123UDPNTPNetwork Time Protocol — clock synchronization
135TCPMSRPCMicrosoft RPC — Windows endpoint mapper (frequently targeted)
137UDPNetBIOS NameNetBIOS Name Service — Windows network name resolution
138UDPNetBIOS DatagramNetBIOS Datagram Service — connectionless communication
139TCPNetBIOS SessionNetBIOS Session Service — connection-oriented file/print sharing
143TCPIMAPInternet Message Access Protocol — email retrieval (unencrypted)
161UDPSNMPSimple Network Management Protocol — device monitoring (queries)
162UDPSNMP TrapSNMP Trap — device-initiated alert notifications
389TCP/UDPLDAPLightweight Directory Access Protocol — directory services
443TCPHTTPSHTTP over TLS/SSL — encrypted web traffic
445TCPSMBServer Message Block — Windows file/print sharing (frequently targeted)
465TCPSMTPSSMTP over SSL — encrypted email submission (legacy)
514UDPSyslogSystem logging protocol — centralized log collection
587TCPSMTP SubmissionMail submission agent — authenticated email sending (STARTTLS)
636TCPLDAPSLDAP over SSL/TLS — encrypted directory services
993TCPIMAPSIMAP over SSL/TLS — encrypted email retrieval
995TCPPOP3SPOP3 over SSL/TLS — encrypted email retrieval

Registered Ports (1024-49151)

Ports assigned by IANA to specific services upon request. Do not require elevated privileges.

PortProtocolServiceDescription
1080TCPSOCKS ProxySOCKS proxy protocol — general-purpose proxy for TCP traffic
1194TCP/UDPOpenVPNOpenVPN tunnel — encrypted VPN connections
1433TCPMSSQLMicrosoft SQL Server — database connections
1521TCPOracle DBOracle Database listener — TNS connections
2049TCP/UDPNFSNetwork File System — distributed file sharing
3128TCPSquid ProxySquid HTTP proxy — web caching and filtering
3306TCPMySQLMySQL / MariaDB — database connections
3389TCP/UDPRDPRemote Desktop Protocol — Windows remote access (frequently targeted)
5432TCPPostgreSQLPostgreSQL — database connections
5900TCPVNCVirtual Network Computing — graphical remote desktop
6379TCPRedisRedis — in-memory key-value data store
8080TCPHTTP AltAlternate HTTP — commonly used for web proxies and dev servers
8443TCPHTTPS AltAlternate HTTPS — secondary encrypted web services
8888TCPAlt HTTPAlternate HTTP — commonly used for admin panels and Jupyter
9200TCPElasticsearchElasticsearch REST API — search and analytics engine
9300TCPES TransportElasticsearch transport — inter-node cluster communication
27017TCPMongoDBMongoDB — NoSQL document database connections

Security-Related Ports

Ports commonly targeted in attacks, used by security tools, or relevant for firewall and IDS/IPS configuration.

PortProtocolServiceDescription
22TCPSSHBrute-force target — use key-based auth, disable root login
23TCPTelnetCleartext protocol — disable and replace with SSH
135-139TCP/UDPNetBIOS / MSRPCWindows services — block from untrusted networks (WannaCry, EternalBlue)
445TCPSMBHigh-value target — EternalBlue (MS17-010), ransomware propagation
1080TCPSOCKS ProxyUsed by malware for C2 tunneling — block if not needed
3389TCPRDPBrute-force and BlueKeep (CVE-2019-0708) target — use VPN or gateway
4443TCPAlt HTTPSAlternate HTTPS — used by some C2 frameworks and legitimate services
4444TCPMetasploitDefault Meterpreter reverse shell listener — common in pentesting
5555TCPADBAndroid Debug Bridge — remote device access if exposed
5900TCPVNCOften unencrypted — tunnel through SSH or VPN
6379TCPRedisFrequently exposed without authentication — data exfiltration risk
8080TCPHTTP AltProxy/admin panel — check for exposed management interfaces
9200TCPElasticsearchOften exposed without auth — data leak risk (Shodan target)
27017TCPMongoDBFrequently misconfigured — unauthenticated access leads to breaches

Database Ports

Default ports for common database management systems. Always restrict access to trusted hosts only.

PortProtocolServiceDescription
1433TCPMSSQLMicrosoft SQL Server — default instance
1434UDPMSSQL BrowserSQL Server Browser — instance discovery service
1521TCPOracle DBOracle Database — TNS listener default port
3306TCPMySQLMySQL / MariaDB — default connection port
5432TCPPostgreSQLPostgreSQL — default connection port
6379TCPRedisRedis — in-memory data store (default no auth)
9042TCPCassandraApache Cassandra — CQL native transport
9200TCPElasticsearchElasticsearch — REST API for search and indexing
11211TCP/UDPMemcachedMemcached — distributed memory caching (DDoS amplification risk)
27017TCPMongoDBMongoDB — default connection port
5984TCPCouchDBApache CouchDB — HTTP API
8529TCPArangoDBArangoDB — multi-model database HTTP API

Web & Application Ports

Common ports used by web servers, application frameworks, and development tools.

PortProtocolServiceDescription
80TCPHTTPStandard web server — unencrypted traffic
443TCPHTTPSEncrypted web server — TLS/SSL traffic
3000TCPDev ServerNode.js / React / Grafana — common development port
3128TCPSquid ProxySquid HTTP proxy — web caching and content filtering
4443TCPAlt HTTPSAlternate HTTPS — secondary secure web services
5000TCPFlask / DockerPython Flask dev server / Docker Registry
8000TCPAlt HTTPDjango dev server / general alternate HTTP
8080TCPHTTP ProxyAlternate HTTP — Tomcat, Jenkins, proxy servers
8443TCPHTTPS AltAlternate HTTPS — Tomcat SSL, management consoles
8888TCPAlt HTTPJupyter Notebook / alternate HTTP services
9090TCPPrometheusPrometheus monitoring — metrics collection and alerting
9443TCPAlt HTTPSAlternate HTTPS — WSO2, VMware, admin consoles

Scan ports online

Use our free network tools to check open ports, look up IP addresses, and analyze network services.

Frequently Asked Questions

Well-known ports (0-1023) are assigned by IANA to common, established services like HTTP (80), HTTPS (443), and SSH (22). They typically require root or administrator privileges to bind. Registered ports (1024-49151) are assigned to specific services upon request but do not require elevated privileges. Dynamic or ephemeral ports (49152-65535) are used temporarily by client applications for outbound connections.

At minimum, block inbound access to ports 23 (Telnet), 135-139 (NetBIOS/MSRPC), 445 (SMB), 161/162 (SNMP), and 3389 (RDP) from untrusted networks. Only open ports for services you actively use and need to expose. Follow the principle of least privilege: deny all by default and allow only specific, required traffic. Use a port scanner to verify your firewall configuration.

TCP (Transmission Control Protocol) is connection-oriented, providing reliable, ordered delivery with error checking and retransmission. UDP (User Datagram Protocol) is connectionless and faster but does not guarantee delivery or order. TCP is used for HTTP, SSH, and email. UDP is used for DNS queries, DHCP, streaming, and NTP where speed matters more than reliability.

Use netstat -tulnp or ss -tulnp on Linux to list listening ports. On Windows, use netstat -ano. For remote scanning, use Nmap: nmap -sT -sU target scans both TCP and UDP ports. You can also use our port scanner to check externally visible ports from outside your network.