Network Port Reference - Complete TCP/UDP Guide
Comprehensive network port reference with 50+ common ports documented. Search by port number or service name, filter by category or security level. Includes security ratings and best practices for DevOps and system administrators.
85
20
46
19
11
Showing 85 of 85 ports
FTP Data
InsecureFile Transfer Protocol - Data channel
FTP Control
InsecureFile Transfer Protocol - Command channel
SSH / SFTP / SCP
SecureSecure Shell - Encrypted remote access and file transfer
Telnet
InsecureUnencrypted remote terminal access
SMTP
ConditionalSimple Mail Transfer Protocol - Email transmission
DNS
ConditionalDomain Name System - Translates domain names to IP addresses
DHCP Server
ConditionalDynamic Host Configuration Protocol - Server
DHCP Client
ConditionalDynamic Host Configuration Protocol - Client
TFTP
InsecureTrivial File Transfer Protocol - Simple file transfers
HTTP
InsecureHypertext Transfer Protocol - Web traffic
Kerberos
SecureNetwork authentication protocol
POP3
InsecurePost Office Protocol v3 - Email retrieval
RPC Portmapper
ConditionalRemote Procedure Call port mapping
NNTP
InsecureNetwork News Transfer Protocol - Usenet
NTP
ConditionalNetwork Time Protocol - Time synchronization
MS RPC / EPMAP
ConditionalMicrosoft Remote Procedure Call Endpoint Mapper
NetBIOS-NS
InsecureNetBIOS Name Service
NetBIOS-DGM
InsecureNetBIOS Datagram Service
NetBIOS-SSN
InsecureNetBIOS Session Service
IMAP
InsecureInternet Message Access Protocol - Email access
SNMP
ConditionalSimple Network Management Protocol
SNMP Trap
ConditionalSNMP Trap receiver - Event notifications
BGP
ConditionalBorder Gateway Protocol - Internet routing
LDAP
ConditionalLightweight Directory Access Protocol
HTTPS
SecureHTTP Secure - Encrypted web traffic
SMB / CIFS
ConditionalServer Message Block - Windows file sharing
Kerberos Password
SecureKerberos password change protocol
SMTPS
SecureSMTP over SSL - Secure email submission (implicit TLS)
IKE / ISAKMP
SecureInternet Key Exchange - VPN negotiation
Syslog
InsecureSystem logging protocol
LPD
InsecureLine Printer Daemon - Print services
Klogin
ConditionalKerberos login
Kshell
ConditionalKerberos shell
DHCPv6
ConditionalDHCP for IPv6 - Server
SMTP Submission
SecureEmail submission with STARTTLS
IPP / CUPS
ConditionalInternet Printing Protocol
LDAPS
SecureLDAP over SSL - Secure directory access
DNS over TLS
SecureEncrypted DNS queries
rsync
ConditionalRemote file synchronization
FTPS
SecureFTP over SSL - Secure file transfer (implicit TLS)
IMAPS
SecureIMAP over SSL - Secure email access
POP3S
SecurePOP3 over SSL - Secure email retrieval
SOCKS
ConditionalSOCKS proxy protocol
MS SQL Server
ConditionalMicrosoft SQL Server database
MS SQL Browser
ConditionalSQL Server Browser service
Oracle Database
ConditionalOracle Database listener
L2TP
ConditionalLayer 2 Tunneling Protocol
PPTP
InsecurePoint-to-Point Tunneling Protocol
MQTT
ConditionalMessage Queue Telemetry Transport
NFS
ConditionalNetwork File System
cPanel
InsecurecPanel web hosting control panel (HTTP)
cPanel HTTPS
SecurecPanel web hosting control panel (HTTPS)
ZooKeeper
ConditionalApache ZooKeeper coordination service
Docker API
InsecureDocker daemon API (unencrypted)
Docker API TLS
SecureDocker daemon API with TLS
Development Server
ConditionalCommon development server port
LDAP Global Catalog
ConditionalActive Directory Global Catalog
MySQL / MariaDB
ConditionalMySQL database server
RDP
ConditionalRemote Desktop Protocol
IPsec NAT-T
SecureIPsec NAT Traversal
Flask / UPnP
ConditionalFlask dev server / UPnP control
PostgreSQL
ConditionalPostgreSQL database server
Kibana
ConditionalKibana visualization dashboard
AMQP / RabbitMQ
ConditionalAdvanced Message Queuing Protocol
VNC
InsecureVirtual Network Computing
Redis
ConditionalRedis in-memory data store
Kubernetes API
SecureKubernetes API server
Syslog TLS
SecureSyslog over TLS - Secure logging
IRC
ConditionalInternet Relay Chat
HTTP Alt / Django
ConditionalAlternative HTTP / Python development
HTTP Proxy / Alt
ConditionalHTTP proxy and alternative HTTP
HTTPS Alt
SecureAlternative HTTPS port
MQTT over TLS
SecureSecure MQTT messaging
PHP-FPM / Portainer
ConditionalPHP-FPM / Various services
Prometheus
ConditionalPrometheus monitoring server
Node Exporter
ConditionalPrometheus Node Exporter
Elasticsearch HTTP
ConditionalElasticsearch REST API
Elasticsearch Transport
ConditionalElasticsearch cluster communication
Git Protocol
InsecureGit native protocol
Kubelet API
ConditionalKubernetes Kubelet HTTPS API
Memcached
InsecureMemcached distributed cache
RabbitMQ Management
ConditionalRabbitMQ web management console
MongoDB
ConditionalMongoDB database server
Jenkins Agent
ConditionalJenkins JNLP agent communication
WireGuard
SecureWireGuard VPN protocol
Understanding Port Ranges
Well-Known
0 - 1023
Reserved for common services, requires root/admin to bind
Registered
1024 - 49151
Registered with IANA for specific services
Dynamic/Private
49152 - 65535
Ephemeral ports for temporary connections
Quick Reference: Essential Ports
Web Server
80, 443
SSH Access
22
25, 587, 993
Database
3306, 5432, 27017
Common Port Categories
Web Services
- 80 - HTTP
- 443 - HTTPS
- 8080 - HTTP Alt
- 8443 - HTTPS Alt
- 25 - SMTP
- 587 - SMTP/TLS
- 993 - IMAPS
- 995 - POP3S
Databases
- 3306 - MySQL
- 5432 - PostgreSQL
- 27017 - MongoDB
- 6379 - Redis
Remote Access
- 22 - SSH/SFTP
- 3389 - RDP
- 5900 - VNC
- 23 - Telnet (insecure)
Port Security Best Practices
Do
- • Use encrypted protocols (HTTPS, SSH, SFTP, IMAPS)
- • Implement firewall rules to restrict port access
- • Keep services updated and patched
- • Use VPNs for remote database access
- • Enable authentication on all services
Don't
- • Expose database ports (3306, 5432) to the internet
- • Use Telnet (23) or FTP (21) in production
- • Leave default ports open unnecessarily
- • Ignore security warnings and advisories
- • Use services without TLS encryption
How to Use This Tool
Search by Port
Enter a port number (e.g., 22, 443, 3306) or service name to find details instantly
Filter Results
Use category filters (Web, Database, Email) or security level (Secure, Conditional, Insecure)
Review Security
Each port includes security notes and recommendations for secure alternatives when available
Frequently Asked Questions
Network ports are virtual endpoints for communication in computer networking. They are identified by 16-bit numbers (0-65535) and allow multiple network services to run on a single IP address. Ports work with protocols like TCP and UDP to route data to the correct application or service.