Reference Database
This tool provides information about common network ports and their services. To scan for open ports on a system, use tools like nmap, netstat, or specialized network scanners.
| Port | Protocol | Service | Description | Category | Security |
|---|---|---|---|---|---|
| 1 | Both | tcpmux | Multiplexer | Other | Configure firewall rules and authentication appropriately. |
| 5 | Both | rje | Entry | Other | Configure firewall rules and authentication appropriately. |
| 7 | Both | echo | Echo | Network | Configure firewall rules and authentication appropriately. |
| 9 | Both | discard | Discard | Network | Configure firewall rules and authentication appropriately. |
| 11 | Both | systat | Users | Other | Configure firewall rules and authentication appropriately. |
| 13 | Both | daytime | Daytime | Network | Configure firewall rules and authentication appropriately. |
| 17 | Both | qotd | Day | Network | Configure firewall rules and authentication appropriately. |
| 18 | Both | msp | (historic) | Other | Configure firewall rules and authentication appropriately. |
| 19 | Both | chargen | Generator | Network | Configure firewall rules and authentication appropriately. |
| 20 | Both | ftp-data | Data] | File Transfer | Configure firewall rules and authentication appropriately. |
| 21 | Both | ftp | [Control] | File Transfer | 🟡 Unencrypted. Use encrypted alternative or VPN. Restrict network access. |
| 22 | Both | ssh | Protocol | File Transfer | 🟢 Encrypted protocol. Ensure strong cipher suites and valid certificates. |
| 23 | Both | telnet | Telnet | Remote Access | 🔴 Critical risk. Frequently exploited. Never expose to internet. |
| 25 | Both | smtp | Transfer | 🟡 Unencrypted. Use encrypted alternative or VPN. Restrict network access. | |
| 27 | Both | nsw-fe | FE | Other | Configure firewall rules and authentication appropriately. |
| 29 | Both | msg-icp | ICP | Other | Configure firewall rules and authentication appropriately. |
| 31 | Both | msg-auth | Authentication | Other | Configure firewall rules and authentication appropriately. |
| 33 | Both | dsp | Protocol | Other | Configure firewall rules and authentication appropriately. |
| 37 | Both | time | Time | Time | Configure firewall rules and authentication appropriately. |
| 38 | Both | rap | Protocol | Other | Configure firewall rules and authentication appropriately. |
| 39 | Both | rlp | Protocol | Other | Configure firewall rules and authentication appropriately. |
| 41 | Both | graphics | Graphics | Other | Configure firewall rules and authentication appropriately. |
| 42 | Both | name | Server | Other | Configure firewall rules and authentication appropriately. |
| 43 | Both | nicname | Is | Other | Configure firewall rules and authentication appropriately. |
| 44 | Both | mpm-flags | Protocol | Other | Configure firewall rules and authentication appropriately. |
| 45 | Both | mpm | [recv] | Other | Configure firewall rules and authentication appropriately. |
| 46 | Both | mpm-snd | send] | Other | Configure firewall rules and authentication appropriately. |
| 48 | Both | auditd | Daemon | Other | Configure firewall rules and authentication appropriately. |
| 49 | Both | tacacs | (TACACS) | Other | Configure firewall rules and authentication appropriately. |
| 50 | Both | re-mail-ck | Protocol | Configure firewall rules and authentication appropriately. | |
| 52 | Both | xns-time | Protocol | Time | Configure firewall rules and authentication appropriately. |
| 53 | Both | domain | Server | DNS | Configure firewall rules and authentication appropriately. |
| 54 | Both | xns-ch | Clearinghouse | Other | Configure firewall rules and authentication appropriately. |
| 55 | Both | isi-gl | Language | Other | Configure firewall rules and authentication appropriately. |
| 56 | Both | xns-auth | Authentication | Other | Configure firewall rules and authentication appropriately. |
| 58 | Both | xns-mail | Mail | Configure firewall rules and authentication appropriately. | |
| 62 | Both | acas | Services | Other | Configure firewall rules and authentication appropriately. |
| 63 | Both | whoispp | whois++ | Other | Configure firewall rules and authentication appropriately. |
| 64 | Both | covia | (CI) | Other | Configure firewall rules and authentication appropriately. |
| 65 | Both | tacacs-ds | Service | Other | Configure firewall rules and authentication appropriately. |
| 66 | Both | sql-net | SQL*NET | Database | Configure firewall rules and authentication appropriately. |
| 67 | Both | bootps | Server | Network | Configure firewall rules and authentication appropriately. |
| 68 | Both | bootpc | Client | Network | Configure firewall rules and authentication appropriately. |
| 69 | Both | tftp | Transfer | File Transfer | 🟡 Unencrypted. Use encrypted alternative or VPN. Restrict network access. |
| 70 | Both | gopher | Gopher | Other | Configure firewall rules and authentication appropriately. |
| 71 | Both | netrjs-1 | Service | Other | Configure firewall rules and authentication appropriately. |
| 72 | Both | netrjs-2 | Service | Other | Configure firewall rules and authentication appropriately. |
| 73 | Both | netrjs-3 | Service | Other | Configure firewall rules and authentication appropriately. |
| 74 | Both | netrjs-4 | Service | Other | Configure firewall rules and authentication appropriately. |
| 76 | Both | deos | Store | Other | Configure firewall rules and authentication appropriately. |