Network Port Reference

Comprehensive database of common network ports with security implications

Reference Database

This tool provides information about common network ports and their services. To scan for open ports on a system, use tools like nmap, netstat, or specialized network scanners.

Showing 5986 of 5986 ports
PortProtocolServiceDescriptionCategorySecurity
1Both
tcpmux
Multiplexer
Other
Configure firewall rules and authentication appropriately.
5Both
rje
Entry
Other
Configure firewall rules and authentication appropriately.
7Both
echo
Echo
Network
Configure firewall rules and authentication appropriately.
9Both
discard
Discard
Network
Configure firewall rules and authentication appropriately.
11Both
systat
Users
Other
Configure firewall rules and authentication appropriately.
13Both
daytime
Daytime
Network
Configure firewall rules and authentication appropriately.
17Both
qotd
Day
Network
Configure firewall rules and authentication appropriately.
18Both
msp
(historic)
Other
Configure firewall rules and authentication appropriately.
19Both
chargen
Generator
Network
Configure firewall rules and authentication appropriately.
20Both
ftp-data
Data]
File Transfer
Configure firewall rules and authentication appropriately.
21Both
ftp
[Control]
File Transfer
🟡 Unencrypted. Use encrypted alternative or VPN. Restrict network access.
22Both
ssh
Protocol
File Transfer
🟢 Encrypted protocol. Ensure strong cipher suites and valid certificates.
23Both
telnet
Telnet
Remote Access
🔴 Critical risk. Frequently exploited. Never expose to internet.
25Both
smtp
Transfer
Mail
🟡 Unencrypted. Use encrypted alternative or VPN. Restrict network access.
27Both
nsw-fe
FE
Other
Configure firewall rules and authentication appropriately.
29Both
msg-icp
ICP
Other
Configure firewall rules and authentication appropriately.
31Both
msg-auth
Authentication
Other
Configure firewall rules and authentication appropriately.
33Both
dsp
Protocol
Other
Configure firewall rules and authentication appropriately.
37Both
time
Time
Time
Configure firewall rules and authentication appropriately.
38Both
rap
Protocol
Other
Configure firewall rules and authentication appropriately.
39Both
rlp
Protocol
Other
Configure firewall rules and authentication appropriately.
41Both
graphics
Graphics
Other
Configure firewall rules and authentication appropriately.
42Both
name
Server
Other
Configure firewall rules and authentication appropriately.
43Both
nicname
Is
Other
Configure firewall rules and authentication appropriately.
44Both
mpm-flags
Protocol
Other
Configure firewall rules and authentication appropriately.
45Both
mpm
[recv]
Other
Configure firewall rules and authentication appropriately.
46Both
mpm-snd
send]
Other
Configure firewall rules and authentication appropriately.
48Both
auditd
Daemon
Other
Configure firewall rules and authentication appropriately.
49Both
tacacs
(TACACS)
Other
Configure firewall rules and authentication appropriately.
50Both
re-mail-ck
Protocol
Mail
Configure firewall rules and authentication appropriately.
52Both
xns-time
Protocol
Time
Configure firewall rules and authentication appropriately.
53Both
domain
Server
DNS
Configure firewall rules and authentication appropriately.
54Both
xns-ch
Clearinghouse
Other
Configure firewall rules and authentication appropriately.
55Both
isi-gl
Language
Other
Configure firewall rules and authentication appropriately.
56Both
xns-auth
Authentication
Other
Configure firewall rules and authentication appropriately.
58Both
xns-mail
Mail
Mail
Configure firewall rules and authentication appropriately.
62Both
acas
Services
Other
Configure firewall rules and authentication appropriately.
63Both
whoispp
whois++
Other
Configure firewall rules and authentication appropriately.
64Both
covia
(CI)
Other
Configure firewall rules and authentication appropriately.
65Both
tacacs-ds
Service
Other
Configure firewall rules and authentication appropriately.
66Both
sql-net
SQL*NET
Database
Configure firewall rules and authentication appropriately.
67Both
bootps
Server
Network
Configure firewall rules and authentication appropriately.
68Both
bootpc
Client
Network
Configure firewall rules and authentication appropriately.
69Both
tftp
Transfer
File Transfer
🟡 Unencrypted. Use encrypted alternative or VPN. Restrict network access.
70Both
gopher
Gopher
Other
Configure firewall rules and authentication appropriately.
71Both
netrjs-1
Service
Other
Configure firewall rules and authentication appropriately.
72Both
netrjs-2
Service
Other
Configure firewall rules and authentication appropriately.
73Both
netrjs-3
Service
Other
Configure firewall rules and authentication appropriately.
74Both
netrjs-4
Service
Other
Configure firewall rules and authentication appropriately.
76Both
deos
Store
Other
Configure firewall rules and authentication appropriately.
Page 1 of 120

Security Indicator Legend

Green: Secure/Encrypted
Yellow: Conditional Security
Red: Critical/Dangerous
Gray: Unknown/Not in DB

Common Port Groups

Security Best Practices

  • •Never expose database ports (3306, 5432, 1433, 27017, 6379) to the internet. Use SSH tunnels or VPNs.
  • •Disable legacy protocols like Telnet (23), FTP (21), and HTTP (80) in favor of encrypted alternatives.
  • •Use firewalls to restrict access to only necessary ports and trusted IP addresses.
  • •Enable authentication on all services, especially those that default to no auth (Redis, Memcached, MongoDB).
  • •Regularly audit open ports using tools like nmap, netstat, or ss to identify unexpected services.