Common Port Numbers Lookup
Interactive TCP/UDP port scanner database with security risk ratings, malware history, and instant command generation for network diagnostics.
About
Network ports are the digital docking stations of the internet, serving as the communication endpoints for identifying specific processes or types of network services. While there are 65,535 available ports (defined by the 16-bit field in TCP/UDP headers), the first 1024 - known as System Ports - are critical for fundamental network functions. Misconfiguration here is a primary vector for cyberattacks.
This tool transforms the standard port list into a security intelligence engine. Unlike static tables, it evaluates the Security Risk Rating of each service, identifying legacy cleartext protocols (like TELNET on port 23) versus encrypted modern standards. It cross-references historical malware data (e.g., trojans that bind to specific ports) and generates OS-specific terminal commands to assist administrators in auditing their local environment immediately.
Formulas
A network socket is defined by the combination of an IP address and a Port number. The total number of available ports is determined by the 16-bit field size in the transport layer header.
In a TCP Header, the Source and Destination ports occupy the first 32 bits:
Source Port (16 bits)Destination Port (16 bits)Reference Data
| Port | Protocol | Service | Security Risk | Description |
|---|---|---|---|---|
| 20/21 | TCP | FTP | High | File Transfer Protocol (Data/Control). Transmits credentials in cleartext. |
| 22 | TCP | SSH | Low | Secure Shell. Encrypted remote login. Primary target for brute-force attacks. |
| 23 | TCP | Telnet | Critical | Unencrypted text communications. Obsolete and dangerous. |
| 25 | TCP | SMTP | Medium | Simple Mail Transfer Protocol. Vulnerable to spam relaying if unsecured. |
| 53 | UDP/TCP | DNS | Medium | Domain Name System. Vector for amplification attacks and tunneling. |
| 80 | TCP | HTTP | Medium | HyperText Transfer Protocol. Unencrypted web traffic. MITM risk. |
| 110 | TCP | POP3 | Medium | Post Office Protocol v3. Often transmits email in cleartext. |
| 143 | TCP | IMAP | Medium | Internet Message Access Protocol. Prefer IMAPS (993). |
| 443 | TCP | HTTPS | Safe | HTTP over TLS/SSL. The standard for secure web browsing. |
| 3389 | TCP | RDP | High | Remote Desktop Protocol. Frequent target for ransomware entry. |