Network Port Reference for TCP, UDP, services, and security review
Search common TCP and UDP ports by number, protocol, service name, risk level, range type, and operational context. Use this reference to understand what a port is commonly used for, whether it should be exposed publicly, and what to check when debugging firewall rules, cloud security groups, container mappings, VPN access, DNS, mail, databases, remote administration, and web services.
- Search by port number, protocol, service name, security keyword, or troubleshooting symptom.
- Compare well-known, registered, and dynamic/private port ranges with practical exposure guidance.
- Review service behavior, related ports, risk level, and deployment notes for operations and security audits.
Search network ports
Enter a port such as 22, 53, 443, 3306, 5432, 6379, or 51820, or search by service name such as SSH, DNS, HTTPS, MySQL, PostgreSQL, Redis, WireGuard, SMTP, Kubernetes, or RDP.
No matching ports were found.
Well-known
Reserved
Reserved port number; not used for real service listening. Binding to port 0 usually asks the OS to choose an available port automatically.
Details
TCP port 0 is a reserved value in the port number space, not a normal listening port for public services. Real network services typically should not expose 0 as a fixed port for client access.
In socket programming, binding to port 0 has a special meaning: the application is not trying to listen on “port 0”; it is asking the operating system to select an available local port automatically. After binding succeeds, the system returns the actual assigned port number.
This pattern is common in automated tests, local development tools, temporary HTTP services, RPC test processes, end-to-end test environments, and programs that need dynamic ports to avoid conflicts.
If a port scanner reports TCP port 0 as open, verify it carefully. In many cases, it is not a real business service, but a scanner display artifact, unusual probe response, firewall or proxy behavior, device firmware issue, or low-level network stack response to a special-port probe.
During investigation, confirm the actual listening sockets on the host using tools such as ss, netstat, lsof, container port mappings, system logs, and firewall rules. If no process is truly listening on port 0, it should not be treated as a real exposed business surface.
tcpmux
Early TCP service multiplexer port; rarely used as a normal service discovery entry point in modern production environments.
Details
TCP port 1 is assigned to tcpmux, the TCP Port Service Multiplexer. It comes from early Internet protocol design and was intended to let clients query or connect to other TCP services through a fixed entry point.
In modern production environments, tcpmux is rarely used as a mainstream service discovery mechanism. Today, service discovery is usually handled by DNS, load balancers, service registries, Kubernetes Services, Consul, ZooKeeper, or cloud platform service directories.
If a scan finds port 1 open, first confirm the actual listening process and response content instead of assuming it is a normal business service. It is more likely to be an old system, special-purpose device, misconfiguration, honeypot, legacy service, or scanner fingerprinting anomaly.
This port is not suitable as a public business entry point. If there is no clear dependency, it should be closed; if a legacy dependency still exists, restrict the allowed sources and document why it must remain available.
During investigation, review system services, process launch parameters, container port mappings, firewall rules, and asset ownership to ensure it is not an accidentally exposed low-value surface.
FTP Data
FTP active-mode data connection port, used by the server to send file contents or directory listings back to the client.
Details
TCP port 20 is the FTP active-mode data connection port. FTP separates control and data connections: port 21 handles login, commands, and responses, while port 20 is typically used by the server in active mode to transfer file contents or directory listings.
Port 20 is not used by every FTP transfer. It is usually involved only in active mode, where the server connects from its local port 20 to a client-specified data port. In passive mode, the data connection is reversed: the client connects to a passive port range opened by the server.
Active-mode FTP is often difficult for firewalls, NAT, cloud security groups, and container networks because the data connection is initiated from the server back to the client. A common symptom is “FTP login works, but directory listing or file transfer fails.”
When troubleshooting FTP transfer failures, do not check only ports 20 and 21. Confirm whether active or passive mode is being used, whether the passive port range is allowed, whether NAT mappings are correct, and whether the client-side or server-side firewall is blocking the data connection.
Plain FTP usually transmits usernames, passwords, and file contents in cleartext. For public networks, sensitive files, automated distribution, or production workflows, SFTP, FTPS, HTTPS upload/download, object storage pre-signed URLs, or controlled internal file exchange services are usually safer choices.
FTP Control
FTP control connection port for login, authentication, command exchange, and file operation control.
Details
TCP port 21 is the FTP control connection port. After a client connects to port 21, this connection is used for user login, password authentication, directory navigation, file listing requests, upload and download commands, deletion, renaming, and other control operations.
A key characteristic of FTP is that the control connection and data connection are separate. Port 21 is responsible for “sending commands” and “receiving responses”; actual file contents or directory listings are transferred through a separate data connection.
In active mode, the data connection is usually related to TCP port 20. In passive mode, the server opens a passive port range and the client connects to one of those ports. Therefore, port 21 being reachable only means the control channel works; it does not guarantee that file transfer will work.
Many FTP issues appear as “login succeeds, but directory listing or file transfer fails.” This is usually not a port 21 problem; it is often caused by data connections being blocked by firewalls, NAT, cloud security groups, container networking, load balancers, or an incorrect FTP passive port configuration.
FTP is still seen in legacy system file exchange, vendor batch transfers, industrial device log exports, and network device configuration backups. However, plain FTP sends credentials and contents in cleartext. For public or sensitive scenarios, prefer SFTP, FTPS, HTTPS-based file services, or object storage workflows.
SSH / SFTP
Default SSH remote administration port, also commonly used for SFTP file transfer and Git over SSH.
Details
TCP port 22 is the default SSH port and one of the most common remote administration entry points for Linux, Unix, network devices, cloud hosts, development machines, and operations environments.
SSH is used for encrypted remote login, command execution, port forwarding, bastion access, and automation. It also commonly carries SFTP and Git over SSH: SFTP transfers files over the SSH protocol, while Git over SSH uses SSH keys for repository authentication, fetch, pull, and push operations.
Exposing port 22 to the public Internet is not always wrong, but it will almost certainly be scanned, brute-forced, and targeted by password spraying. Production environments should disable root password login, prefer keys, certificates, or MFA, and combine source IP restrictions, bastion hosts, VPN, Fail2ban, login auditing, and least-privilege accounts.
Simply moving SSH to another port does not truly solve the security problem. A custom port can reduce some default-port scanning noise, but the core controls remain authentication strength, source restrictions, patching, permission boundaries, and auditability.
When troubleshooting SSH connection failures, check whether sshd is running, whether the listening port was changed to a custom port such as 2222, whether firewalls or cloud security groups allow the connection, whether the username is correct, whether key file permissions are valid, whether password login is disabled on the server, and whether the corporate network blocks outbound SSH.
Telnet
Cleartext remote terminal port, mostly seen on legacy devices, embedded systems, and lab environments.
Details
TCP port 23 is the default port for Telnet. Telnet is an early remote terminal protocol that allows a client to connect to a remote device, enter commands, view output, and manage the system through a terminal-like session.
The major problem with Telnet is its lack of modern encryption. Usernames, passwords, commands, and responses are commonly transmitted in cleartext, making them visible to anyone who can observe the network path, such as a shared LAN, compromised gateway, proxy device, or untrusted Wi-Fi network.
Modern production servers generally should not use Telnet. It is more commonly found on old switches, routers, serial console servers, cameras, embedded devices, industrial control equipment, training labs, and temporary protocol debugging environments.
If a scan shows port 23 open, first confirm whether it is a default device management interface, a legacy service, or an accidentally enabled debug port. Public Telnet exposure is high risk; typical remediation includes disabling the service, migrating to SSH, restricting access to a management network or VPN, and checking for default accounts, weak passwords, and outdated firmware.
SMTP
Traditional SMTP server-to-server mail delivery port, mainly used for MX-based message transfer.
Details
TCP port 25 is the traditional SMTP mail transfer port, primarily used for mail server-to-mail server delivery. For example, a sending mail server looks up the recipient domain’s MX records and then attempts to deliver the message to the destination mail server over port 25.
Port 25 is not the preferred submission port for normal mail clients. When users, websites, or business systems submit outbound mail through an authenticated account, port 587 with authentication and STARTTLS is usually preferred; port 465 is commonly used for implicit TLS mail submission.
Many cloud providers, hosting companies, and ISPs restrict outbound port 25 by default because it is frequently abused for spam delivery. If a self-hosted mail server cannot send outbound mail, check not only the SMTP service itself, but also provider-level port restrictions, whether an unblock request is required, and whether the server IP has poor anti-spam reputation.
Reliable mail delivery depends on much more than port reachability. A self-hosted mail server also needs correct MX records, PTR reverse DNS, SPF, DKIM, DMARC, TLS, hostname configuration, queue retry behavior, and bounce handling. Without these, mail may be rejected, delayed, or delivered to spam even when port 25 is open.
DNS
DNS TCP query port, commonly used for large responses, DNSSEC, zone transfers, and retries after UDP truncation.
Details
TCP port 53 is one of the standard DNS ports, but its role is not identical to UDP 53. Ordinary DNS lookups usually prefer UDP 53; when responses are too large, UDP responses are truncated, DNSSEC is in use, or more reliable transport is needed, resolvers may fall back to TCP 53.
TCP 53 is also commonly used for zone transfers between authoritative DNS servers, such as AXFR and IXFR. Zone transfers are useful for primary-secondary DNS synchronization, but if source restrictions are not configured correctly, they may expose an entire DNS zone to unauthorized parties.
DNS troubleshooting should not check UDP 53 only. Large TXT records, mail-related records, DNSSEC responses, large record sets, and complex enterprise DNS environments can fail intermittently if TCP 53 is blocked by a firewall or security device.
For authoritative DNS servers, TCP 53 may need to be reachable from the Internet for valid queries, but zone transfers should be limited to trusted secondary servers. For recursive resolvers, TCP 53 should not be open to all public sources, because an open resolver can be abused for unwanted queries, privacy exposure, or DNS amplification attack paths.
DNS
The most common DNS query port, used to resolve domain names into IP addresses and other resource records.
Details
UDP port 53 is the most common DNS query port. Browsers, operating systems, recursive resolvers, and most applications typically use it to query records such as A, AAAA, CNAME, MX, and TXT.
UDP DNS queries are lightweight and fast, making them suitable for most short responses. When a response is too large, a UDP response is truncated, DNSSEC is enabled, or more reliable delivery is required, the client or resolver may switch to TCP 53.
DNS services should be understood as either authoritative or recursive. Authoritative DNS servers may answer public queries for zones they are responsible for. Recursive resolvers, however, should not be open to all public sources, because open resolvers can be abused for amplification attacks, unwanted query forwarding, or DNS behavior probing.
When troubleshooting DNS issues, do not only check whether port 53 is open. Confirm that both UDP and TCP are usable, identify which resolver the client is actually using, check cache state, consider whether DNSSEC is increasing response size, and verify whether firewalls or security devices are blocking part of the DNS traffic.
DHCP Server
DHCP server port used on local networks to assign IP addresses and network configuration to clients.
Details
UDP port 67 is used by DHCP servers. When a client first joins a network and does not yet have a usable IP address, it requests network configuration through DHCP; the server receives the request on port 67 and returns details such as an IP address, subnet mask, default gateway, DNS servers, and lease duration.
DHCP operates during early network initialization. The typical flow includes Discover, Offer, Request, and Ack. Clients usually use UDP 68, while servers use UDP 67. Because the client may not yet have full network configuration, this process often depends on broadcast traffic or DHCP relay forwarding.
Port 67 should normally appear only on routers, Layer 3 switches, gateways, enterprise DHCP servers, PXE boot environments, private cloud networks, or controlled office networks. It is not a public business service port and should not be exposed directly to the Internet.
If an unauthorized DHCP server, also known as a rogue DHCP server, appears on a network, clients may receive the wrong gateway, wrong DNS server, incorrect subnet, or even be directed through an attacker-controlled path. When investigating IP assignment failures, unexpected gateways, DNS anomalies, or many clients suddenly losing connectivity, check whether multiple DHCP servers are responding at the same time.
DHCP Client
DHCP client port used by devices to receive IP address, gateway, DNS, and lease configuration.
Details
UDP port 68 is used by DHCP clients. When a device first joins a network, it often does not yet have a usable IP address and cannot access a gateway or DNS server like a normal application would. The client uses DHCP to request network configuration and receives lease information from the DHCP server on port 68.
DHCP client and server ports work as a pair: servers use UDP 67, while clients use UDP 68. A typical exchange starts with a client broadcasting Discover, the server replying with Offer, the client sending Request, and the server returning Ack. This process gives the client its IP address, subnet mask, default gateway, DNS servers, and lease duration.
Port 68 is not a public application service port. It is a basic network initialization port used when a host joins a network. It is commonly seen on laptops, phones, virtual machines, container hosts, PXE boot environments, office networks, cloud instance initialization, and devices that obtain addresses automatically.
If a client cannot obtain an IP address, or receives the wrong gateway, wrong DNS server, or unexpected subnet, the issue is usually not whether an application is listening on port 68. More likely causes include DHCP broadcasts not reaching the server, incorrect DHCP relay configuration, VLAN mismatch, a rogue DHCP server on the network, or security policy blocking UDP 67/68.
TFTP
TFTP file transfer port commonly used for PXE boot, network device configuration backup, and firmware distribution.
Details
UDP port 69 is the default port for TFTP, or Trivial File Transfer Protocol. TFTP is a very lightweight file transfer protocol commonly used for PXE network boot, switch and router configuration backup, embedded device firmware distribution, diskless boot, automated provisioning, and controlled internal deployment workflows.
TFTP is different from FTP and SFTP. It does not provide complex directory operations, user login, or fine-grained permission models, and the protocol itself does not include encryption. A client usually only requests to read or write a specific file, while the server decides whether to return or accept that file based on its root directory, file permissions, and access rules.
TFTP is useful during device bootstrapping because of its simplicity. For example, after a client obtains an IP address through DHCP, it may use TFTP to download a bootloader, kernel, configuration file, or installation image. This is why UDP 69 often appears together with UDP 67 and UDP 68 in PXE and device provisioning environments.
In production environments, TFTP should be limited to controlled internal, deployment, or management networks. It should not be exposed directly to the public internet, and sensitive configurations, account files, keys, backups, or writable directories should not be placed under a broadly accessible TFTP service, otherwise it may lead to configuration leaks, firmware tampering, or unauthorized file downloads.
HTTP
Default HTTP port commonly used for web entry, HTTPS redirects, health checks, and certificate validation.
Details
TCP port 80 is the default port for HTTP. When a user visits http://example.com without specifying a port, the browser connects to port 80 by default.
In modern production environments, port 80 is usually not used to carry sensitive data such as logins, payments, cookies, tokens, or personal information for long periods. A common pattern is to accept plain HTTP requests on port 80 and redirect them to HTTPS on port 443 using a 301 or 308 redirect.
Port 80 remains widely used because it often serves compatibility and entry-point purposes, including HTTP-to-HTTPS redirects, load balancer health checks, reverse proxy origin traffic, ACME HTTP-01 certificate validation, temporary web services, and internal status pages.
Exposing port 80 to the public internet is not necessarily high risk by itself, but the actual service behind it should be verified. Important checks include whether it exposes admin panels, debug pages, directory listings, unencrypted login forms, internal APIs, default virtual hosts, or framework error pages.
When troubleshooting port 80 access issues, check whether the web service is listening, whether Nginx, Apache, Caddy, or Ingress rules are active, whether firewalls or cloud security groups allow the traffic, whether the load balancer forwards to the correct backend, and whether the site only configured port 443 without keeping an HTTP entry point.
Kerberos
Kerberos TCP authentication port, commonly used for larger tickets, cross-network authentication, domain controller traffic, and Active Directory environments.
Details
TCP port 88 is one of the standard Kerberos authentication ports. It is commonly seen in Active Directory, enterprise single sign-on, domain logon, and service ticket workflows.
Kerberos can use either UDP or TCP. Clients may use UDP in normal cases, but authentication traffic can fall back to TCP 88 when tickets are large, UDP responses are truncated, network policy requires reliable transport, or cross-network authentication is unstable.
In a Windows domain environment, Kerberos does not work in isolation. A full domain logon or service access flow often also depends on DNS, NTP, LDAP, SMB, Global Catalog, and other components, so allowing TCP 88 alone is usually not enough for domain authentication to work correctly.
This port is part of the identity infrastructure and should not be exposed directly to the public internet. Public exposure may enable account enumeration, domain discovery, password spraying, authentication service probing, and reconnaissance useful for later lateral movement.
When troubleshooting Kerberos over TCP, check whether the domain controller is reachable, DNS resolves the correct domain controllers, client and domain controller clocks are synchronized, SPNs are correct, tickets are too large, UDP is being blocked, and related Active Directory ports are allowed by the firewall.
Kerberos
Kerberos UDP authentication port, commonly used for domain logon, TGT acquisition, service ticket requests, and Active Directory authentication.
Details
UDP port 88 is one of the standard Kerberos authentication ports. It is commonly used in Windows Active Directory, enterprise single sign-on, domain logon, and service ticket acquisition flows.
The core idea of Kerberos is that the user password is not sent directly to every service. Instead, the KDC issues tickets: the client first obtains a TGT, then uses service tickets to access file shares, databases, HTTP services, or other Kerberos-enabled systems.
Kerberos is highly time-sensitive. If the client, domain controller, and application server clocks drift too far apart, authentication can fail, which makes NTP or domain time synchronization a critical dependency in Kerberos environments.
UDP 88 is suitable for smaller authentication exchanges, but clients may switch to TCP 88 when tickets are large, group memberships are extensive, responses are truncated, or network devices handle UDP poorly. For authentication failures, both TCP and UDP should be checked.
UDP 88 should not be exposed freely to the public internet. It is an identity infrastructure entry point, and incorrect exposure can increase the attack surface for account enumeration, domain discovery, password spraying, and authentication service scanning.
POP3
Traditional POP3 mail retrieval port, used by clients to download, read, and archive mailbox messages.
Details
TCP port 110 is the traditional POP3 mail retrieval port. After connecting to this port, a mail client can read and download messages from a mailbox server.
POP3 is designed more around “fetching mail to the local device.” Clients can either keep a copy on the server after download or delete messages from the server, which makes it common in single-device mail setups, offline reading, simple archiving, and older mail clients.
If users need read status, folders, drafts, moved messages, and delete actions to stay synchronized across phones, computers, and webmail, IMAP is usually a better fit than POP3. Traditional IMAP uses port 143, while encrypted IMAP commonly uses port 993.
Port 110 usually indicates unencrypted POP3. Usernames, passwords, and message contents may travel in cleartext across the network; production systems that still offer POP3 should prefer POP3S on port 995 or upgrade the port 110 session with STARTTLS.
When troubleshooting mail retrieval failures, distinguish receiving from sending first. POP3 handles receiving mail, while SMTP ports 25, 465, and 587 handle sending; if sending works but receiving fails, check the POP3/POP3S service, account permissions, TLS settings, firewall rules, and mail server logs.
rpcbind / portmapper
Unix RPC port mapping service, used to look up the actual ports registered by NFS, mountd, and other RPC services.
Details
TCP port 111 is commonly used by rpcbind, also known as portmapper. It is not a file transfer service itself; it works as an RPC service directory where clients ask which port a specific RPC program is currently using before connecting to the real service.
Traditional Unix/Linux network services such as NFS, mountd, lockd, and statd often rely on rpcbind to register and discover ports. In NFSv3 environments especially, port 111, port 2049, and several dynamic ports often need to be checked together.
This port is common in Linux/Unix file sharing, NAS devices, backup systems, virtualization platforms, legacy clusters, and internal storage mounts. It is normally an internal infrastructure port, not a public-facing business entry point.
If TCP 111 is exposed to the public internet, external scanners may enumerate the RPC services registered on the host and infer whether NFS, mountd, or other internal services are present. Even when the actual data ports are not exposed, rpcbind can still leak useful service information.
When troubleshooting NFS or RPC access failures, check whether rpcbind is running, whether the service has registered successfully, whether port 2049 is reachable, whether mountd/lockd/statd ports are blocked by a firewall, and whether the server export rules allow the current client.
rpcbind / portmapper
UDP entry point for Unix RPC port mapping, commonly used to discover legacy RPC services such as NFSv3, mountd, lockd, and statd.
Details
UDP port 111 is used by rpcbind or portmapper to help clients discover which port a specific RPC service is currently registered on. It acts more like a service directory for the RPC ecosystem than a direct carrier of files or application data.
In legacy NFS and ONC RPC environments, a client may first query UDP 111 for the program number, version, and port, then connect to the actual data service. Compared with NFSv4, which is more centered around port 2049, NFSv3 often involves additional services such as mountd, lockd, and statd.
UDP 111 should normally appear only on trusted internal networks, storage networks, backup networks, or management networks. It is not suitable for public exposure and should not be reachable from ordinary user-facing traffic paths.
If UDP 111 is exposed to the public internet, attackers may use it to enumerate RPC services, identify NFS or storage components, infer host purpose, and map internal service structure. Because it is UDP-based, it can also attract unwanted scanning, reflection, or abnormal probing traffic.
When troubleshooting legacy NFS mount failures, do not check port 2049 alone. Confirm that rpcbind responds, whether the NFS version is v3, whether dynamic ports such as mountd are fixed and allowed, whether the client source is permitted by exports rules, and whether the firewall allows the related TCP and UDP traffic.
NTP
NTP time synchronization port, used to keep servers, network devices, and endpoints aligned to a reliable system time.
Details
UDP port 123 is the default port for NTP, or Network Time Protocol. It is used by servers, network devices, virtual machines, container hosts, and endpoints to synchronize their clocks with trusted time sources.
Accurate time is a foundation for many system behaviors. TLS certificate validation, log timelines, database replication, distributed locks, scheduled jobs, audit records, monitoring alerts, and incident investigation all depend on stable system time.
In enterprise environments, internal machines usually synchronize with controlled internal time sources, domain controllers, cloud provider time services, or dedicated NTP servers, rather than having every host reach out directly to public time servers.
UDP 123 may be exposed to trusted clients, but an unprotected public NTP service should not be deployed casually. Misconfigured NTP servers have historically been abused for reflection amplification attacks, so public time services should restrict access, disable dangerous legacy queries, and monitor abnormal traffic.
When troubleshooting time synchronization issues, do not only check whether port 123 is open. Confirm whether the host uses chrony, ntpd, systemd-timesyncd, Windows Time, or a cloud provider time service, and also check the upstream source, clock offset, network reachability, and firewall policy.
MS RPC Endpoint Mapper
Windows RPC endpoint mapping port, used to discover the actual dynamic ports for DCOM, WMI, and remote management services.
Details
TCP port 135 is the default port for Microsoft RPC Endpoint Mapper. It acts like a service directory in the Windows RPC ecosystem: a client first connects to port 135 to ask where a specific RPC interface is currently available, then connects to the actual dynamic service port.
Many Windows management capabilities can depend on it indirectly, including DCOM, WMI, remote service management, event log access, some domain administration tools, backup software, and enterprise operations platforms. Port 135 itself is usually not the final business service; it is the discovery entry point for later RPC access.
This port is common in Windows domains, enterprise internal networks, server management networks, and legacy Windows application integrations. It should normally be open only within trusted internal networks or management boundaries, not directly exposed to the public internet.
Public exposure of port 135 is high risk. External scanners may use it to identify Windows RPC capabilities, system roles, and follow-on dynamic RPC services, expanding the remote management attack surface and providing clues for lateral movement.
If WMI, DCOM, or remote management must work across network segments, access should go through VPN, bastion hosts, private links, management networks, or strict firewall allowlists. Related ports such as 139, 445, 3389, and the Windows RPC dynamic port range should be reviewed together.
NetBIOS Name Service
NetBIOS name service port, used in legacy Windows LANs for host name, workgroup, and resource discovery.
Details
UDP port 137 is used by NetBIOS Name Service. It mainly appears in legacy Windows local networks to resolve NetBIOS host names to IP addresses.
In older environments without modern DNS, Active Directory, or centralized name resolution, NetBIOS name service was used to discover workgroups, host names, file sharing servers, and LAN resources. It commonly appears together with UDP 138, TCP 139, and SMB on TCP 445.
UDP 137 may leak host names, workgroup names, domain environment clues, traces of logged-in users, and internal naming conventions. Even though it does not directly serve file contents, this information can help scanners infer Windows asset types and network structure.
This port should normally exist only in controlled internal networks, office networks that must support legacy systems, older NAS devices, printers, or legacy equipment environments. In modern Windows networks that already rely on DNS, Active Directory, and SMB over TCP 445, NetBIOS over TCP/IP can often be disabled or tightly restricted.
If a public scan reports UDP 137 open, first check whether a Windows host, NAS, printer, router, or legacy device has exposed local name service to the internet, then restrict ports 137, 138, and 139 to trusted internal networks at the firewall.
NetBIOS Datagram
NetBIOS datagram service port, used in legacy Windows LANs for broadcast messages, browse lists, and resource announcements.
Details
UDP port 138 is used by NetBIOS Datagram Service. It belongs to the legacy Windows LAN communication model and is mainly used for connectionless datagram messages, workgroup browsing, resource discovery, and local broadcast notifications.
This port usually does not appear in isolation. It commonly appears together with UDP 137 for NetBIOS name service, TCP 139 for NetBIOS session service, and TCP 445 for modern SMB in legacy Windows file sharing environments.
UDP 138 is mainly useful inside controlled local networks. It is not a public application entry point and should not be exposed across the internet. Public exposure may leak host names, workgroups, browse lists, file sharing clues, and Windows network structure information.
Modern Windows file sharing usually relies more on SMB over TCP 445 rather than NetBIOS over TCP/IP. If the environment no longer needs compatibility with legacy systems, older NAS devices, printers, or industrial equipment, NetBIOS over TCP/IP can often be disabled.
If a scan reports UDP 138 exposed to the public internet, check whether a Windows host, NAS, printer, router, or legacy device has accidentally exposed NetBIOS services, and restrict ports 137, 138, and 139 to trusted internal networks at the firewall.
NetBIOS Session
NetBIOS session service port, commonly used for legacy Windows file sharing, printer sharing, and SMB over NetBIOS.
Details
TCP port 139 is used by NetBIOS Session Service. It provides the session channel for legacy Windows network communication and is most commonly associated with SMB over NetBIOS file sharing.
In earlier Windows LANs, UDP 137 handled name resolution, UDP 138 handled datagrams and browse announcements, and TCP 139 established sessions for file sharing communication. In that model, port 139 is often where legacy Windows file sharing begins its real interactive session.
Modern Windows file sharing more commonly uses SMB directly over TCP 445 and no longer has to depend on NetBIOS over TCP/IP. However, port 139 may still appear in environments that must support older systems, older NAS devices, printers, industrial equipment, legacy Windows hosts, or mixed office networks.
Public exposure of TCP 139 is high risk. It may expose file sharing services, host information, legacy authentication surfaces, share enumeration, and protocol compatibility issues. Security scanners often treat ports 139 and 445 together as core Windows file sharing attack surface.
If there is no clear legacy compatibility requirement, disable NetBIOS over TCP/IP or at least restrict ports 137, 138, and 139 to trusted internal networks. If file sharing is still required, review anonymous access, guest accounts, share permissions, NTFS permissions, SMB versions, and patch status.
IMAP
IMAP mail access port, used by clients to synchronize, search, move, and manage mail on the server.
Details
TCP port 143 is the traditional port for IMAP, or Internet Message Access Protocol. After a mail client connects to an IMAP service, it can view, search, move, delete, and organize messages directly on the mail server.
IMAP has a different usage model from POP3. POP3 is more focused on downloading mail to a local device, while IMAP is designed around managing the mailbox on the server, which makes it better suited for phones, desktops, and webmail clients used at the same time.
With IMAP, read state, folders, drafts, sent mail, deletions, and message moves can usually stay synchronized across devices. This is why enterprise mail systems and modern mail clients often prefer IMAP over relying only on POP3.
TCP 143 usually represents the traditional IMAP entry point. It may be used in cleartext, or it may be upgraded to an encrypted connection with STARTTLS. Production environments should not transmit usernames, passwords, or mail contents in cleartext for long-term use; when supported, IMAPS on TCP 993 is usually preferred.
When troubleshooting IMAP issues, distinguish mail retrieval from mail sending first. IMAP is used to read and manage mailboxes, while SMTP ports such as 25, 465, and 587 are used to send mail. If receiving works but sending fails, or the reverse, check IMAP and SMTP services, account permissions, TLS settings, firewall rules, and mail server logs separately.
SNMP
SNMP monitoring query port, used to read the operational status of network devices, servers, and infrastructure components.
Details
UDP port 161 is the standard query port for SNMP, or Simple Network Management Protocol. Monitoring systems commonly use it to read status information from switches, routers, firewalls, servers, UPS units, printers, storage devices, and data center equipment.
SNMP can expose a wide range of information, including interface traffic, port status, CPU, memory, disk usage, temperature, power supplies, fans, error counters, device models, system names, and uptime. This is valuable for operations, but it can also become an asset enumeration and reconnaissance surface for attackers.
SNMP v1 and v2c commonly rely on a community string as the access credential. Default values such as public or private are especially dangerous. If the community string is weak, overly privileged, or reachable from the public internet, outsiders may read extensive internal device information and, in some configurations, even modify device state.
Production environments should prefer SNMPv3 with authentication and encryption enabled. If v1 or v2c must be used, use a strong community string, read-only permissions, source IP allowlists, and restrict access to the monitoring network, management network, or trusted internal network.
If a scan reports UDP 161 exposed to the public internet, first check for accidentally exposed network devices, printers, UPS systems, NAS appliances, or server monitoring agents, then review the community string, ACLs, device firmware version, and firewall rules.
When troubleshooting missing SNMP metrics, do not only check whether port 161 is reachable. Also verify that SNMP is enabled on the device, the SNMP version matches, the community string or SNMPv3 user is correct, the required OIDs and MIBs are supported, and the ACL allows the monitoring server.
SNMP Trap
SNMP Trap receiver port, used by devices to proactively report failures, state changes, and security events.
Details
UDP port 162 is used for SNMP Trap messages. Unlike UDP 161, where the monitoring system actively queries devices, Trap messages are sent proactively by devices to report alerts, state changes, or abnormal events to a monitoring platform.
SNMP Trap is commonly used by network devices, servers, UPS units, storage systems, firewalls, and data center equipment to report events such as interface down/up changes, power failures, high temperature, link instability, disk failures, authentication failures, or device reboots.
Port 162 usually listens on a monitoring platform, Trap receiver, NMS system, or alert gateway rather than on a regular business service. It should only accept Trap messages from trusted devices or controlled network ranges to prevent unrelated sources from forging alerts or flooding the monitoring system with events.
Trap delivery usually uses UDP, so the sender may not know whether the receiver actually processed the message. When troubleshooting missing alerts, do not only check whether the device sent the Trap; also verify the network path, firewall rules, receiver listener state, and parsing rules.
If UDP 162 is exposed to the public internet, external sources may send forged Trap messages, interfere with alert analysis, create noise, or reveal the monitoring entry point. Production environments should restrict source IPs and configure the community, SNMPv3 user, security level, and audit logging according to the SNMP version in use.
When troubleshooting missing Trap messages, verify the Trap destination address on the device, SNMP version, community string or SNMPv3 user, security level, routing, firewall rules, NAT path, and the Trap parsing templates on the monitoring platform.
SNMP Unix Multiplexer
SNMP Unix Multiplexer port, used in some Unix and network device environments for SNMP proxying, multiplexing, or monitoring paths.
Details
TCP port 199 is commonly referred to as the SNMP Unix Multiplexer. Historically, it has been used on Unix systems or some network devices to multiplex, forward, or proxy SNMP-related communication.
It is not as common as UDP 161 for SNMP queries, and it is not the same as UDP 162 for Trap delivery. When TCP 199 is open, treat it as part of a specific implementation, device proxy layer, or older monitoring architecture.
This port may appear on network devices, older Unix systems, vendor monitoring agents, or specialized SNMP proxy paths. It is usually not a general application entry point and should not be treated as a public service port.
Monitoring-related ports can expose device models, interface details, system names, uptime, network structure, and infrastructure status. Even if TCP 199 does not carry business data directly, accidental exposure can help attackers identify assets and infer internal topology.
If a scan reports TCP 199 open, confirm the actual listening process, device model, vendor documentation, whether the environment depends on an SNMP proxy path, and whether access is limited to the monitoring system or management network.
In production, TCP 199 should be governed together with UDP 161 and UDP 162: restrict sources, avoid default credentials, minimize readable information, enable logging, and disable the related service when it is no longer needed.
LDAP
LDAP directory service port, used to query enterprise accounts, groups, organizational structure, and identity directory information.
Details
TCP port 389 is the default port for LDAP, or Lightweight Directory Access Protocol. LDAP is commonly used to access directory services and query user accounts, groups, organizational units, email addresses, device objects, permission attributes, and identity data needed by applications.
LDAP is often part of enterprise identity systems such as Microsoft Active Directory, OpenLDAP, FreeIPA, 389 Directory Server, centralized authentication platforms, and internal application account systems. Applications may use LDAP to look up users, verify accounts, sync org structure, or make access decisions based on group membership.
Port 389 is usually plain LDAP by default, but many environments use StartTLS on this port to upgrade an existing connection to TLS. Another common encrypted option is LDAPS on port 636, where TLS is used from the start of the connection.
LDAP is not a normal public-facing application port. It exposes identity directory and organizational information, and improper exposure can lead to account enumeration, org structure leakage, group membership disclosure, and preparation for password spraying, phishing, or lateral movement.
In production, port 389 should be limited to internal networks, VPNs, identity service segments, or trusted application servers. Anonymous bind should be disabled, bind accounts should follow least privilege, and StartTLS, source restrictions, audit logs, and failed-login monitoring should be enabled where appropriate.
When LDAP authentication fails, common causes include an incorrect bind DN, wrong search base DN, mismatched filter, insufficient account permissions, disabled anonymous bind, StartTLS or certificate misconfiguration, or the application connecting to the wrong domain controller or directory server.
HTTPS
Default encrypted web service port for HTTPS, the most common secure entry point for modern websites, APIs, mobile apps, and SaaS services.
Details
TCP port 443 is the default port for HTTPS. When a user visits https://example.com without specifying a port, the browser connects to port 443 by default.
HTTPS is HTTP protected by TLS. It is used to secure web pages, login sessions, cookies, tokens, payment information, API requests, mobile app traffic, webhooks, admin consoles, and browser-loaded resources.
Port 443 can be used as a public entry point, but security depends on more than simply using HTTPS. Certificate validity, TLS version, HSTS, Secure cookie attributes, and correct forwarding of Host and X-Forwarded-Proto by reverse proxies all affect the real security posture.
In modern architectures, TLS on port 443 is often terminated by Nginx, Apache, Caddy, Envoy, Traefik, an Ingress Controller, a CDN, a cloud load balancer, or an API Gateway before requests are forwarded to backend applications.
Port 443 also carries traffic beyond traditional web pages, such as HTTP/2, WebSocket over TLS, gRPC, REST APIs, GraphQL, OAuth callbacks, SaaS consoles, object storage download links, and mobile application APIs. An open 443 port should not automatically be interpreted as just a website.
When port 443 is unreachable, common causes include an expired certificate, DNS pointing to the wrong address, firewall or security group rules, a misconfigured load balancer listener, SNI mismatch, reverse proxy routing errors, or failed backend health checks.
SMB
Core SMB port for file sharing and Windows network access, commonly used for shared folders, printing, domain environments, and enterprise internal resources.
Details
TCP port 445 is the core port for SMB, or Server Message Block, directly over TCP. It is used by modern Windows file sharing, shared printers, network drives, domain access, Group Policy-related access, and many internal enterprise file services.
Ports 445 and 139 are often confused. Port 139 is the older SMB over NetBIOS session port, while 445 is the modern SMB Direct Hosting port and no longer requires NetBIOS name resolution.
SMB can be used to access shared folders, read and write files, enumerate shares, connect printers, and participate in domain authentication and management workflows. If exposed improperly, the risk is not just a simple file download endpoint, but a major Windows file-sharing and lateral movement surface.
Port 445 has long been a high-priority target for scanners, worms, ransomware, and internal network attacks. Public SMB exposure is usually very high risk, with common issues including weak passwords, incorrect share permissions, old SMB protocol versions, unpatched systems, and misconfigured anonymous access.
Production environments should not expose port 445 directly to the public internet. If cross-site file access is required, safer alternatives usually include VPN, private circuits, zero-trust access, SFTP, HTTPS-based file services, object storage, or private managed file services from cloud providers.
When troubleshooting SMB access, check whether file sharing is enabled on the target host, Windows Firewall rules, both share permissions and NTFS permissions, SMB version compatibility, domain/account membership, and whether port 445 is blocked by an ISP, cloud platform, or security appliance.
SMTPS
SMTP submission over implicit TLS, commonly used by mail clients and business systems to send email over an encrypted connection.
Details
TCP port 465 is commonly used for SMTP over implicit TLS. The client performs a TLS handshake immediately after connecting, then starts the SMTP session inside the encrypted channel.
Ports 465 and 587 are both common for user or application mail submission, but they use different TLS models. Port 465 usually starts with TLS immediately, while port 587 typically starts as SMTP and upgrades the connection with STARTTLS.
Port 465 should not be confused with port 25. Port 25 is primarily used for mail server-to-mail server delivery, while 465 is more commonly used by authenticated clients or applications submitting mail to a mail server.
When troubleshooting failed sending over 465, check that the client is configured for SSL/TLS rather than STARTTLS. Also verify the account password or app-specific password, server certificate, outbound firewall rules, provider login policy, and sending rate limits.
A working 465 connection does not guarantee inbox delivery. Business email delivery also depends on SPF, DKIM, DMARC, bounce handling, sender reputation, message quality, and the recipient side’s anti-spam policy.
IKE
IPsec IKE negotiation port, used to establish security associations between VPN gateways or between clients and gateways.
Details
UDP port 500 is used by IKE, or Internet Key Exchange, and is a key negotiation port for IPsec VPN connections. Peers use IKE to negotiate authentication, encryption algorithms, key material, and security associations before protected IPsec traffic begins.
IKE is common in site-to-site VPNs, remote access VPNs, firewall VPNs, cloud VPN gateways, and encrypted tunnels between routers. It is not a normal web or application endpoint; it is part of the VPN control plane.
UDP port 500 usually appears together with UDP port 4500. Port 500 handles the initial IKE negotiation; if NAT is detected on either side, IPsec commonly switches to NAT Traversal on UDP 4500. L2TP/IPsec deployments may also involve UDP 1701.
When troubleshooting IPsec VPN failures, do not check only whether port 500 is open. Also verify the pre-shared key or certificate, IKEv1/IKEv2 compatibility, cipher suites, DH group, peer address, NAT behavior, and whether port 4500 is reachable as well.
UDP port 500 can be publicly reachable on a VPN gateway, but it represents a security entry point into private networks. Production deployments should use strong pre-shared keys or certificate authentication, restrict allowed peers, log negotiation failures, and monitor unknown sources or repeated negotiation attempts.
LPD / LPR
Legacy network printing port used for LPD/LPR print job submission and print queue handling.
Details
TCP port 515 is used by the LPD/LPR printing protocol. It is commonly found in traditional Unix printing systems, older network printers, print servers, and some office network devices for submitting print jobs and handling print queues.
LPD/LPR predates more modern printing protocols such as IPP. Its feature set is relatively simple and focuses on print job submission, queue handling, and communication with print servers. In modern office environments, IPP on port 631 and vendor-specific printing protocols are often more common.
Printing ports should normally be limited to office networks, print networks, or trusted endpoints. Improper exposure can reveal printer models, queue names, internal hostnames, or allow outsiders to submit unwanted print jobs and consume printing resources.
If port 515 appears in a public scan, confirm whether it is a print server, a network printer, or a legacy compatibility service. In most cases, firewall rules should restrict access rather than exposing printing services directly to untrusted networks.
When troubleshooting printing over port 515, check whether the print service is running, the queue name is correct, the client is allowed to submit jobs, the printer is online, firewall rules allow the traffic, and whether IPP, a vendor driver, or a controlled print server would be more appropriate.
SMTP Submission
SMTP message submission port, commonly used by mail clients, web backends, and business systems to send email with authenticated accounts.
Details
TCP port 587 is the standard message submission port. It is mainly used by mail clients, web backends, application servers, or automation jobs to submit email to their own mail server.
Port 587 has a different role from port 25. Port 25 is mainly used for mail server-to-mail server delivery based on MX records, while 587 is used for user or application submission and usually requires authentication.
Port 587 typically uses STARTTLS. The client starts an SMTP session first, then upgrades the connection to TLS with the STARTTLS command. This differs from port 465, where TLS usually begins immediately after the connection is established.
When troubleshooting sending over 587, check that the client is configured for STARTTLS, the password or app-specific password is correct, the server allows login from the current source, outbound firewall rules allow 587, and the mail provider has not applied rate or login restrictions.
For business systems, port 587 is only the submission entry point. Final inbox delivery also depends on SPF, DKIM, DMARC, bounce handling, sender reputation, message quality, and the recipient side’s anti-spam policy.
LDAPS
LDAP over TLS port, used to encrypt access to enterprise accounts, groups, organizational structure, and identity directory data.
Details
TCP port 636 is the default port for LDAPS, or LDAP over TLS. A client usually establishes a TLS-protected channel first, then performs bind authentication, directory queries, and identity lookups inside that encrypted connection.
LDAPS is common in Active Directory, OpenLDAP, FreeIPA, 389 Directory Server, centralized identity platforms, and internal application account systems. It protects directory information such as user accounts, groups, email addresses, organizational structure, and permission attributes in transit.
Ports 636 and 389 are easy to confuse. Port 389 is the standard LDAP port and can also be upgraded with STARTTLS, while 636 uses TLS from the beginning of the connection, more like the HTTPS connection model.
Even though port 636 uses TLS, it should not be treated as a normal public endpoint. Directory services are part of the identity infrastructure; incorrect exposure can enable account enumeration, organizational data leakage, group discovery, and follow-on attacks such as password spraying, phishing, or lateral movement.
When troubleshooting LDAPS failures, check whether the domain controller or directory server has the correct server certificate installed, the certificate chain is trusted by the client, the certificate name matches the address being used, the application is configured for LDAPS, and firewall rules allow port 636.
DNS over TLS
Default DNS over TLS port, used to encrypt DNS queries with TLS and reduce plaintext observation or tampering on the network path.
Details
TCP port 853 is used for DNS over TLS, usually shortened to DoT. It carries DNS queries inside a TLS-encrypted channel, reducing the chance that DNS traffic can be observed or modified in plaintext by local networks, ISPs, or intermediate devices.
DoT is different from traditional DNS on port 53. DNS on port 53 is usually plaintext over UDP or TCP, while port 853 establishes a TLS connection first and then sends DNS queries and responses inside that encrypted session.
Port 853 is common on public recursive resolvers, enterprise encrypted DNS services, privacy-focused DNS clients, router DNS forwarders, and secure DNS settings on mobile devices. It is mainly used for recursive resolution, not as a normal website API or authoritative DNS zone transfer port.
Enterprise networks need to balance privacy and governance when using DoT. Encrypted DNS protects query contents, but it can also bypass enterprise DNS policy, malicious-domain blocking, internal name resolution, and compliance logging. Many organizations therefore require clients to use approved DoT resolvers.
DoT is often confused with DNS over HTTPS. DoH usually uses port 443 and looks like regular HTTPS traffic, while DoT uses the dedicated port 853, making it easier to identify and manage at the network layer.
When troubleshooting port 853 failures, confirm that the client has actually enabled DNS over TLS, the resolver certificate is trusted, the server name matches the certificate, outbound TCP 853 is allowed, and the firewall is not only permitting traditional DNS on port 53.
rsync
Default rsync daemon port, used for efficient incremental file sync, mirror distribution, backups, and configuration replication.
Details
TCP port 873 is the default port for rsync daemon mode. rsync is designed to transfer only changed data, so it is widely used for Linux/Unix server synchronization, mirror sites, log archiving, configuration distribution, backups, and large incremental file transfers.
rsync has two common operating modes that are easy to confuse. One runs rsync over SSH, which usually uses port 22. The other is rsync daemon mode, where the server listens directly on port 873 and exposes directories through named modules.
An rsync daemon organizes exported directories into one or more modules. Each module can have its own path, read-only or writable policy, authentication, access control, and include/exclude rules. Clients usually access it with addresses like rsync://host/module/path.
Port 873 is useful for controlled synchronization, but it should not be casually exposed to the public internet. Misconfiguration can allow outsiders to enumerate modules, download backup directories, read source code, sync configuration files, or upload unexpected content to writable modules.
If rsync daemon access must be exposed, restrict source addresses, prefer read-only modules, require authentication, avoid anonymous access to sensitive paths, and carefully review backups, keys, environment files, database dumps, historical directories, and writable paths.
When troubleshooting rsync failures, first confirm whether the connection uses SSH mode or daemon mode. SSH mode requires checking port 22, accounts, and keys; daemon mode requires checking port 873, rsyncd.conf, module names, hosts allow/deny rules, filesystem permissions, and firewall policy.
FTPS Data
FTPS implicit TLS data connection port, used to transfer encrypted file contents or directory listings.
Details
TCP port 989 is the data connection port for FTPS in implicit TLS mode, and is usually understood together with port 990. Port 990 handles login, commands, and session control, while 989 is associated with encrypted file contents or directory listings.
FTPS inherits FTP’s split between control connections and data connections. Even when the control channel is protected by TLS, file transfer may still require separate data connections, so firewall, NAT, load balancer, and passive port range settings all affect whether transfers actually work.
Port 989 is easy to confuse with FTP port 20. Port 20 is the traditional plaintext FTP active-mode data port, while 989 belongs to the FTPS implicit TLS data-channel model. Both relate to data transfer, but they have different security assumptions.
In real deployments, many FTPS servers do not rely only on port 989. They often use a configured passive port range for data transfer. If login succeeds but directory listing or file transfer fails, the problem is often the data channel rather than the port 990 control connection.
For production FTPS, define active versus passive mode clearly, fix and restrict the passive port range, use trusted certificates, disable anonymous access, limit account directory permissions, and avoid exposing sensitive file paths to broad source ranges.
FTPS
FTPS implicit TLS control connection port, used for encrypted login, session control, and FTP file operation commands.
Details
TCP port 990 is the control connection port for FTPS in implicit TLS mode. A client connecting to 990 usually performs the TLS handshake first, then enters the FTP control session to send login details, directory commands, and file transfer commands over an encrypted channel.
FTPS and SFTP are not the same protocol. FTPS adds TLS to traditional FTP and keeps the separate control and data connection model. SFTP is a file transfer protocol built on SSH and usually uses port 22.
Port 990 mainly represents implicit FTPS. Another common model is explicit FTPS, where the client first connects to port 21 and then upgrades the session with the AUTH TLS command. Mixing up implicit TLS and explicit TLS often causes handshake failures or rejected connections.
FTPS is safer than plaintext FTP for usernames, passwords, and sensitive files, but it still inherits the complexity of FTP data channels. Actual file contents or directory listings require additional data connections, which may involve port 989 or a passive port range configured on the server.
If FTPS login works but directory listing or file transfer fails, check active versus passive mode, the passive port range, firewall rules, NAT behavior, load balancer handling, TLS certificates, and whether the client correctly supports FTPS data-channel encryption.
For production use, FTPS should use trusted certificates, disable anonymous access, restrict account permissions, define a clear passive port range, and expose only the required ports. For new systems that only need secure file transfer, SFTP, HTTPS upload/download, or object-storage presigned URLs may be easier to operate.
IMAPS
Default IMAP over TLS port, used to securely sync, read, search, and manage mailbox content.
Details
TCP port 993 is the default port for IMAPS, or IMAP over TLS. A client connecting to 993 usually establishes a TLS-encrypted channel first, then logs in to read mail, synchronize folders, search messages, and manage mailbox content.
IMAPS is well suited for multi-device mailbox synchronization. Unlike POP3, which is more focused on downloading mail locally, IMAP keeps mail primarily on the server and synchronizes read state, folders, drafts, sent mail, and move/delete operations across phones, computers, and webmail.
Ports 993 and 143 are easy to confuse. Port 143 is the traditional IMAP port and may be plaintext or upgraded with STARTTLS. Port 993 uses TLS from the beginning of the connection, which is usually the preferred choice for modern mail clients.
Port 993 is for receiving and managing mail, not sending it. User mail submission usually uses port 587 or 465, while server-to-server delivery mainly uses port 25. When troubleshooting “can receive but cannot send” or the reverse, separate IMAP from SMTP first.
Common causes of IMAPS login failure include incorrect mailbox or username format, wrong password or app-specific password, untrusted server certificate, configuring port 993 as STARTTLS instead of implicit TLS, IMAP not being enabled for the mailbox, or a firewall blocking outbound 993.
Production mail services can expose 993 to users, but they should use trusted certificates, strong authentication, login rate limiting, suspicious login monitoring, and account security controls. Mailboxes often contain verification codes, reset links, business notifications, and sensitive attachments, so this port should not be treated as low risk.
POP3S
Default POP3 over TLS port, used to securely download mail from a mailbox.
Details
TCP port 995 is the default port for POP3S, or POP3 over TLS. A client connecting to 995 usually establishes a TLS-encrypted channel first, then logs in and downloads messages from the mailbox.
POP3S is better suited for a “download mail locally” model. Many clients can either keep a copy on the server after download or remove messages from the server, so it is common in single-device mail access, offline archiving, older mail clients, and simple receive-only setups.
The relationship between ports 995 and 110 is similar to the relationship between 993 and 143. Port 995 uses TLS from the start of the connection, while 110 is the traditional POP3 port and may be plaintext or upgraded with STARTTLS when supported.
POP3S and IMAPS are both encrypted mail retrieval ports, but they provide different workflows. Port 995 is more download-oriented, while 993 is better for synchronizing read state, folders, drafts, and server-side mailbox management across multiple devices.
Port 995 is for receiving mail, not sending it. User mail submission usually uses port 587 or 465, while server-to-server delivery mainly uses port 25. Troubleshooting should treat POP3S, IMAPS, and SMTP as separate paths.
Common causes of POP3S login failure include POP3 not being enabled for the mailbox, the wrong port or encryption mode, username format mismatch, wrong password or app-specific password, untrusted server certificate, or a firewall blocking outbound 995.
Registered
SOCKS Proxy
Common SOCKS proxy port, used to relay TCP connections, proxy client traffic, and reach controlled network resources.
Details
TCP port 1080 is the most common port for SOCKS proxies. A SOCKS proxy can relay connections from a client to target servers, and is often used for browser proxying, development debugging, internal network access, traffic forwarding, crawler proxy pools, and remote access support.
A SOCKS proxy is not a normal web service. It usually does not care about HTTP paths or page content; it acts as a general-purpose connection relay that can help clients reach other hosts and ports.
The risk of port 1080 depends on authentication, source restrictions, and the allowed destination scope. Without authentication or access control, outsiders may use it as an open proxy, causing traffic abuse, spam requests, scanning activity, IP blocklisting, polluted logs, and compliance issues.
The risk is even higher if the SOCKS proxy can reach internal addresses. An attacker may use it to probe internal services, bypass egress controls, hide the real source, or access resources that were only meant to be reachable from the proxy server.
Production deployments should restrict source addresses, require authentication, avoid allowing arbitrary destinations, keep access logs, and regularly check for open-proxy behavior, weak credentials, default configurations, or abnormal abuse traffic.
When investigating port 1080, confirm whether it is really a SOCKS4/SOCKS5 proxy or another application reusing the port. Also check proxy accounts, ACLs, allowed destinations, CONNECT policy, firewall rules, and client proxy configuration.
OpenVPN
Common default OpenVPN UDP port, used for remote access, site-to-site connectivity, and encrypted VPN tunnels.
Details
UDP port 1194 is the common default port for OpenVPN. OpenVPN is a TLS-based VPN solution used for remote work access, site-to-site connectivity, cloud private network access, development and test environment entry points, and internal enterprise resource access.
OpenVPN commonly uses certificates for identity verification. The client and server negotiate cryptographic parameters through a TLS handshake, then create a virtual network tunnel that connects a user device or remote network to a controlled private network.
OpenVPN uses UDP by default because the VPN tunnel itself may carry TCP, UDP, and other application traffic. Running the whole tunnel over TCP can cause TCP-over-TCP performance problems under packet loss. OpenVPN can still be configured over TCP, and listening on 443 is a common choice for restricted networks.
Exposing OpenVPN to the public internet is common, but it is still an entry point into a private network. Production deployments should use strong certificate and key management, promptly revoke certificates for departed users or lost devices, restrict allowed sources, log connections, and monitor suspicious logins, repeated handshakes, and unknown client attempts.
OpenVPN connectivity depends on more than whether 1194 is open. Check the client profile, CA certificate, client certificate, private key, tls-auth or tls-crypt settings, username/password flow, pushed routes, server forwarding rules, and routes from the client to the intended internal networks.
OpenVPN is often compared with IPsec/IKE on ports 500 and 4500, and WireGuard on 51820. OpenVPN has a mature ecosystem and broad compatibility; WireGuard is simpler and often faster; IPsec is common between firewalls, routers, and cloud VPN gateways.
Microsoft SQL Server
Default Microsoft SQL Server connection port, used by applications, clients, and administration tools to access SQL Server databases.
Details
TCP port 1433 is the most common connection port for a default Microsoft SQL Server instance. Application services, SQL Server Management Studio, reporting systems, ETL tools, synchronization jobs, and business backends commonly use it to connect to SQL Server.
SQL Server distinguishes between default instances and named instances. A default instance commonly uses 1433, while named instances may use dynamic ports and rely on the SQL Server Browser service on UDP 1434 to help clients discover the actual port.
Port 1433 is a high-value database entry point and is heavily scanned on the internet. When exposed directly, attackers commonly try version probing, weak passwords, default accounts, brute force attempts, unpatched vulnerabilities, and misconfiguration abuse.
Production databases should usually not expose 1433 directly to the public internet. A safer pattern is to allow application servers to connect over an internal network, VPC, private link, VPN, bastion host, or controlled database management network.
Common causes of SQL Server connection failures include the service not running, TCP/IP not being enabled, the instance not listening on 1433, firewall or cloud security group rules blocking access, incorrect connection strings, authentication mode mismatch, insufficient account permissions, or mismatched client encryption requirements and server certificate configuration.
If SQL Server must be reachable across networks, use at least source IP allowlists, strong passwords or integrated authentication, least-privilege accounts, TLS encryption, audit logs, failed-login monitoring, and tested backup and recovery processes. Changing 1433 to another port does not meaningfully solve database exposure risk.
SQL Server Browser
SQL Server Browser discovery port, used to resolve SQL Server named instances to their actual listening ports.
Details
UDP port 1434 is commonly used by the SQL Server Browser service. It does not carry database queries itself; instead, it helps clients discover which TCP port a SQL Server named instance is currently listening on.
A default SQL Server instance commonly uses TCP 1433, while named instances may use dynamic ports. When a client only knows the server name and instance name, it may query UDP 1434 first to obtain the actual connection port.
Port 1434 can expose SQL Server discovery information, such as available instances, instance names, and connection hints. Even though it cannot execute SQL queries directly, public exposure helps scanners and attackers identify database assets.
Production environments should usually restrict 1434 to internal networks, VPCs, database management networks, or trusted application subnets. If named instances can use fixed ports and the connection string specifies the port explicitly, many deployments do not need to expose SQL Server Browser to clients.
When troubleshooting named-instance connection failures, check whether SQL Server Browser is running, whether UDP 1434 is blocked by a firewall, whether TCP/IP is enabled for the instance, whether the dynamic port changed, whether the client connection string is correct, and whether the real data port is reachable.
Oracle Database
Common default Oracle Database Listener port, used by clients, application servers, and administration tools to reach Oracle database services.
Details
TCP port 1521 is the most common default port for the Oracle Database Listener. Oracle clients, application servers, reporting systems, ETL tools, synchronization jobs, and DBA tools commonly use the Listener to locate and connect to a specific database service.
The Oracle Listener does more than simply open a database port. A client connection includes a service name, SID, or connect descriptor, and the Listener uses its configuration to hand the connection off to the appropriate database instance or service.
Port 1521 is a high-value database entry point and carries significant risk when exposed to the public internet. Attackers may try to enumerate service names, probe Oracle versions, brute-force accounts, exploit historical vulnerabilities, or look for weak credentials and default configurations.
Production databases should generally not expose 1521 directly to the internet. A safer pattern is to allow access only from application servers, bastion hosts, VPNs, private networks, dedicated links, or database management networks, combined with least-privilege accounts, audit logging, and source restrictions.
Common Oracle connection failures include the Listener not running, database services not being registered with the Listener, incorrect connect strings, confusion between service name and SID, firewall or security group blocks, incompatible client drivers, locked accounts, or the database only listening on localhost or an internal address.
If Oracle must be accessed across networks, use source IP allowlists, strong authentication, TLS/TCPS, audit logs, failed-login monitoring, and tested backup and recovery processes. Simply changing the default port does not meaningfully reduce database exposure risk.
L2TP
L2TP tunneling port, commonly paired with IPsec for traditional remote-access VPN deployments.
Details
UDP port 1701 is used by L2TP, or Layer 2 Tunneling Protocol. It primarily establishes a layer-2 tunnel by encapsulating PPP sessions in UDP, and is common in traditional remote-access VPNs, router VPNs, and legacy compatibility scenarios.
L2TP does not provide strong encryption by itself. In production, it is commonly deployed as L2TP/IPsec: IPsec handles authentication, encryption, and key negotiation, while L2TP handles the tunnel encapsulation. Opening 1701 alone does not make the VPN secure; IPsec must also be configured correctly.
L2TP/IPsec commonly involves UDP 500, UDP 4500, and UDP 1701. Port 500 is used for IKE negotiation, 4500 is used for NAT-T so IPsec can traverse NAT, and 1701 carries the L2TP tunnel itself.
Common causes of L2TP VPN failures include mismatched pre-shared keys, failed account authentication, incompatible IKE policies, NAT-T not taking effect, firewalls allowing 1701 but blocking 500 or 4500, or the client network blocking IPsec-related traffic.
L2TP/IPsec still appears in built-in Windows, macOS, and iOS VPN clients, routers, and older enterprise networks, but new deployments are often replaced by OpenVPN, WireGuard, IKEv2, or zero-trust access solutions.
Public exposure of 1701 should be limited to deliberate VPN gateway use cases, with strong authentication, source restrictions, audit logs, and abnormal-connection monitoring. It should not be treated as a generic low-risk UDP service.
PPTP
PPTP VPN control port, mainly used for legacy VPN compatibility and not recommended for new sensitive deployments.
Details
TCP port 1723 is used for the PPTP control connection. PPTP is an older VPN protocol that became common because it was simple to configure and widely supported by Windows, routers, and legacy enterprise networks.
PPTP depends on more than port 1723. Its control channel uses TCP 1723, but tunnel data usually uses the GRE protocol rather than a normal TCP or UDP port. Allowing 1723 alone may still not make PPTP work; firewalls, NAT devices, or carriers must also allow GRE.
From a modern security perspective, PPTP is no longer suitable for sensitive workloads. Its common authentication and encryption combinations have known historical weaknesses, and many organizations have replaced it with L2TP/IPsec, OpenVPN, WireGuard, IKEv2, or zero-trust access.
If a public scan finds 1723 open, confirm whether real business still depends on PPTP. If it is only a legacy leftover, it should be disabled. If it must remain temporarily, restrict source addresses, enforce strong account policy, and plan migration to a more secure VPN option.
Common causes of PPTP connection failures include GRE being blocked, NAT devices not supporting PPTP passthrough, account authentication failures, server policy disabling legacy protocols, firewalls allowing only TCP 1723, or a client network that does not permit this tunnel traffic.
MQTT
Plaintext MQTT messaging port, commonly used for IoT devices, edge gateways, and lightweight publish/subscribe communication.
Details
TCP port 1883 is the default plaintext port for MQTT. MQTT is a lightweight publish/subscribe protocol often used by IoT devices, sensors, edge gateways, connected vehicles, smart home systems, industrial telemetry, and low-bandwidth networks.
MQTT works differently from ordinary HTTP. Clients do not simply request an endpoint; they connect to a broker and publish or subscribe to topics. For example, a device may publish temperature readings to sensors/room1/temperature, while backend systems subscribe to that topic for processing.
Port 1883 is usually unencrypted, which means usernames, passwords, topics, and message payloads may be visible on the network path. Across the public internet, mobile networks, carrier networks, or untrusted links, MQTT over TLS on port 8883 is usually the safer choice.
MQTT security is not just about whether the port is reachable. The key controls are broker authentication, whether anonymous connections are allowed, whether ACLs restrict topic reads and writes, whether device credentials can be rotated, and whether clients can subscribe to wildcard topics they should not see.
If an MQTT broker is exposed incorrectly, attackers may read device data, forge control commands, enumerate topics, consume broker resources, or use weak credentials to join the device messaging path.
When troubleshooting MQTT connection failures, check whether the broker is listening on 1883, whether the firewall allows access, whether the client protocol version matches, whether credentials are correct, whether the clientId conflicts, whether ACLs deny subscribe or publish operations, and whether QoS, keepalive, and last-will settings are consistent.
NFS
Core NFS port used to mount remote directories in Unix/Linux, NAS, virtualization, and cluster environments.
Details
TCP port 2049 is the core port for NFS, or Network File System. NFS behaves more like mounting a remote directory as a local filesystem than performing one-time uploads or downloads, and is common on Unix/Linux servers, NAS devices, virtualization platforms, Kubernetes storage, backup systems, and compute clusters.
NFSv4 is usually centered around port 2049, while older NFSv3 environments may also depend on rpcbind on port 111, plus mountd, lockd, statd, and other dynamic or additional ports. When troubleshooting mount failures, first confirm whether the environment uses NFSv3 or NFSv4.
Port 2049 is a high-value file-access entry point and should not be exposed directly to the public internet. Misconfiguration can allow outsiders to enumerate exports, read shared files, write or modify data, or access backups, configuration files, source code, logs, or application data directories.
NFS security depends on more than whether the port is open. Review export rules, client source restrictions, read/write permissions, root_squash or no_root_squash, filesystem permissions, Kerberos configuration, and mount options. Many incidents come from overly broad export paths or client network ranges.
In production, NFS should be limited to trusted internal networks, storage networks, VPCs, or cluster networks. For cross-network file sharing, prefer VPNs, dedicated links, private connectivity, object storage, SFTP, or controlled file services over public NFS exposure.
When NFS cannot mount, check whether 2049 is reachable, whether rpcbind is running, whether the exported path exists, whether the client IP is allowed, whether the NFS version matches, whether security groups and host firewalls allow the traffic, and whether the server export rules are correct.
Cloudflare HTTP
Non-standard HTTP port supported by Cloudflare proxying, often used for proxied plaintext web services or alternate entry points.
Details
TCP port 2052 is one of the HTTP ports supported by Cloudflare proxying. It is often used when port 80 is unavailable, when multiple web entry points are needed, or when a non-standard HTTP service is placed behind Cloudflare.
Port 2052 itself is a plaintext HTTP port and is not the same as HTTPS. The user-to-Cloudflare connection may use HTTPS, but whether Cloudflare-to-origin traffic is encrypted depends on the origin configuration, SSL/TLS mode, and actual origin protocol.
This port can carry normal web pages, APIs, or HTTP services behind a proxy, but it should not directly expose admin panels, debug consoles, unauthenticated internal systems, or sensitive control planes. Cloudflare support for the port does not mean the origin should be open to every source.
If the origin exposes 2052 publicly, restrict access to Cloudflare origin IPs or controlled networks, and verify Host handling, origin protocol, access control, logging, rate limits, and application authentication.
When troubleshooting 2052 access issues, confirm that the DNS record is proxied through Cloudflare, that the origin is actually listening on 2052, that Cloudflare supports the chosen port, that the origin protocol matches the configuration, and that the origin firewall allows Cloudflare nodes.
Cloudflare HTTPS
Non-standard HTTPS port supported by Cloudflare proxying, often used for proxied encrypted web services or alternate API entry points.
Details
TCP port 2053 is one of the HTTPS ports supported by Cloudflare proxying. It is commonly used for non-standard HTTPS web services, alternate site entry points, APIs, or encrypted access paths that need to avoid port 443.
Port 2053 usually means the origin is also serving TLS. When using it, verify that the origin certificate, SNI, Cloudflare SSL/TLS mode, origin protocol, and application listener are consistent; otherwise, 525 errors, 526 errors, TLS handshake failures, or origin errors are common.
Like 443, 2053 can carry websites, APIs, WebSocket over TLS, or console entry points. If the service behind it is an admin system, management panel, debug service, or internal application, Cloudflare proxying alone is not enough; pair it with Access, identity checks, source restrictions, and origin firewall rules.
In production, avoid letting origin port 2053 accept arbitrary public sources. A safer pattern is to allow only Cloudflare origin IPs, controlled gateways, or trusted management networks.
When troubleshooting 2053, check the browser-to-Cloudflare certificate, the Cloudflare-to-origin certificate, whether the origin listens on 2053, whether DNS proxying is enabled, and whether origin access is properly restricted.
cPanel / Cloudflare HTTP
Common plaintext cPanel management port, also an HTTP port supported by Cloudflare proxying.
Details
TCP port 2082 is commonly used as the plaintext web management entry point for cPanel. cPanel manages sites, domains, databases, email, files, certificates, and hosting configuration, so it should be treated as a privileged management plane rather than an ordinary content page.
Port 2082 is also one of the HTTP ports supported by Cloudflare proxying, but that does not make it appropriate for unrestricted public access. If it is serving cPanel, a compromised account may affect site files, mailboxes, databases, DNS, certificates, and backups.
Because 2082 is plaintext, it is not suitable for real management logins. If cPanel access is required in production, HTTPS on 2083 is preferable, combined with strong passwords, MFA, login restrictions, IP allowlists, and audit logs.
If a scan finds 2082 open, first confirm whether it is actually cPanel, a normal HTTP service proxied through Cloudflare, or another application reusing the port. Do not treat it as a normal public web port just because Cloudflare supports it.
A good default is to close 2082 or force it to redirect to 2083. If it must remain temporarily, place it behind a VPN, bastion host, trusted management addresses, or Cloudflare Access, and check for default accounts, weak passwords, and brute-force exposure.
cPanel SSL / Cloudflare HTTPS
HTTPS cPanel management port, also an HTTPS port supported by Cloudflare proxying.
Details
TCP port 2083 is commonly used as the HTTPS management entry point for cPanel. Administrators or site users can use it to manage site files, domains, databases, mailboxes, certificates, backups, and hosting-related configuration.
Ports 2083 and 2082 are often confused: 2082 is usually the plaintext cPanel entry point, while 2083 is cPanel over TLS. If cPanel must be exposed in production, prefer 2083 and close or restrict 2082 whenever possible.
Port 2083 is also one of the HTTPS ports supported by Cloudflare proxying. Cloudflare support does not mean the port can be exposed without controls; if it fronts a hosting management panel, it should be handled as a high-privilege admin interface.
A compromised cPanel entry point can affect more than a web account. It may expose or allow control over site files, databases, email accounts, DNS, SSL certificates, and backups. Enable MFA, strong passwords, login failure limits, IP allowlists, login notifications, and audit logging.
When troubleshooting 2083 access issues, confirm that the service is actually cPanel, that the certificate is correct, that Cloudflare proxying is configured as intended, that the origin allows Cloudflare traffic, that the host firewall permits the port, and that cPanel security policies are not blocking the login source.
WHM / Cloudflare HTTP
Plaintext WHM management port, also a non-standard HTTP port supported by Cloudflare proxying.
Details
TCP port 2086 is commonly used as the plaintext management entry point for WHM, or WebHost Manager. WHM is usually used for server-level hosting administration, including multiple cPanel accounts, hosting packages, domains, service status, security policies, and server resources.
Port 2086 usually has a higher privilege level than a normal cPanel user entry point. cPanel focuses on a single site account, while WHM may control an entire server or multiple tenant accounts, so it should be treated as a privileged control plane.
Port 2086 is also one of the HTTP ports supported by Cloudflare proxying, but Cloudflare support does not make it safe for unrestricted public access. If it serves WHM, it should not be handled like an ordinary public web page.
Because 2086 is a plaintext HTTP entry point, production environments should prefer 2087, the HTTPS WHM port. If 2086 must remain temporarily, place it behind a VPN, bastion host, trusted management IPs, or Cloudflare Access.
When reviewing 2086, confirm whether the listening service is really WHM, check for default accounts, weak passwords, brute-force exposure, direct origin exposure, missing Cloudflare origin restrictions, and whether the plaintext entry point can be disabled or redirected to the encrypted one.
WHM SSL / Cloudflare HTTPS
HTTPS WHM management port for high-privilege server hosting and multi-account administration.
Details
TCP port 2087 is commonly used as the HTTPS management entry point for WHM. WHM provides server-level hosting administration, including creating and managing cPanel accounts, adjusting service configuration, handling DNS, reviewing resources, managing certificates, and controlling multi-site hosting environments.
Ports 2087 and 2086 relate much like HTTPS and HTTP: 2087 uses TLS from the start, while 2086 is plaintext. Because WHM is highly privileged, production environments should prefer 2087 and close or tightly restrict 2086.
Port 2087 is also one of the HTTPS ports supported by Cloudflare proxying. When using Cloudflare, verify that the origin certificate, SSL/TLS mode, SNI, origin port, and access controls are consistent to avoid handshake failures, origin errors, or accidental management-panel exposure.
Even though 2087 uses HTTPS, it remains a high-risk management entry point. Enable MFA, strong password policies, login failure limits, IP allowlists, audit logs, login notifications, and timely patching.
When troubleshooting 2087, check whether WHM is running, whether the host firewall allows the port, whether Cloudflare proxy settings match the origin, whether the origin certificate is valid, and whether cPHulk or another security policy is blocking the login source.
Webmail / Cloudflare HTTP
Plaintext Webmail login port, also a non-standard HTTP port supported by Cloudflare proxying.
Details
TCP port 2095 is commonly used as the plaintext entry point for cPanel Webmail. Users can log in through a browser to read mail, send messages, manage folders, and adjust basic mailbox settings.
Port 2095 is a plaintext HTTP entry point and is not suitable for real mailbox logins. Mailbox credentials, session cookies, message bodies, and attachments are sensitive, and plaintext access increases the risk of credential or content interception.
Port 2095 is also one of the HTTP ports supported by Cloudflare proxying, but that does not make it appropriate as an exposed public login surface. Webmail is an account entry point and should be protected with TLS, strong passwords, MFA, login rate limits, suspicious-login alerts, and brute-force protection.
Production environments should prefer 2096 or a standard HTTPS entry point on 443 for Webmail, while closing 2095, restricting it, or forcing it to redirect to the encrypted entry point.
If a scan finds 2095 open, confirm whether plaintext login is still allowed, whether Cloudflare or a reverse proxy protects it, whether weak-password or credential-stuffing risk exists, and whether access can be moved to 2096.
Webmail SSL / Cloudflare HTTPS
HTTPS Webmail login port for encrypted browser access to mailboxes.
Details
TCP port 2096 is commonly used as the HTTPS entry point for cPanel Webmail. Users can access mailboxes through a browser to read messages, send mail, manage folders, download attachments, and adjust basic mailbox settings.
Ports 2096 and 2095 are a matching pair: 2095 is typically plaintext Webmail, while 2096 is encrypted Webmail. Production environments should prefer 2096 and redirect 2095 to HTTPS or restrict it whenever possible.
Port 2096 is also one of the HTTPS ports supported by Cloudflare proxying. When using a proxy, verify the TLS mode from Cloudflare to the origin, the origin certificate, Host header handling, Webmail login callbacks, and Cookie security attributes.
Webmail is a direct mailbox account entry point. Even with HTTPS, it should be paired with strong passwords, MFA, login failure limits, suspicious-login alerts, session timeouts, and anti-spam or anti-phishing controls.
When troubleshooting 2096 login failures, check certificates, Cloudflare origin settings, Webmail service health, account password or authorization policy, mailbox quota, login source restrictions, and whether browser Cookie or SameSite settings are breaking the session.
ZooKeeper
ZooKeeper client connection port for distributed coordination, service discovery, configuration, and cluster metadata management.
Details
TCP port 2181 is the default client connection port for Apache ZooKeeper. ZooKeeper is a distributed coordination service used for service discovery, configuration management, distributed locks, leader election, cluster metadata, and state coordination.
Older Kafka architectures, HBase, SolrCloud, Dubbo, Storm, early Flink deployments, and some custom distributed systems may depend on ZooKeeper. Clients connecting to 2181 can read or write znodes, watch configuration changes, and participate in coordination logic.
ZooKeeper data is often not ordinary business data, but it may define the control-plane state of an entire cluster. Incorrect znode changes, metadata deletion, overly broad ACLs, or untrusted client access can cause service discovery failures, configuration drift, cluster outages, or incorrect leader/follower decisions.
Port 2181 should normally be open only inside application networks, cluster networks, or management networks. It should not be exposed to the public internet or allow untrusted clients to read and write freely. Production environments should use authentication, ACLs, source restrictions, audit logs, and avoid overly broad permissions such as world:anyone.
ZooKeeper clusters also commonly use 2888 for follower-to-leader communication and 3888 for leader election. When troubleshooting, distinguish the client port 2181 from internal cluster ports.
If systems depending on ZooKeeper show connection failures, session expiration, election instability, or configuration inconsistency, check ensemble health, ACLs, disk latency, GC pauses, tickTime, session timeout, network partitions, and connectivity between peer ports.
SSH Alternate
Common alternate SSH port used for bastion hosts, container SSH, Git services, or environment separation.
Details
TCP port 2222 is commonly used as an alternate SSH port. It may appear on bastion hosts, development machines, container SSH endpoints, self-hosted Git services, code hosting platforms, or remote-login entry points separated by environment.
Moving SSH from 22 to 2222 does not make the service inherently secure. It can reduce some default-port scanning noise, but real security still depends on key-based authentication, disabling weak passwords, source restrictions, MFA, bastion access, audit logs, and least-privilege accounts.
Do not downgrade the risk just because 2222 is a non-standard port. If the service behind it is SSH, treat it as a remote administration entry point, especially checking root login, password login, empty passwords, stale keys, and account reuse.
If 2222 must be exposed in production, restrict source IPs or place it behind a VPN, bastion host, or zero-trust access layer, and keep login auditing, failed-login alerts, and key rotation in place.
When troubleshooting, check sshd listener configuration, cloud security groups, host firewalls, container port mappings, Git service settings, client port parameters, and whether the user’s network blocks outbound SSH.
Telnet Alternate
Common alternate Telnet port often seen on legacy network devices, embedded systems, IoT devices, and test environments.
Details
TCP port 2323 is commonly used as an alternate Telnet port. It often appears on legacy routers, cameras, industrial control devices, embedded systems, lab environments, vendor debug interfaces, or devices that preserve older management methods.
Port 2323 is not safer than port 23. If the service behind it is Telnet, usernames, passwords, commands, and responses may still be transmitted in plaintext and can be captured or observed on untrusted networks.
Many IoT worms and scanners look for Telnet on both 23 and 2323, trying default accounts, weak passwords, vendor backdoors, or old firmware vulnerabilities.
If 2323 is found exposed to the public internet, first confirm the device type, firmware version, default accounts, management boundary, and whether Telnet can be disabled or replaced with SSH.
Production environments should not expose Telnet-style access to the public internet. If it cannot be removed immediately, restrict it to a management network, VPN, or trusted sources, and check for default passwords, anonymous access, and debug mode.
Docker API
Unencrypted Docker Remote API port; exposure is often equivalent to opening a high-privilege host control interface.
Details
TCP port 2375 is commonly used for unencrypted Docker Remote API access. If the Docker daemon listens on this port, remote clients can use the HTTP API to manage images, containers, networks, volumes, and some host-related resources.
Port 2375 is extremely risky because it usually lacks TLS and is often misconfigured without authentication. Anyone who can access the Docker API may be able to create privileged containers, mount host directories, read sensitive files, write scheduled tasks, or indirectly gain control of the host.
This port should not appear on public assets and should not be broadly reachable even inside a normal internal network. Even in development, an unencrypted Docker API can be abused by other machines on the same network, malicious containers, CI jobs, or compromised applications.
If remote Docker management is truly required, safer options include using Docker context over SSH, enabling mutual TLS on 2376, or managing workloads through controlled orchestration systems such as Kubernetes, Nomad, or CI/CD platforms.
If 2375 is found open, immediately review dockerd startup flags, daemon.json, systemd overrides, container platform settings, and security group rules. If it was exposed to an untrusted network, also investigate unexpected containers, images, mounted volumes, host file changes, and access logs.
Docker API TLS
TLS-enabled Docker Remote API port used for controlled remote management of the Docker daemon.
Details
TCP port 2376 is commonly used for the TLS-enabled Docker Remote API. Like 2375, it can remotely manage the Docker daemon, but it usually requires client and server certificates for encryption and identity verification.
Port 2376 is safer than unencrypted 2375, but it is still a high-privilege management interface. A user with a valid client certificate can typically create containers, pull images, mount volumes, modify networks, and influence the host security boundary through container capabilities.
In production, 2376 should be exposed only to controlled management networks, CI/CD systems, bastion hosts, or explicitly authorized operations nodes. Client certificates should be protected, rotated regularly, and revoked when employees leave, devices are lost, or pipelines leak credentials.
Many environments do not need to expose the Docker Remote API directly. Managing Docker over SSH, using Kubernetes or Nomad, or running builds and deployments through controlled CI runners is usually easier to audit and isolate.
When troubleshooting 2376, check whether dockerd has tlsverify enabled, whether server and client certificates match, whether certificate CN/SAN values cover the access address, whether firewalls allow the port, and whether DOCKER_HOST, DOCKER_TLS_VERIFY, and DOCKER_CERT_PATH are configured correctly on the client.
etcd Client
etcd client API port and a critical entry point for Kubernetes control-plane state, configuration, and metadata.
Details
TCP port 2379 is the common client API port for etcd. etcd is a distributed key-value store that usually holds Kubernetes cluster state, object metadata, configuration, leases, control-plane coordination data, and references to some sensitive data.
The Kubernetes API Server accesses etcd through 2379. Regular business applications should normally not connect directly to etcd; they should interact with cluster state through the Kubernetes API, controllers, or platform interfaces.
Port 2379 is one of the most sensitive ports in the Kubernetes control plane. If exposed incorrectly, attackers may read cluster objects, service discovery information, and configuration data, or even modify cluster state if authentication and TLS are misconfigured.
Production etcd should use TLS, client certificate authentication, minimized source access, and allow only the API Server, backup jobs, and a small number of controlled management components. Do not expose the etcd client port to nodes, Pod networks, office networks, or the public internet.
When troubleshooting etcd access, check certificate expiration, client certificate permissions, endpoint consistency, quorum health, disk latency, snapshot backups, and whether firewalls allow 2379 only from control-plane components.
etcd Peer
etcd peer communication port used for Raft replication, leader election, and consistency maintenance.
Details
TCP port 2380 is the common peer communication port for etcd. It is mainly used between etcd cluster members for Raft log replication, leader election, member state synchronization, and consistency maintenance.
Port 2380 has a different role from 2379: 2379 is the client API port, usually accessed by the Kubernetes API Server, backup jobs, or management tools; 2380 is the internal communication port between etcd nodes.
If 2380 is blocked, has high latency, or has certificate misconfiguration, the etcd cluster may suffer from unreachable members, failed elections, unavailable writes, quorum loss, and broader Kubernetes control-plane instability.
This port should not be exposed to the public internet, office networks, Pod networks, or ordinary node networks. In production, allow communication only between real etcd members, and pair it with peer TLS certificates, member-list management, firewall rules, and network isolation.
When troubleshooting 2380, check peer URLs, certificate SAN values, node time synchronization, DNS or hostname resolution, network latency, disk I/O, the member list, Raft logs, and firewall policy. Simple port reachability is usually not enough to prove the etcd cluster is healthy.
Oracle TCPS
TLS-encrypted Oracle Database connection port used for secure database access over TCPS.
Details
TCP port 2484 is commonly used for Oracle Database TCPS, which is Oracle Net over TLS. It is used to establish encrypted database connections between clients, application servers, and the Oracle Listener.
Port 2484 is often understood together with 1521: 1521 is the common default Oracle Listener port, while 2484 is more common when TLS-protected database access is enabled. When troubleshooting, verify the connection string, service name, SID, wallet, certificate chain, and listener configuration.
TCPS protects the transport path, but it does not mean the database entry point can be exposed to every public source. Database ports remain high-value asset entry points, and incorrect exposure may lead to password attacks, service enumeration, version probing, weak-permission access, or data leakage.
Production environments should access 2484 through internal networks, VPCs, VPNs, private connectivity, bastion hosts, or controlled application servers, along with source restrictions, least-privilege accounts, strong authentication, audit logs, failed-login monitoring, and certificate lifecycle management.
When troubleshooting 2484 connection failures, check whether the client is connecting with TCPS, whether the wallet and trust chain are correct, whether the certificate name matches the access address, whether the listener has TCPS enabled, whether the database service is registered, and whether firewalls or security groups allow the connection.
ZooKeeper Follower
Internal ZooKeeper follower-to-leader communication port used for data synchronization and state replication.
Details
TCP port 2888 is commonly used for internal communication between ZooKeeper followers and the leader. It is not the client access port for ZooKeeper; clients usually connect to 2181.
In a ZooKeeper ensemble, 2888 is used for node-to-node replication, state synchronization, and normal follower-to-leader communication, while 3888 is commonly used for leader election. Both are internal cluster ports and should not be confused with the client port.
If 2888 is blocked by a firewall, affected by DNS resolution issues, or exposed to high inter-node latency, ZooKeeper nodes may fail to join the cluster correctly, and dependent systems such as Kafka, HBase, SolrCloud, Dubbo, or other distributed systems may become unstable.
Production environments should allow 2888 only between ZooKeeper cluster members. It should not be open to the public internet, general application networks, or unrelated hosts. For cross-datacenter or cross-VPC deployments, use explicit security groups, firewall rules, and private networking to control access.
When troubleshooting 2888, check the server list in zoo.cfg, hostname resolution, inter-node networking, myid values, disk latency, JVM health, version compatibility, and whether 2181, 2888, and 3888 are allowed according to their respective roles.
Node.js / Grafana Dev
Common port for web apps, frontend development servers, and Grafana; the real purpose depends on the listening process.
Details
TCP port 3000 is very common in development, testing, and monitoring environments. Node.js, Express, Next.js, React/Vite dev servers, NestJS, local mock services, internal tools, and Grafana may all listen on this port.
Port 3000 does not have one fixed meaning. It may be a temporary development server, a production Grafana dashboard, an internal admin page, an API service, or an entry point mapped from a container, so the service type should not be inferred from the port number alone.
If the service is Grafana, focus on authentication, anonymous access, data-source permissions, dashboard content, and query permissions. Grafana can expose hostnames, metric labels, service topology, PromQL queries, and internal system state.
If the service is a frontend or Node.js development server, it usually should not be exposed directly to the public internet. Development services may include hot-reload endpoints, source paths, detailed error stacks, test configuration, loose proxy rules, or incomplete authentication logic.
When investigating port 3000, check the actual listening process, container port mappings, reverse proxy configuration, systemd, pm2, Docker Compose, Kubernetes Services, and access logs. In production, 3000 is usually better kept on localhost, a container network, or an internal network, with public access routed through a unified 80/443 entry point.
HTTP Proxy / Squid
Common HTTP proxy and Squid port used for enterprise egress proxies, caching proxies, and network relay.
Details
TCP port 3128 is a very common listener port for Squid and HTTP proxies. It is often used for enterprise egress proxying, caching, development debugging, crawler proxy pools, internal access relay, and controlled internet gateways.
The risk of a proxy port is not that it behaves like a normal web page, but that it may become a path into or through other networks. If misconfigured, external users may use it to reach internal resources, hide their real source, bypass egress controls, or launch scanning requests.
If 3128 is exposed to the public internet, verify whether authentication is required, whether allowed destinations are restricted, whether CONNECT is allowed to arbitrary ports, whether access logs are retained, and whether it can become an open proxy.
An open proxy can cause abusive traffic, unwanted requests, IP blocklisting, compliance issues, and probing of internal resources. Even if the proxy does not store business data itself, it may indirectly expose network boundaries and access paths.
In production, 3128 should be limited to office networks, egress gateways, monitoring networks, or controlled client ranges, with authentication, ACLs, destination allowlists, audit logging, and abnormal-traffic monitoring.
Global Catalog
Active Directory Global Catalog query port used to search users, groups, and directory objects across domains.
Details
TCP port 3268 is the common port for Active Directory Global Catalog. The Global Catalog stores a partial set of attributes for objects in an AD forest, making it possible to search users, groups, contacts, and other directory objects across domains.
Compared with regular LDAP on 389, port 3268 is more focused on cross-domain directory queries. Enterprise applications, mail systems, identity platforms, and directory search tools may use it to quickly locate objects across an AD forest.
Port 3268 should not be exposed as a normal public entry point. It may reveal accounts, organizational structure, group relationships, email addresses, object attributes, and domain-environment clues, which are valuable for account enumeration, social engineering, and follow-on authentication attacks.
Production environments should restrict 3268 to domain controllers, identity services, trusted application servers, and management networks. If the query content needs transport protection, consider the TLS-protected Global Catalog port 3269.
When troubleshooting 3268, check DNS, domain controller reachability, LDAP search base, filters, account permissions, cross-domain trust relationships, firewall rules, and whether the application should connect to the Global Catalog instead of regular LDAP.
Global Catalog SSL
TLS-protected Active Directory Global Catalog port for encrypted cross-domain directory queries.
Details
TCP port 3269 is commonly used for Global Catalog over SSL/TLS, allowing encrypted access to the Active Directory Global Catalog.
The relationship between 3269 and 3268 is similar to LDAPS and LDAP: 3268 is the plain Global Catalog query port, while 3269 starts with TLS and is better suited for protecting sensitive query content such as accounts, organizational structure, group relationships, and directory object attributes.
Even with TLS enabled, 3269 is still an identity infrastructure port and should not be exposed directly to the public internet. Incorrect exposure may enable account enumeration, directory-structure leakage, group-relationship disclosure, and expansion of the identity attack surface.
In production, allow 3269 only from trusted application servers, identity platforms, mail systems, management tools, and domain-controller-related networks, together with certificate management, source restrictions, least-privilege accounts, and audit logs.
When troubleshooting 3269 connection failures, check whether the domain controller certificate is valid, whether the client trusts the certificate chain, whether the access address matches the certificate name, whether the application connection string uses the correct port, and whether firewalls allow the connection.
MySQL
Default MySQL and MariaDB database port used by applications, clients, and management tools to connect to database instances.
Details
TCP port 3306 is the most common default connection port for MySQL and MariaDB. Backend applications, database clients, migration scripts, BI tools, management platforms, backup jobs, and operations scripts commonly use it to access database instances.
Port 3306 is a heavily scanned database port on the internet. Attackers commonly try version probing, default accounts, weak passwords, brute force, unauthorized access, exposed administrative accounts, and known vulnerability exploitation.
Production databases usually should not expose 3306 directly to the public internet. A safer pattern is for application servers to connect through internal networks, VPCs, private connectivity, VPNs, bastion hosts, connection pools, or private cloud database endpoints.
Common causes of MySQL connection failures include mysqld not listening on a network address, bind-address being limited to 127.0.0.1, the account not allowing remote login, username and source host mismatch, firewall or security group blocks, TLS requirement mismatches, or the connection string pointing to the wrong instance.
If MySQL must be accessed across networks, use source IP allowlists, strong authentication, least-privilege accounts, TLS encryption, audit logs, slow-query monitoring, failed-login monitoring, and regular backup-restore validation. Changing the default port alone does not meaningfully solve database exposure risk.
RDP
Default Windows Remote Desktop port used for graphical login, server administration, and remote desktop sessions.
Details
TCP port 3389 is the default port for RDP, or Remote Desktop Protocol. It is commonly used for Windows Server, Windows desktops, cloud instances, jump environments, and graphical remote administration.
RDP provides a full desktop session rather than only a command-line shell. After login, users may run graphical applications, manage files, use clipboard redirection, map local drives, or operate a server console, so it should be treated as a highly sensitive remote management entry point.
Exposing 3389 to the public internet is high risk. Attackers continuously scan RDP and attempt weak passwords, password spraying, brute force, credential reuse, historical vulnerabilities, and weak remote desktop configurations.
Production environments should prefer VPNs, bastion hosts, zero-trust access, Remote Desktop Gateway, or controlled management networks instead of exposing 3389 directly to all public sources.
If RDP must be reachable, enable Network Level Authentication, restrict source IPs, use MFA or Remote Desktop Gateway, configure account lockout policies, disable unnecessary administrator logins, and monitor failed logins, unusual login times, and unexpected source locations.
When troubleshooting RDP failures, check whether Remote Desktop is enabled, whether Windows Firewall and cloud security groups allow the connection, whether the account has remote login rights, whether NLA is compatible, whether the server has reached its session limit, and whether security policy or EDR is blocking access.
STUN / TURN
TCP fallback port for STUN/TURN, used to improve WebRTC and real-time communication connectivity in restricted networks.
Details
TCP port 3478 is commonly used as the TCP transport path for STUN/TURN. Compared with UDP, it is more often a fallback option in restricted networks, firewalled environments, or enterprise proxy settings to improve reachability for WebRTC, voice, video, and real-time communication services.
STUN helps clients discover their public NAT-mapped address. TURN relays media or data when direct peer-to-peer connectivity fails. TCP 3478 is usually not the preferred media path, but it becomes important when UDP is blocked.
Using TCP 3478 may improve connection success, but real-time audio and video quality is usually less stable than with UDP. Latency, jitter, and congestion control can all affect call quality.
TURN services consume server bandwidth because they relay traffic. Without authentication, quotas, source restrictions, and abuse monitoring, they can be misused as open relays.
Production deployments should use short-lived credentials, restrict relay scope, monitor abnormal traffic, and troubleshoot connectivity together with UDP 3478, TLS 5349, and 443 fallback paths.
STUN / TURN
Common UDP port for STUN/TURN, used by WebRTC, voice/video calls, and real-time communication to traverse NAT.
Details
UDP port 3478 is one of the most common STUN/TURN ports. It is widely used by WebRTC, video conferencing, voice calls, online classrooms, remote collaboration, and real-time interactive applications.
STUN helps clients discover the public address and port assigned by NAT so they can attempt peer-to-peer connectivity. TURN acts as a relay server for media streams or data when peer-to-peer connectivity fails.
Many cases where users can join a meeting but have no audio or video are not caused by the application itself, but by failures in UDP 3478, TURN relay access, media port ranges, NAT behavior, or firewall policy.
UDP is usually better suited for real-time audio and video because it has lower latency and lower overhead, but it is also more likely to be restricted by enterprise networks, firewalls, carriers, or strict security policies.
If TURN lacks authentication, short-lived credentials, quotas, and abuse protection, it may be used as an open relay, causing bandwidth consumption, increased cost, and abnormal traffic risk.
Production environments should restrict relay policy, enable temporary credentials and logging, and provide fallback paths such as TCP 3478, TLS 5349, or 443 to improve connectivity in complex networks.
ZooKeeper Election
ZooKeeper leader election port used for voting and coordination between cluster members.
Details
TCP port 3888 is commonly used for ZooKeeper leader election traffic. ZooKeeper nodes use it for voting, leader election, and member-state coordination.
Port 3888 is not a business client port and should not be accessed by normal applications. ZooKeeper clients usually connect to 2181; follower-to-leader synchronization commonly uses 2888; leader election commonly uses 3888.
If 3888 is blocked, has high latency, or suffers from node-to-node name resolution issues, ZooKeeper may fail to elect a leader, repeatedly mark nodes offline, experience session instability, or cause dependent services to become unavailable.
This port should only be open between ZooKeeper cluster members. It should not be exposed to the public internet, office networks, normal application segments, or unrelated hosts. Incorrect exposure increases the risk of cluster topology probing and internal control-plane leakage.
When troubleshooting 3888, check myid values, the server list, hostname resolution, node-to-node networking, firewall rules, time synchronization, disk latency, ZooKeeper logs, and ensemble health.
EPMD
Erlang Port Mapper Daemon port, commonly used for RabbitMQ and Erlang node discovery.
Details
TCP port 4369 is used by EPMD, the Erlang Port Mapper Daemon. It works like a port registry for Erlang distributed systems: nodes register with EPMD after startup, and other nodes use it to find the actual communication port of a target node.
RabbitMQ, CouchDB, Ejabberd, Riak, and other systems built on Erlang/OTP may rely on EPMD for node discovery and distributed connection setup.
Port 4369 is usually not the business client port for sending or receiving messages. In RabbitMQ, for example, 5672/5671 serve AMQP clients, 15672 is the management UI, 25672 is commonly used for inter-node communication, and 4369 helps Erlang nodes discover each other.
EPMD should be limited to the cluster or controlled management networks. Public exposure of 4369 may reveal Erlang node names, cluster structure, and follow-on communication ports, giving attackers useful clues about RabbitMQ or Erlang cluster topology.
When troubleshooting RabbitMQ cluster join failures, check 4369, 25672, the Erlang cookie, node names, DNS or hostname resolution, version compatibility, firewall rules, and cluster logs.
IPsec NAT-T
IPsec NAT Traversal port used to establish VPN tunnels when clients or gateways are behind NAT.
Details
UDP port 4500 is used for IPsec NAT Traversal, commonly called NAT-T. It encapsulates IPsec ESP traffic inside UDP so VPN clients or gateways can establish IPsec tunnels even when they are behind NAT, home routers, carrier networks, or cloud networks.
Port 4500 commonly appears together with UDP 500. UDP 500 handles the initial IKE negotiation; when both sides detect NAT, subsequent IPsec traffic often moves to UDP 4500. L2TP/IPsec deployments may also involve UDP 1701.
When troubleshooting IPsec VPN failures, checking only UDP 500 is not enough. Many cases where negotiation starts but the tunnel does not come up are caused by UDP 4500 being blocked by a firewall, security group, NAT device, or carrier policy.
UDP 4500 may be exposed on a VPN gateway, but it represents a security boundary into a private network. Production deployments should use strong pre-shared keys or certificate authentication, restrict allowed peers, record negotiation logs, and monitor unusual sources, repeated failures, and suspicious connection attempts.
Development / Flask
Common development and test web port used by Flask, local APIs, mock services, and internal tools.
Details
TCP port 5000 is common in development environments. Flask development servers, Python APIs, local mock services, debug panels, internal tools, and container-mapped services may all listen on this port.
Port 5000 has no single fixed meaning. It may be a local development service, a backend API exposed from a container, a model service, a test site, an internal console, or a temporary troubleshooting tool.
Development servers should usually not be exposed directly to the public internet. They may include debug mode, detailed error traces, test accounts, weak CORS settings, default secrets, hot-reload behavior, or internal endpoints that bypass production authentication.
If production traffic really uses port 5000, it is usually better to keep it bound to localhost, a container network, or an internal network, and expose it externally through Nginx, Ingress, an API gateway, a load balancer, or a unified 443 entry point.
When investigating port 5000, first identify the actual listening process, container port mapping, systemd/pm2/Docker Compose/Kubernetes configuration, and reverse proxy rules. Do not assume it is Flask based only on the port number.
Development HTTPS
Common HTTPS development port used for local TLS testing, ASP.NET Core, and internal APIs.
Details
TCP port 5001 is commonly used by local HTTPS development services. ASP.NET Core development environments often use 5000 for HTTP and 5001 for HTTPS; custom test APIs, internal tools, and development services may also reuse it.
Port 5001 often means the service has TLS enabled, but that does not make it production-ready for public exposure. Development certificates, self-signed certificates, debug middleware, detailed error pages, and test configuration may still introduce risk.
If port 5001 appears on a public asset, first confirm whether it is an intentional production entry point or an accidentally exposed development service, test API, container mapping, or internal console.
Production deployments usually place 5001 behind a reverse proxy, load balancer, or Ingress, with 443 handling public TLS, authentication, logs, and rate limits. Port 5001 itself should normally face only localhost, a container network, or a controlled internal network.
When troubleshooting 5001, check whether the service is actually listening with HTTPS, whether the certificate is trusted, whether SNI or Host headers match, whether the firewall allows the connection, and whether it is paired with an HTTP service on 5000.
SIP
SIP VoIP signaling port used for phone registration, call setup, session negotiation, and voice gateway communication.
Details
UDP port 5060 is the classic SIP signaling port. SIP is used for VoIP phone registration, call setup, call teardown, session negotiation, extension communication, PBX systems, and signaling between voice gateways.
SIP handles signaling, not the actual voice payload. Real audio or video media usually uses RTP/RTCP over a UDP media port range, often starting around ports such as 10000 depending on the PBX or SBC configuration.
Many cases where a call connects but has no audio are not caused by port 5060 itself. The root cause is often RTP media ports, firewall policy, NAT behavior, SBC configuration, carrier trunking, or SDP address negotiation.
Exposing SIP publicly is high risk. Attackers may attempt extension enumeration, registration brute force, weak passwords, international toll fraud, SIP scanning, call fraud, or registration hijacking.
Production environments usually protect 5060 with an SBC, firewall policy, strong authentication, source restrictions, call limits, abnormal-call alerts, and audit logging. A PBX or extension registration surface should not be exposed to the whole internet without controls.
SIPS
SIP over TLS signaling port used to encrypt VoIP registration, authentication, and call setup.
Details
TCP port 5061 is commonly used for SIP over TLS, also called SIPS. It carries SIP signaling inside a TLS-encrypted channel to protect registration, authentication, call setup, and session negotiation.
Port 5061 protects the signaling layer, but it does not necessarily encrypt the audio or video media itself. Media confidentiality depends on whether SRTP is used and whether the RTP media port range is configured correctly.
5061 commonly appears in enterprise phone systems, SBCs, PBX deployments, carrier SIP trunks, softphone clients, and VoIP environments that require encrypted signaling.
Even with TLS, SIPS still needs strong authentication, source restrictions, certificate management, call policy, registration protection, and abnormal-call monitoring. TLS protects transport; it does not automatically prevent account misuse or toll fraud.
When troubleshooting 5061, check whether the client has TLS enabled, whether the certificate chain is trusted, whether SNI or the SIP domain matches, whether the PBX or SBC has a TLS listener enabled, and whether media ports and SRTP settings are also working.
TURN over TLS
TURN over TLS port used to relay WebRTC audio and video traffic through an encrypted channel in restricted networks.
Details
TCP port 5349 is commonly used for TURN over TLS. It carries TURN relay traffic through a TLS-encrypted connection and is often seen in WebRTC, video conferencing, voice calls, online classrooms, remote collaboration, and real-time communication systems.
TURN is used when clients cannot communicate directly peer to peer, so a server relays the media or data stream. Compared with UDP 3478, TCP/TLS 5349 is often a fallback path for enterprise networks, strict firewalls, or environments that only allow encrypted outbound connections.
Port 5349 can improve connection success, but it also consumes server bandwidth and relay capacity. If TURN lacks authentication, short-lived credentials, quotas, or abuse monitoring, outside users may misuse it as an open relay.
Production deployments should limit relay scope, use short-term credentials and access control, monitor unusual traffic, and troubleshoot it together with 3478, 443, and the configured media port ranges.
mDNS
Multicast DNS port used for local device discovery and .local name resolution on LANs.
Details
UDP port 5353 is the standard port for mDNS, or Multicast DNS. It allows devices on the same local network to discover each other and resolve .local names without relying on a traditional DNS server.
mDNS is common with Bonjour, AirPrint, Chromecast, NAS devices, printers, smart home devices, development boards, IoT devices, and local debugging environments. It is designed for local-link discovery, not for public internet services.
If port 5353 appears in public scan results, check whether a router, firewall, IoT device, printer, NAS, or host configuration is accidentally exposing local discovery traffic to the internet.
mDNS may reveal device names, models, service types, hostnames, and local asset clues. Production environments should keep it limited to the local link or controlled internal networks and should not route it to the public internet.
LLMNR
LLMNR local-link name resolution port commonly used by Windows as a fallback for hostname lookup.
Details
UDP port 5355 is used for LLMNR, or Link-Local Multicast Name Resolution. When DNS cannot resolve a name, Windows clients may use LLMNR to ask other hosts on the local link.
LLMNR is intended only for local networks or local-link use. It is not a public internet service and may expose hostnames, domain clues, internal naming patterns, and network asset structure.
In enterprise security, LLMNR is often associated with name resolution spoofing and credential relay attack paths. An attacker may pretend to be the requested host and cause clients to send authentication attempts to the wrong target.
If the environment already has reliable DNS and Active Directory name resolution, LLMNR is often disabled or restricted in hardening baselines. UDP 5355 should not be open on public or untrusted network boundaries.
PostgreSQL
Default PostgreSQL database port used by applications, clients, connection pools, and administration tools.
Details
TCP port 5432 is the default connection port for PostgreSQL. Backend applications, psql, database administration tools, BI systems, migration scripts, connection pools, and data synchronization jobs commonly use it to access PostgreSQL instances.
PostgreSQL access control depends on more than whether the port is open. listen_addresses, pg_hba.conf, authentication method, database role permissions, and SSL/TLS settings all affect whether a client can connect. Many connection failures are caused by pg_hba.conf or authentication mismatches rather than basic network reachability.
Port 5432 is a high-value database entry point and should not be exposed to all public sources. Production databases are typically accessed through internal networks, VPCs, private links, VPNs, bastion hosts, controlled connection pools, or application servers.
If PostgreSQL must be reachable across networks, use source IP allowlists, strong authentication, least-privilege roles, TLS encryption, audit logs, connection limits, backup and recovery controls, and monitoring for abnormal login behavior.
When troubleshooting 5432, check whether postgres is listening on the expected address, whether firewalls and security groups allow traffic, whether pg_hba.conf matches the client source, whether the username and database name are correct, whether SSL mode matches, and whether the connection pool is exhausted.
Kibana
Default Kibana web port used to query Elasticsearch data and view logs, dashboards, and security analytics.
Details
TCP port 5601 is the default web port for Kibana. Kibana usually connects to Elasticsearch and is used to view logs, metrics, search results, dashboards, alerts, security events, and visual analytics.
Port 5601 is not just a static website port. Behind it, users may access logs, index names, field mappings, host information, internal service names, queries, stack traces, and security investigation data.
Directly exposing Kibana to the public internet is risky. Even read-only dashboards and query pages can reveal internal topology, business metrics, user behavior, error logs, and attack-surface clues.
In production, Kibana should sit behind centralized authentication, VPN, bastion access, zero-trust access, or a controlled reverse proxy, with space isolation, role-based permissions, audit logging, and source restrictions configured.
When troubleshooting 5601, verify that Kibana is running, that it can connect to Elasticsearch, that reverse proxy and basePath settings are correct, that authentication is enforced, and that Elasticsearch ports such as 9200 and 9300 are not accidentally exposed.
AMQP over TLS / RabbitMQ TLS
AMQP over TLS port commonly used for encrypted client connections to RabbitMQ and other message brokers.
Details
TCP port 5671 is commonly used for AMQP over TLS. RabbitMQ and other AMQP brokers use it to provide encrypted client connections for producers, consumers, background jobs, and internal services.
The relationship between 5671 and 5672 is similar to encrypted and plaintext entry points. Port 5672 is usually plain AMQP, while 5671 performs the TLS handshake from the start of the connection. It is better suited for cross-network, cross-cloud, hybrid-network, or security-sensitive messaging paths.
TLS only protects data in transit. It does not replace RabbitMQ permissions. User accounts, passwords, vhosts, exchanges, queues, bindings, ACLs, connection limits, and audit policies still need to be configured correctly.
This port should usually be reachable only by application servers, workers, controlled service meshes, or internal messaging clients. It should not be exposed directly to the public internet; if cross-network access is required, restrict sources, enforce strong authentication, use trusted certificates, and monitor abnormal connections.
When troubleshooting 5671, confirm that the client is actually using TLS, that the certificate chain is trusted, that SNI or hostname validation matches, that the broker has a TLS listener enabled, and that the client has permission to access the target vhost and queues.
AMQP / RabbitMQ
AMQP client connection port used by RabbitMQ for message publishing, consuming, and task queue traffic.
Details
TCP port 5672 is the common port for AMQP 0-9-1 and the default RabbitMQ client connection port. Producers, consumers, background workers, task queues, and internal services use it to publish, consume, and acknowledge messages.
Port 5672 carries business message traffic, not the RabbitMQ management console. Applications use exchanges, queues, routing keys, bindings, acknowledgements, prefetch settings, and dead-letter flows to support asynchronous processing, task distribution, event delivery, and traffic smoothing.
If 5672 is exposed incorrectly, external clients may try to connect to the broker, enumerate vhosts, read or write messages, consume queues, forge events, or overload the broker with excessive connections.
In production, 5672 should usually be limited to internal application networks, worker clusters, service meshes, or controlled client ranges. Across untrusted networks, prefer TLS, SASL or strong authentication, ACLs, quotas, audit logging, and source restrictions.
When troubleshooting 5672, check whether RabbitMQ is listening, whether the vhost exists, whether credentials are correct, whether exchange and queue permissions allow the operation, whether connection limits have been reached, and whether heartbeat, prefetch, and acknowledgement settings are reasonable.
VNC
Base VNC remote desktop port, usually mapped to display :0 for graphical access to a remote host.
Details
TCP port 5900 is the most common base port for VNC and usually corresponds to display :0. VNC is used to view and control graphical desktops and is often found on Linux desktops, virtual machine consoles, KVM/IPMI consoles, lab systems, embedded devices, and operations tools.
VNC provides graphical remote desktop access, so its risk profile is close to other remote administration entry points such as RDP. Different VNC implementations vary significantly in authentication, encryption, clipboard behavior, file transfer, and session isolation, so a password alone is not enough to assume it is safe.
Exposing 5900 to the public internet is high risk. Scanners commonly test it for weak passwords, blank passwords, older protocol issues, and unencrypted sessions. If accessed, an attacker may directly view the desktop, control the session, or operate administrative consoles.
For production remote graphical access, use VPNs, bastion hosts, SSH tunnels, dedicated remote access gateways, or cloud provider consoles instead of exposing 5900 directly to the internet.
When troubleshooting 5900, verify that the VNC service is running, that the display number is correct, that it only listens on localhost or internal addresses when appropriate, that authentication and encryption are enabled, that the firewall restricts sources, and that additional sessions such as 5901 or 5902 are not unintentionally exposed.
VNC Display 1
Common VNC display :1 port, usually used for a second remote desktop session.
Details
TCP port 5901 usually corresponds to VNC display :1. VNC ports are commonly calculated as 5900 plus the display number, so :0 maps to 5900, :1 maps to 5901, and :2 maps to 5902.
Port 5901 is often seen on multi-user Linux desktops, virtual desktops, lab systems, remote teaching machines, manually started vncserver sessions, and multi-instance VNC deployments.
Its risk is essentially the same as 5900. Moving from 5900 to 5901 does not reduce the security impact; if the service behind it is VNC, it should still be treated as a remote desktop administration entry point.
If this port is exposed publicly, check for weak passwords, blank passwords, unencrypted sessions, shared desktop exposure, clipboard leakage, or direct access to an administrative desktop.
When troubleshooting 5901, confirm that the display :1 session exists, that vncserver started correctly, that the desktop environment loaded, that authentication is configured correctly, that the firewall restricts sources, and whether access should instead go through a VPN, bastion host, or SSH tunnel.
VNC Display 2
Common VNC display :2 port, usually used for a third remote desktop session or an additional VNC instance.
Details
TCP port 5902 usually corresponds to VNC display :2. VNC ports are commonly calculated as 5900 plus the display number, so 5902 often represents the third graphical desktop session.
Port 5902 is common in multi-user Linux desktops, lab environments, virtual desktops, remote teaching machines, test hosts, and multi-instance VNC services. Its exact purpose depends on the VNC server startup parameters and session configuration.
Its security properties are the same as 5900 and 5901. A higher or neighboring port number does not make it safer, and it should not be treated as an ordinary application port if VNC is behind it.
Public exposure of 5902 may lead to desktop disclosure, remote control, observation of credentials being typed, or direct operation of management tools. It should be limited to trusted sources and preferably reached through a VPN, bastion host, or SSH tunnel.
When troubleshooting, verify the display number, VNC session state, authentication and encryption settings, desktop environment, listening address, port mapping, and firewall rules to avoid leaving temporary test sessions exposed long term.
WinRM HTTP
WinRM over HTTP remote management port commonly used for PowerShell Remoting, configuration rollout, and Windows automation.
Details
TCP port 5985 is the default port for WinRM over HTTP. It is commonly used for PowerShell Remoting, scripted administration, remote command execution, configuration management, and large-scale Windows server operations.
WinRM is a Windows remote management entry point, not an ordinary application port. Even when it uses HTTP, authentication may rely on Kerberos, NTLM, certificates, or domain policy, but the transport itself is not equivalent to HTTPS encryption.
This port should normally be open only inside a domain, management network, bastion path, automation platform, or controlled server group. Public exposure of 5985 is extremely risky because it can expand the attack surface for remote command execution, credential spraying, lateral movement, and automated compromise.
If WinRM must be used across network boundaries, prefer HTTPS on port 5986 and combine it with source IP allowlists, domain policy, least-privilege accounts, audit logging, JEA, MFA, or a bastion host.
When troubleshooting 5985, check whether the WinRM service is enabled, whether listeners are configured correctly, whether Windows Firewall allows the traffic, whether domain authentication works, whether TrustedHosts is being abused, whether accounts have excessive privileges, and whether public port mapping exists unnecessarily.
WinRM HTTPS
WinRM over HTTPS remote management port used for encrypted PowerShell Remoting and Windows automation.
Details
TCP port 5986 is the default port for WinRM over HTTPS. It encrypts Windows remote management traffic with TLS and is commonly used for PowerShell Remoting, automated configuration, remote command execution, and server fleet operations.
Compared with 5985, port 5986 provides transport-layer encryption and is better suited for cross-network or higher-security management paths. It is still a remote administration entry point, so the risk remains high if authentication, authorization, or source controls are misconfigured.
This port should not be treated like a normal HTTPS web port. WinRM can run administrative commands, read system information, change configuration, and deploy services, so privilege boundaries, least-privilege accounts, and audit controls are essential.
In production, allow 5986 only from bastion hosts, automation platforms, management networks, or trusted operations nodes. Use trusted certificates, strong authentication, explicit firewall rules, and complete command auditing.
When troubleshooting 5986, verify that the HTTPS listener exists, that the certificate is valid, that the hostname matches, that the client trusts the certificate chain, that the authentication mechanism is correct, and that network policy allows access to the target port.
Redis
Default Redis port used for caching, sessions, queues, rate limiting, and in-memory data structure services.
Details
TCP port 6379 is the default Redis port. Redis is commonly used for caching, session storage, leaderboards, distributed locks, rate limiting, queues, real-time counters, and in-memory data structure services.
The data behind 6379 is often highly valuable runtime state, such as login sessions, verification codes, job status, business caches, tokens, queue contents, or temporary configuration. This is not a harmless read-only port; improper access can directly affect business logic and data consistency.
Many older Redis deployments assumed that Redis would only be reachable from private networks and therefore used weak or no authentication. If such an instance is accidentally mapped to the internet or allowed by a security group, the result can be unauthorized access, data disclosure, data deletion, configuration tampering, or malicious job injection.
Production Redis should not be exposed publicly. Bind it to private addresses, enable authentication and ACLs, restrict source IPs, disable or rename dangerous commands where appropriate, use TLS or private networking, and monitor slow queries, suspicious commands, and connection spikes.
When troubleshooting 6379, check whether Redis is accidentally listening on 0.0.0.0, whether requirepass or ACLs are enabled, whether protected mode is active, whether cloud security groups are restricted, whether client connection pools are abnormal, and whether there are unauthenticated probes or suspicious command records.
Redis TLS / Alternative
Redis TLS or alternative connection port commonly used by cloud Redis, encrypted access, and custom Redis deployments.
Details
TCP port 6380 is commonly used as a Redis TLS port or as an alternative Redis connection port, especially in cloud Redis services, managed cache platforms, custom encrypted deployments, and multi-instance environments.
Port 6380 is not a new Redis protocol by itself. It usually means that a team or cloud provider has separated encrypted access, an alternate instance, or a specific environment from the default 6379 port. The real listener and client configuration should always be verified.
Even with TLS, Redis still needs authentication, ACLs, source restrictions, and command-level permission controls. TLS protects the transport path; it does not prevent an authenticated user from reading, writing, or deleting critical data beyond their intended permissions.
If this port is reachable from the public internet, confirm immediately whether cross-network access is truly required. In most cases, Redis belongs in a private network, application subnet, or controlled service mesh, not as a public database entry point.
When troubleshooting 6380, check whether the client has TLS enabled, whether certificates and hostnames match, whether ACLs are correct, whether cloud security groups or firewalls restrict sources, and whether the client is accidentally connecting to the wrong Redis instance or environment.
Kubernetes API Server
Default secure Kubernetes API Server port and the core entry point for the cluster control plane.
Details
TCP port 6443 is the common secure port for the Kubernetes API Server and the central entry point to the cluster control plane. kubectl, controllers, schedulers, operations platforms, CI/CD systems, and cloud management tools may all interact with the cluster through it.
The API Server is not an ordinary web API. It can read and modify Pods, Secrets, ConfigMaps, Services, Ingresses, RBAC policies, Nodes, Deployments, and other critical resources. With excessive permissions, access to it can effectively mean control over the entire cluster.
A publicly reachable 6443 is not always automatically wrong, since managed Kubernetes and remote operations models may require API Server access. However, it must be protected with strong authentication, RBAC, network allowlists, audit logging, certificates, OIDC or MFA, and least-privilege policy.
If 6443 is exposed incorrectly, attackers may try to enumerate the API, brute-force credentials, abuse weak kubeconfig files, steal or reuse ServiceAccount tokens, or deploy malicious workloads through overly broad RBAC permissions.
When troubleshooting 6443, verify API Server certificates, authentication methods, RBAC rules, audit policy, admission controls, whether anonymous access is disabled, whether allowed sources are tightly scoped, and whether related control-plane ports such as etcd, kubelet, controller-manager, and scheduler are also secured.
Syslog over TLS
Encrypted Syslog transport port used to securely deliver audit and operational logs between servers, devices, and log platforms.
Details
TCP port 6514 is commonly used for Syslog over TLS, which adds TLS encryption to traditional Syslog log transport. It is often seen in security auditing, centralized logging, SIEM pipelines, network devices, servers, and cloud log forwarding agents.
Compared with traditional UDP 514 or plaintext Syslog, 6514 is better suited for cross-network, cross-datacenter, or higher-security logging paths. It helps reduce the risk of log contents being intercepted, forged, or tampered with in transit.
Log data often contains hostnames, account names, private addresses, access paths, error stacks, security events, and business exception details. Even though this is not a business application port, it should not be exposed to untrusted sources.
In production, 6514 should only accept traffic from trusted log clients, log agents, or network devices. Use certificate validation, TLS version controls, source allowlists, log integrity checks, and abnormal traffic monitoring.
When troubleshooting 6514, check whether client and server certificates match, whether the TLS handshake succeeds, whether the receiving platform can parse the log format, whether network policy allows the connection, and whether the log platform is queuing or dropping events.
IRC
Classic plaintext IRC server port used for channel chat, bot connections, and legacy community communication.
Details
TCP port 6667 is the classic plaintext IRC connection port. IRC is commonly used for channel chat, technical communities, automation bots, alert notifications, gaming communities, and some legacy real-time communication systems.
Port 6667 usually does not provide transport encryption. Channel messages, nicknames, commands, and some authentication data may travel in plaintext. For public use, IRC over TLS on ports such as 6697 is generally preferable.
An IRC service is not automatically dangerous, but once exposed publicly it may attract spam, bot abuse, channel harassment, weak-password attempts, or anonymous connection clustering. Anonymous access, registration policy, and operator permissions are especially important.
If 6667 appears in a scan of company assets or servers, verify whether it is a real IRC service, an internal bot service, or another application reusing the port. Do not classify the service based on the port number alone.
For production use, restrict sources, enable account registration and role-based permissions, log connections and channel operations, and migrate to a TLS-enabled port where possible. Internal IRC or bot services are usually better placed behind a VPN, private network, or controlled access boundary.
IRCS
Common IRC over TLS port used for encrypted connections to IRC chat servers and bot services.
Details
TCP port 6697 is commonly used for IRC over TLS, encrypting communication between IRC clients and servers. It is often used by modern IRC networks, community chat systems, bot notifications, and real-time communication services that need to protect login data.
Compared with plaintext IRC on 6667, port 6697 helps protect nickname authentication, channel messages, and command traffic from easy interception or tampering. It does not automatically solve account permissions, channel governance, or bot abuse.
If this port is publicly exposed, confirm whether the IRC service truly needs public access, whether it uses a valid certificate, whether anonymous connections are restricted, and whether rate limiting, abuse controls, blacklists, and operator auditing are in place.
Port 6697 may also be reused by custom TLS services. During investigation, confirm the real application using TLS certificates, banners, listening processes, application logs, and reverse proxy configuration.
In production, use trusted certificates, strong authentication, least-privilege bot accounts, connection rate limits, and complete logs. Internal IRC or automation notification services are usually better restricted to a private network or VPN.
IRC Alternate / App Server
Common alternate port for IRC, application services, or custom systems; its real meaning depends on the listener and protocol response.
Details
TCP port 7000 has no single fixed meaning. Some IRC networks use it as an alternate port, but Java applications, middleware, debug services, internal platforms, and custom business systems may also use it.
When 7000 is open, do not automatically classify it as IRC or a web service. Confirm the real service using the process name, banner, TLS certificate, HTTP response, application logs, container port mappings, and reverse proxy rules.
If it hosts IRC, the main concerns are anonymous access, plaintext communication, bot abuse, and channel permissions. If it hosts an application service, the risks may include unauthenticated APIs, debug mode, exposed admin pages, or internal API leakage.
Port 7000 is often reused temporarily by teams. Common issues include forgotten test services, incorrect container mappings, overly broad firewall rules, exposed management interfaces, and confusion between multiple service instances.
In production, assign clear ownership to this port, restrict access sources, and add authentication, logging, and monitoring. If it is only a temporary test service, development endpoint, or legacy entry point, retire it or move it behind a unified access layer.
WebLogic
Common Oracle WebLogic service port that may expose business applications, an admin console, or middleware internals.
Details
TCP port 7001 is one of the common default ports for Oracle WebLogic. It may serve Java web applications, the WebLogic Administration Console, AdminServer, Managed Server instances, or other middleware-related services.
The risk of 7001 depends on what is actually exposed. If it points to an admin console or high-privilege middleware entry point, public exposure greatly increases the risk of weak passwords, unauthorized access, deserialization flaws, historical component vulnerabilities, and configuration leakage.
WebLogic often sits between business applications, databases, message queues, and internal services. If compromised, it may give an attacker access to application deployment capabilities, configuration files, data source credentials, JNDI resources, or internal network paths.
Production environments should avoid exposing 7001 directly to the public internet. A better pattern is to place business traffic behind a reverse proxy or load balancer on 80/443, while restricting the admin console to a VPN, bastion host, or management network.
When troubleshooting 7001, verify whether it is serving a business application or an administrative endpoint, check the WebLogic version and patch level, console authentication, default accounts, JMX or T3 exposure, reverse proxy rules, access logs, and any unnecessary public mappings.
WebLogic SSL
Common Oracle WebLogic HTTPS port that may expose encrypted applications, an admin console, or internal middleware services.
Details
TCP port 7002 is commonly used as an SSL/TLS access point for Oracle WebLogic. It may serve encrypted Java web applications, the WebLogic Administration Console, AdminServer, Managed Server instances, or other middleware-related services.
Ports 7001 and 7002 often appear together: 7001 is commonly used for plain HTTP or a default management endpoint, while 7002 is commonly used for HTTPS. TLS does not make the port safe to expose publicly, especially if it fronts a privileged admin surface.
If 7002 points to the WebLogic Administration Console, the risk is much higher than for a normal web page. Attackers may try weak passwords, default accounts, historical vulnerabilities, deserialization flaws, T3/JMX exposure, or configuration leakage.
In production, business traffic is usually better placed behind a reverse proxy, load balancer, or gateway. WebLogic administration endpoints should be restricted to a VPN, bastion host, management network, or explicit source allowlist.
When investigating 7002, confirm the listening process, certificate configuration, WebLogic version and patch level, whether the console is exposed, whether authentication is strong enough, whether access logs are complete, and whether any unnecessary public mapping exists.
Development Web
Common development and test web port used for local apps, Django, Python HTTP servers, test APIs, and internal tools.
Details
TCP port 8000 is a very common development and testing web port. It is often used by Python simple HTTP servers, Django development servers, static file previews, test APIs, internal tools, and temporary debug pages.
Port 8000 has no fixed protocol meaning. It may be a harmless local development page, but it may also expose an unprotected admin page, debug endpoint, Swagger documentation, directory listing, test API, or internal service mapped from a container.
The main risk is not the port itself, but development services being accidentally exposed to the public internet. Development servers often lack production-grade authentication, rate limiting, auditing, error hiding, TLS, permission isolation, and security headers.
If 8000 appears on a public asset, verify whether it truly needs public access. Temporary test services, preview pages, and internal APIs should usually be restricted to a private network, VPN, or unified gateway.
During review, check the listening process, framework, HTTP headers, directory browsing, debug mode, environment variable leakage, container port mappings, and reverse proxy rules to avoid leaving a development entry point online as if it were production.
DNS Alternate
Alternate DNS port often used for test resolvers, internal DNS services, DNS gateway backends, or encrypted DNS forwarding paths.
Details
TCP port 8053 is often used as an alternate DNS port. It is commonly seen with test resolvers, internal DNS services, DNS over HTTPS or DNS over TLS gateway backends, containerized DNS components, and experimental resolver services.
It is not a standard default client query port, so when 8053 is open, first confirm the actual protocol. It may handle DNS queries, or it may simply be another application reusing the port.
If 8053 provides recursive DNS resolution, pay close attention to whether it has become an open resolver. Unrestricted recursive DNS can lead to abusive queries, internal domain leakage, privacy risks, or use in a broader attack chain.
If 8053 is the backend port for an encrypted DNS gateway, it generally should not be exposed directly to the public internet. It should only accept traffic from a frontend proxy, gateway, or controlled service.
When troubleshooting, check related ports such as 53, 853, and 443, and verify UDP/TCP behavior, recursion policy, zone transfer restrictions, upstream resolvers, access logs, and firewall rules.
HTTP Alternate
One of the most common alternate HTTP ports, used by application servers, reverse proxies, admin interfaces, development services, and containerized web apps.
Details
TCP port 8080 is one of the most common alternate HTTP ports. It is frequently used by Tomcat, Jetty, Spring Boot, proxy services, internal web applications, development servers, admin pages, and container mappings.
The real meaning of 8080 depends on the listening process. It may be a normal business page, but it may also be an admin console, unauthenticated API, proxy endpoint, debug service, default application server page, or temporary test environment.
Many teams use 8080 as an HTTP entry point beside port 80, but this can create security gaps: the main 443 site may have authentication and protections, while 8080 accidentally bypasses the gateway, WAF, SSO, or access controls.
If 8080 is publicly exposed, confirm whether public access is required, whether authentication, TLS, reverse proxying, rate limiting, access logs, and security headers are in place, and whether default pages, sample applications, or admin consoles are exposed.
For production, it is usually better to consolidate public traffic behind 80/443 or a unified gateway. If 8080 is only used for internal services, health checks, or debugging, restrict its source access and avoid leaving it directly exposed.
HTTP Alternate
Common secondary HTTP service port used for alternate web instances, internal APIs, admin pages, debug services, or container mappings.
Details
TCP port 8081 is commonly used as a secondary HTTP service port. It often appears in multi-instance web applications, alternate admin pages, internal APIs, debug services, development environments, and containerized deployments.
Port 8081 has no fixed business meaning. It frequently appears alongside 8080, 8000, 3000, and 5000 in development or microservice environments to separate applications, containers, or service versions.
The risk often comes from temporary ports being left in place. Port 8081 may expose an admin interface outside unified authentication, a test API, debug mode, error stacks, API documentation, or internal service details.
If this port appears on a public asset, verify whether it bypasses the gateway, WAF, SSO, TLS policy, or access controls used by the official entry point. Pay special attention to default accounts, unauthenticated endpoints, and directory browsing.
In production, make the ownership and purpose of this port explicit. Public business traffic should be consolidated behind a unified entry point, while internal APIs, health checks, and debug services should be limited to private networks, monitoring systems, VPNs, or fixed source allowlists.
HTTPS Alternate
Common alternate HTTPS port used by application servers, admin consoles, internal gateways, and reverse proxy backends.
Details
TCP port 8443 is a common alternate HTTPS port. It is often used by Tomcat, Jetty, Spring Boot, Kubernetes Dashboard, gateway services, admin consoles, internal APIs, and reverse proxy backends.
Port 8443 usually indicates TLS-protected access, but “HTTPS enabled” does not mean it is safe to expose publicly. The service behind it may be a normal business page, a privileged admin console, a cluster dashboard, an operations platform, or a backend that should only be reached by a gateway.
Many environments use 443 as the official public entry point and keep 8443 for application servers, management surfaces, or internal forwarding. If 8443 bypasses the main gateway, WAF, SSO, access controls, or audit logging, it can become a hidden attack surface.
If this port appears on a public asset, confirm whether public access is actually required. Check certificate configuration, authentication policy, default pages, admin consoles, debug endpoints, reverse proxy rules, and source restrictions.
In production, 8443 is usually better placed on a private network, management network, VPN, bastion path, or load balancer backend. If it must be public, use strong authentication, hardened TLS, rate limiting, audit logs, and least-privilege access.
MQTT over TLS
Default MQTT over TLS port for encrypted connections between IoT devices, clients, and message brokers.
Details
TCP port 8883 is the default port for MQTT over TLS. It is commonly used by IoT devices, sensors, edge gateways, mobile clients, and backend services to connect securely to an MQTT broker.
Its relationship to 1883 is similar to an encrypted and unencrypted pair: 1883 is commonly used for plain MQTT, while 8883 uses TLS to protect credentials, topic subscriptions, and message payloads in transit.
TLS alone is not enough. An MQTT broker still needs strong identity checks, Topic-level authorization, client certificates or strong passwords, connection limits, message rate limits, and audit logging.
If 8883 is exposed to the public internet, check carefully for anonymous access, weak accounts, overly broad Topic permissions, reused device credentials, and the possibility of unauthorized subscription, forged publishing, or message flooding.
In production, 8883 can be a legitimate controlled device-ingestion endpoint, but it should be paired with certificate lifecycle management, ACLs, device isolation, abnormal connection monitoring, and broker version maintenance.
HTTP Alternate / Proxy
Common alternate HTTP port used by development services, proxy endpoints, notebooks, debug pages, and internal admin interfaces.
Details
TCP port 8888 is a common alternate HTTP port. It is often used by development servers, Jupyter Notebook, proxy tools, debug services, internal admin pages, custom web applications, and temporary test environments.
Port 8888 has no fixed business meaning. It may be a normal web page, but it may also expose a privileged notebook, open proxy, debug endpoint, directory listing, API documentation, or admin interface that is not integrated with central authentication.
The risk often comes from temporary services becoming long-lived exposures. Development and debug services commonly lack strong authentication, TLS, rate limiting, audit logs, and source restrictions.
If 8888 is publicly exposed, confirm the listening process and real purpose. Pay special attention to unauthenticated access, leaked tokens, proxy abuse, debug mode, file access, command execution paths, or exposed internal APIs.
In production, 8888 should usually be kept behind a private network, VPN, bastion host, or unified gateway. If it is only a temporary testing port, close it after use and remove the related firewall or security group rules.
MinIO / App Server
Common MinIO object storage API port, also frequently reused by application servers, debug services, and custom backends.
Details
TCP port 9000 is commonly used by the MinIO object storage API. Clients, SDKs, backup jobs, gateways, and business systems may use it to access buckets and object data.
Port 9000 is also often reused by other applications as a custom service port, so do not identify it as MinIO based on the port alone. Confirm the real service using the HTTP response, certificate, process, container image, startup parameters, and request paths.
If it is MinIO API, the main risk is object data access. Misconfiguration can lead to public buckets, leaked credentials, overly broad policies, unauthorized upload or download, or exposure of sensitive files.
If 9000 hosts a normal application service, also check whether it bypasses the official entry point for authentication, TLS, WAF, gateway routing, audit logging, or rate limiting.
In production, MinIO API access is usually better limited to private networks, dedicated gateways, reverse proxies, or controlled source ranges. If public exposure is required, use strong authentication, least-privilege policies, TLS, access logs, bucket policy review, and abnormal download monitoring.
MinIO Console
Common MinIO web console port used to manage buckets, users, access policies, monitoring, and object storage configuration.
Details
TCP port 9001 is commonly used by MinIO Console, the web management interface for MinIO. Administrators can use it to view buckets, objects, users, access keys, policies, configuration, monitoring, and cluster status.
Ports 9000 and 9001 often appear together: 9000 is commonly used for the object storage API, while 9001 is commonly used for browser-based administration. Both relate directly to data security, but 9001 concentrates management risk.
If MinIO Console is exposed to the public internet, attackers may try weak passwords, leaked access keys, default configurations, historical vulnerabilities, or session hijacking. Console access may affect bucket permissions, object data, and access policies.
In production, 9001 should usually be restricted to a private network, VPN, bastion host, management network, or unified identity layer. It should not remain directly exposed as a normal public entry point.
When reviewing this port, check whether the console is required, whether TLS is enabled, whether admin accounts are minimized, whether source access is restricted, whether audit logs are complete, whether default credentials exist, and whether both the 9000 API and 9001 Console are mistakenly exposed together.
Prometheus
Default Prometheus Web UI and HTTP API port for querying metrics, alerting rules, scrape targets, and monitoring status.
Details
TCP port 9090 is the default port for the Prometheus Web UI and HTTP API. Operators commonly use it to run PromQL queries, inspect scrape targets, review rule status, analyze metrics, and troubleshoot the monitoring pipeline.
Port 9090 does not usually control business systems directly, but it can expose a large amount of internal information, including service names, instance addresses, labels, metric names, scrape targets, alerting rules, cluster topology, and runtime status.
Prometheus is valuable for observability, but those same metrics can also help attackers understand the internal service structure, database names, middleware components, host scale, endpoint paths, and failure patterns.
If 9090 appears on a public asset, confirm whether public access is truly required and check whether it is protected by centralized authentication, VPN, bastion access, a reverse proxy, or source allowlists.
In production, 9090 should normally be limited to monitoring users, operations networks, or controlled gateways, with authentication, TLS, audit logging, least-privilege access, and secure handling of Prometheus configuration.
Kafka
Common Kafka broker client port used by producers, consumers, and client applications to read and write messages.
Details
TCP port 9092 is the most common Kafka broker client port. Producers, consumers, stream processing jobs, and some management tools use it to communicate with a Kafka cluster.
Kafka is not a normal web service. The traffic behind 9092 often carries business messages, event streams, log pipelines, order states, user behavior, audit data, or asynchronous communication between systems.
The risk is not only whether someone can connect to the broker. It also includes whether unauthorized users can read or write Topics, discover Topic names, inspect consumer groups, access message content, or infer internal system topology.
Kafka connectivity also depends heavily on advertised.listeners. Many Kafka issues are not simple port reachability problems: the client may connect to the first broker, then receive broker addresses it cannot actually reach.
In production, 9092 should normally be limited to application networks, data platform networks, or private network paths, with SASL, TLS, ACLs, Topic-level authorization, audit logging, and source restrictions enabled.
Alertmanager / Kafka Alt
Default Prometheus Alertmanager port, also sometimes reused by Kafka or other services as an alternate listener.
Details
TCP port 9093 most commonly refers to the default Prometheus Alertmanager port. Alertmanager receives, groups, silences, routes, and displays alerts.
Alertmanager may contain service names, alert labels, instance addresses, failure descriptions, notification routes, receiver details, and clues about the internal on-call structure, so it should not be exposed to the public internet without protection.
Port 9093 may also be used by Kafka or other systems as an alternate port, so do not identify the service from the port number alone. Confirm the real purpose using the response content, process name, container image, configuration, and network topology.
If the service is Alertmanager, check whether authentication is enabled, whether anyone can create silences, whether alerting rules or notification targets are exposed, and whether internal service naming is visible.
In production, 9093 should sit behind a monitoring network, private network, VPN, bastion host, or centralized authentication proxy, and should only be reachable by Prometheus, operators, and controlled alerting components.
Kafka Alternate / TLS
Common Kafka alternate or TLS listener port, often used to separate internal, external, encrypted, or authenticated access paths.
Details
TCP port 9094 is commonly used as a Kafka alternate listener, TLS listener, or multi-listener endpoint. Teams often use it to separate plaintext, encrypted, internal, external, container-network, or cross-cluster access paths.
Port 9094 is not a uniquely fixed Kafka protocol port. Its actual meaning depends on the broker listeners and advertised.listeners configuration.
In containerized, Kubernetes, or multi-network environments, 9094 is often used for external clients, TLS clients, or a specific network segment. If configured incorrectly, a client may connect successfully at first but fail after receiving broker metadata that points to unreachable addresses.
If this port carries Kafka traffic, check whether TLS, SASL, ACLs, client certificates, Topic permissions, and source restrictions are enabled.
In production, 9094 should be treated as a data infrastructure entry point and should not be exposed casually to the public internet. Even as an alternate port, it needs Kafka broker-level access control and audit coverage.
Node Exporter
Default Prometheus Node Exporter metrics port for host CPU, memory, disk, network, and system health data.
Details
TCP port 9100 is the default port for Prometheus Node Exporter. It exposes Linux/Unix host metrics such as CPU, memory, disk, filesystem, network, load, process statistics, and general system health.
Node Exporter does not normally provide login or command execution, but it can expose highly detailed host runtime information. Attackers can use those metrics to infer host scale, disk layout, network interfaces, load patterns, system version clues, and service behavior.
Port 9100 should be treated as a monitoring data endpoint, not as a harmless public page. Even plain text metrics can reveal internal assets, capacity planning details, fault conditions, and infrastructure naming conventions.
If 9100 is exposed to the public internet, first verify whether only Prometheus can reach it and whether access is restricted by firewall rules, reverse proxy controls, VPN, or security groups.
In production, 9100 should usually be reachable only from the monitoring system’s network, with TLS, an authentication proxy, network segmentation, metric minimization, and least-exposure principles applied.
MySQL Exporter
Common Prometheus MySQL Exporter metrics port for exposing MySQL instance status, connections, replication, and performance data.
Details
TCP port 9104 is commonly used by mysqld_exporter, also known as Prometheus MySQL Exporter. It converts MySQL or MariaDB runtime metrics into HTTP metrics that Prometheus can scrape.
This port usually does not provide direct database query access, but it may expose connection counts, slow query data, replication state, InnoDB metrics, table statistics, version details, instance names, and performance characteristics.
The main risk of 9104 is information disclosure. Even without direct access to port 3306, an attacker may use exposed metrics to infer database scale, replication topology, peak load patterns, abnormal states, and internal naming conventions.
In production, 9104 should only be reachable by Prometheus or controlled monitoring networks, and should not be exposed to the public internet. When troubleshooting missing metrics, check the exporter process, MySQL monitoring account permissions, connectivity to 3306, and the Prometheus scrape configuration.
Blackbox Exporter
Common Prometheus Blackbox Exporter probing port for checking HTTP, TCP, DNS, ICMP, and other target availability.
Details
TCP port 9115 is commonly used by Prometheus Blackbox Exporter. It is not the monitored application itself; instead, Prometheus calls it to actively probe targets such as HTTP, TCP, DNS, and ICMP endpoints.
The main risk of Blackbox Exporter is that it can be used to make the monitoring node send probes on someone else’s behalf. Without proper access control, external users may abuse it to request internal addresses, cloud metadata endpoints, or restricted services, creating an SSRF-style risk.
This port may also expose probe module behavior, target results, error details, and clues about internal service reachability. Even when it does not return business data, it can help attackers map network boundaries and internal assets.
In production, 9115 should only be reachable by Prometheus or controlled scheduling components, and the range of probeable targets should be restricted. When troubleshooting failed probes, check the module configuration, target URL, DNS, outbound network path, firewall rules, and Prometheus scrape parameters.
PostgreSQL Exporter
Common Prometheus PostgreSQL Exporter metrics port for exposing PostgreSQL connections, transactions, locks, replication, and performance data.
Details
TCP port 9187 is commonly used by postgres_exporter, also known as Prometheus PostgreSQL Exporter. It exposes PostgreSQL runtime and performance data as metrics that Prometheus can scrape.
Port 9187 does not directly serve SQL query traffic, but it may expose connection counts, transaction statistics, lock waits, replication status, database names, table statistics, index information, version clues, and instance health.
If this port is reachable from an untrusted network, attackers may infer database scale, load patterns, replication structure, failure states, and internal object naming. For database exporters, the metrics themselves should be treated as sensitive operational data.
In production, 9187 should only be reachable by Prometheus or monitoring networks, and it should use a least-privilege database account. When troubleshooting PostgreSQL monitoring issues, check the exporter, connectivity to 5432, monitoring account permissions, custom query configuration, and Prometheus scrape status.
Elasticsearch HTTP
Default Elasticsearch HTTP API port for search queries, index management, cluster status, and data ingestion.
Details
TCP port 9200 is the default Elasticsearch HTTP API port. Clients, applications, Kibana, operations tools, and automation scripts commonly use it to run queries, index documents, manage indices, and inspect cluster state.
Port 9200 is a high-risk data entry point, not just a normal web port. It may provide access to logs, search indices, business documents, user behavior data, error traces, security events, and internal system records.
Without authentication, authorization, or network restrictions, external users may be able to read index contents, delete indices, modify data, inspect cluster configuration, or use an exposed cluster as a foothold for broader impact.
If 9200 is found on a public asset, first verify whether security features, role-based permissions, TLS, source restrictions, and audit logging are enabled. Relying on obscure index names or unpublished paths is not effective protection.
In production, 9200 should normally sit behind a private network, application network, VPN, gateway, or controlled reverse proxy, and should not be directly exposed to all public internet sources.
Elasticsearch Transport
Elasticsearch node-to-node transport port for internal cluster communication, node discovery, shard replication, and cluster state synchronization.
Details
TCP port 9300 is commonly used for Elasticsearch transport communication. It is mainly intended for internal communication between nodes, not for regular user queries.
Cluster nodes use this port for node discovery, cluster state synchronization, shard allocation, data replication, and internal request forwarding. It is critical to Elasticsearch cluster stability and consistency.
Exposing 9300 to untrusted networks is highly risky. Attackers may probe cluster nodes, interfere with node communication, or, in misconfigured environments, attempt to join the cluster, inspect internal state, or affect shard placement and cluster health.
This port should normally be open only between Elasticsearch nodes, not to ordinary clients, office networks, or public internet sources. In multi-host deployments, security groups, firewalls, or private networking should strictly limit node-to-node access.
When troubleshooting issues related to 9300, check node discovery settings, cluster name, certificates, TLS, inter-node networking, version compatibility, and firewall rules instead of treating it like an HTTP API port.
Git Protocol
Default Git native protocol port, commonly used for anonymous public repository fetches; fast, but usually without encryption or authentication.
Details
TCP port 9418 is commonly used by the native Git protocol, typically accessed with URLs such as git://host/repo.git. It was designed to transfer Git objects efficiently with low overhead, often for anonymous clone and fetch access to public repositories.
The Git protocol usually does not provide transport encryption and is not a good fit for code access that requires authentication, permission control, or auditability. Modern production environments more commonly use Git over SSH, Git over HTTPS, or controlled access through a code hosting platform.
If 9418 is exposed to the public internet, verify that it only serves explicitly public read-only repositories, and check whether it could reveal internal project names, branches, commit history, configuration files, secret traces, or sensitive historical code.
Do not judge the service by the port number alone. Confirm the listening process, repository root, export rules, access logs, firewall policy, and whether any active workflow still depends on it. If it is only a legacy entry point, migrate to HTTPS or SSH and close it.
HTTPS Admin
Common HTTPS administration port used by consoles, gateways, device backends, object storage consoles, and application server management interfaces.
Details
TCP port 9443 is commonly used as an HTTPS administration endpoint or alternate HTTPS port. It may host gateway consoles, device backends, application server admin interfaces, Kubernetes-related components, MinIO Console, or custom operations platforms.
The actual meaning of 9443 depends heavily on the listening process. It may look like ordinary HTTPS, but behind it there may be a high-privilege management plane, configuration center, certificate management system, user permission console, audit settings, or infrastructure control panel.
If this port is exposed to the public internet, carefully review the authentication method, MFA, default accounts, weak passwords, management paths, TLS certificates, reverse proxy rules, source IP restrictions, and audit logging.
In production, 9443 is better placed behind a VPN, bastion host, internal management network, or centralized identity gateway. If public access is unavoidable, use strong authentication, least-privilege roles, rate limits, alerting, and explicit source access control.
RTP / VoIP Media
Common starting point for VoIP RTP media port ranges, often used to carry voice, video, or real-time media for SIP calls.
Details
UDP port 10000 is commonly used as the starting point for RTP/RTCP media port ranges, especially in Asterisk, FreeSWITCH, SIP gateways, PBX systems, and enterprise telephony platforms.
SIP ports such as 5060 and 5061 mainly handle registration, call setup, and session negotiation. The actual voice or video payload usually flows through RTP media ports. Many “call connects but there is no audio” issues are actually caused by RTP ports being blocked by NAT, firewalls, or security groups.
Port 10000 is only a common starting point, not a guarantee that a VoIP system uses a single fixed port. The real media range is usually a UDP port range and should be verified against the PBX, SBC, carrier trunk, or WebRTC/TURN configuration.
RTP media ports should only allow required peers and should be used together with SBCs, SRTP, QoS, NAT policy, and traffic monitoring. When exposed publicly, avoid overly broad allow rules to reduce probing, abuse, eavesdropping, and unexpected bandwidth consumption.
Kubelet API
Secure Kubelet API port that provides node-level management capabilities; one of the most sensitive high-privilege interfaces on a Kubernetes node.
Details
TCP port 10250 is the secure API port for Kubelet and runs on each Kubernetes node. It is used by the control plane, monitoring components, or authorized clients to query node status, Pod information, container logs, runtime metrics, and in controlled cases, perform node-level operations.
This port is highly sensitive because Kubelet sits close to the node and container execution boundary. If misconfigured, an attacker may be able to read container information, access logs, inspect workloads, or in more severe cases affect containers running on the node.
In production, 10250 should only be reachable from the Kubernetes API Server, trusted monitoring systems, and required cluster components. Authentication, authorization, and TLS verification should be enabled. Do not expose it directly to the public internet or broad internal networks for convenience.
When investigating 10250, check kubelet flags, certificate configuration, webhook authentication and authorization, Node authorizer, RBAC, network policies, firewall rules, and cloud security groups. If it is reachable from the internet, immediately restrict access and review for unauthorized exposure.
Kubelet Read-only
Legacy read-only Kubelet port once used to expose node, Pod, and container status; modern clusters should usually disable or strictly isolate it.
Details
TCP port 10255 is the legacy read-only HTTP port for Kubelet. It was historically used to read node status, Pod lists, container information, and some runtime metrics, often by monitoring systems or troubleshooting scripts.
The main concern with this port is that it has traditionally lacked strong authentication and authorization. Even if it is “read-only,” it may expose node names, namespaces, Pod names, images, labels, environment clues, internal service structure, and workload details.
Modern Kubernetes environments should generally avoid relying on 10255. Prefer protected access through 10250, metrics-server, kube-state-metrics, Prometheus scrape configurations, or the Kubernetes API Server.
If 10255 is found open, especially from the public internet, first check whether the kubelet read-only-port is still enabled. In production, it should be disabled or at least restricted to a trusted monitoring network, with collection migrated to authenticated and authorized endpoints.
kube-proxy healthz
kube-proxy health check port used to verify that the node network proxy is alive; normally only probed inside the cluster.
Details
TCP port 10256 is commonly used by the kube-proxy healthz endpoint. It allows local probes, load balancers, nodes, or cluster components to determine whether kube-proxy is running correctly.
kube-proxy maintains forwarding rules from Services to backend Pods, using implementations such as iptables, IPVS, or another data plane. Port 10256 is usually not an application entry point, but it reflects the health of the node networking proxy.
This port generally does not need to be exposed to the public internet or accessed by regular users. Public exposure usually does not mean direct cluster control, but it can leak component status and increase the discoverable surface of Kubernetes nodes.
When troubleshooting Service routing issues, review the 10256 health state together with kube-proxy logs, node forwarding rules, CNI health, NodePort ranges, firewalls, and security groups. In production, allow access only from inside the cluster or trusted monitoring systems.
kube-controller-manager
Secure kube-controller-manager port for internal Kubernetes control plane access, exposing health checks, metrics, and controller status.
Details
TCP port 10257 is the secure port for kube-controller-manager, usually running on Kubernetes control plane nodes. It exposes health checks, metrics, and controller-related status for control plane components or monitoring systems.
kube-controller-manager runs many control loops, including those for Nodes, Deployments, ReplicaSets, Endpoints, Namespaces, ServiceAccounts, and more. It is a core control plane component and should not be exposed like a normal application service.
Although 10257 is usually not a direct user-facing application endpoint, it is still an internal control plane interface. Improper exposure may reveal control plane health, metrics, version clues, or component topology, and it increases the chance of scanning and attack attempts.
In production, restrict 10257 to control plane nodes, local probes, and trusted monitoring systems, with TLS, authentication, authorization, network isolation, and auditing in place. If it is reachable from the public internet, immediately reduce exposure and review the control plane attack surface.
kube-scheduler
Secure kube-scheduler port for Kubernetes control plane scheduling components, exposing health checks, metrics, and scheduler status.
Details
TCP port 10259 is the secure port for kube-scheduler, usually running on Kubernetes control plane nodes. It is mainly used for health checks, metrics exposure, and scheduler status queries.
kube-scheduler selects suitable nodes for newly created or pending Pods. Its decisions consider resource requests, affinity, taints and tolerations, topology constraints, and scheduling policies, making it a critical control plane component.
Port 10259 should not be treated as a normal web port or business entry point. Even if the interface is mainly for health and metrics, it may expose scheduler status, version clues, control plane topology, or cluster runtime characteristics.
In production, restrict this port to the control plane, local probes, and trusted monitoring systems. When troubleshooting scheduling problems, review the 10259 health state together with scheduler logs, events, Pod pending reasons, node resources, and API Server connectivity.
Memcached
Default TCP port for Memcached, used for high-speed key-value caching; public exposure can lead to cache data leakage or unauthorized access.
Details
TCP port 11211 is the default service port for Memcached. It is commonly used by application servers to cache sessions, query results, configuration fragments, temporary objects, and frequently accessed key-value data to reduce database load and improve response speed.
Memcached is best deployed inside a trusted private network and often assumes that clients are already in a controlled environment. Many deployments are not designed as public, authenticated internet-facing services.
If 11211 is exposed to untrusted networks, attackers may enumerate or read cached values, write malicious cache entries, flush the cache, or infer business structure, session clues, and internal data patterns from cached content.
In production, Memcached should bind to a private or loopback address and only allow access from application servers. Use security groups, firewalls, VPC rules, container network policies, and narrow source ranges. If it is publicly reachable, close external access immediately and review whether sensitive data has been cached.
Memcached UDP
UDP port for Memcached, historically abused for reflection amplification attacks; modern deployments should usually disable or tightly restrict it.
Details
UDP port 11211 is the UDP access path for Memcached. It belongs to the same caching service family as TCP 11211, but its network behavior and exposure risk are more sensitive.
This port is particularly dangerous because Memcached over UDP has been widely abused in reflection amplification attacks. Attackers can spoof a victim address and cause exposed Memcached servers to send large response traffic toward that victim.
Even without direct compromise of the application, public UDP 11211 exposure can turn the server into an attack amplifier, causing bandwidth exhaustion, cloud provider enforcement, reputation damage, and compliance issues.
Production environments should usually disable Memcached UDP, or at minimum allow it only from trusted private networks. Check listen addresses, startup flags, firewalls, security groups, container port mappings, and cloud load balancer rules to make sure it is not accidentally exposed.
RabbitMQ Management
RabbitMQ management console port for queues, exchanges, connections, users, and cluster status; it should not be exposed as an open public admin interface.
Details
TCP port 15672 is the common web management port for the RabbitMQ Management plugin. Administrators use it to inspect queues, exchanges, bindings, connections, channels, consumers, users, permissions, vhosts, and cluster health.
This is not a normal business messaging port; it is an administrative interface. If exposed incorrectly, it can reveal queue structure, message backlog, connection sources, account configuration, and cluster topology.
With weak passwords, default accounts, excessive permissions, or unrestricted source access, 15672 may allow queues to be purged, permissions to be changed, messages to be inspected, or cluster configuration to be damaged.
In production, place 15672 behind a VPN, bastion host, private management network, or controlled reverse proxy. Use strong passwords, least-privilege accounts, TLS, access logging, and source restrictions. If it is public, review accounts, permissions, and access logs immediately.
Minecraft Bedrock
Default UDP port for Minecraft Bedrock Edition servers, used by Bedrock clients to connect to multiplayer servers.
Details
UDP port 19132 is the most common default port for Minecraft Bedrock Edition servers. It is used by mobile, console, Windows Bedrock, and other Bedrock clients to connect to multiplayer servers.
This port usually carries game connection and server discovery traffic, not a traditional administrative interface. Whether public exposure is appropriate depends on whether the server is meant for public players, a whitelist community, or private friends-and-family play.
For internet-facing servers, review access controls, player whitelists, server version, plugin or add-on safety, DDoS protection, resource limits, and logs. A game port is not as sensitive as a database port, but it can still be scanned, flooded, or affected by server-side vulnerabilities.
When troubleshooting connectivity, confirm that UDP, not TCP, is allowed. Also check router port forwarding, cloud security groups, host firewall rules, server bind address, Bedrock server configuration, and client version compatibility.
Minecraft
Default port for Minecraft Java Edition servers, used by players to connect to multiplayer game servers.
Details
TCP port 25565 is the most common default port for Minecraft Java Edition servers. Players use it to connect to multiplayer servers, private servers, modded servers, or public community servers.
This port is usually not an operating system management interface, but it directly exposes the game service. Whether it should be public depends on whether the server is intended for open players, whitelist access, or a private group.
When exposing 25565 to the internet, review the server version, plugin and mod sources, RCON configuration, player permissions, resource limits, DDoS protection, and logs. Many risks come not from the port number itself, but from outdated server builds, unsafe plugins, or incorrect permissions.
For connection failures, check whether TCP 25565 is allowed, whether the server is listening on the correct address, whether router or cloud security group forwarding points to the right host, and whether client version, server MOTD, online-mode authentication, and plugin compatibility are healthy.
RabbitMQ Inter-node
RabbitMQ inter-node communication port used for distributed Erlang node communication, message metadata synchronization, and cluster state maintenance.
Details
TCP port 25672 is commonly used for internal communication between RabbitMQ cluster nodes. It supports distributed Erlang traffic for cluster membership, queue metadata synchronization, state propagation, and coordination between nodes.
This is not a normal application client port and it is not the management console. Applications usually publish and consume messages through 5672 or 5671, while the web management UI commonly uses 15672. Port 25672 is primarily part of the RabbitMQ cluster infrastructure.
If 25672 is exposed to untrusted networks, attackers may probe RabbitMQ cluster topology, Erlang node communication surfaces, and internal deployment structure. Even without direct management access, exposing an inter-node port increases the attack surface.
In production, only RabbitMQ cluster members, controlled container networks, or private service subnets should be able to reach 25672. Restrict it with firewalls, security groups, Kubernetes NetworkPolicy, strict node naming, and careful Erlang cookie management.
When troubleshooting RabbitMQ nodes failing to join a cluster, frequent node disconnects, or unstable cluster state, check connectivity for 4369, 25672, 5672, 5671, and 15672. Also verify hostname resolution, matching Erlang cookies, firewall rules, and container network mappings.
Source Client Port
Common UDP client-side port for Source and GoldSrc games, usually involved in local game client communication and server interaction.
Details
UDP port 27005 is commonly seen in Source, GoldSrc, and some Steam game client networking scenarios. It is usually not a standalone public server endpoint, but a client-side or local auxiliary port used to exchange data with game servers, Steam networking components, or local game processes.
This port often appears alongside Source engine ports such as 27015, 27016, and 27020. Port 27015 is more commonly associated with game server connections and queries, 27020 may be used for SourceTV, query, or auxiliary traffic, while 27005 is more often associated with client-side or local game networking.
From a security perspective, 27005 is usually low risk by itself, but the actual listening process still matters. If it appears on an internet-facing server, verify whether it is really a game client component, a game service, a container mapping, or simply another service reusing the port.
When troubleshooting Source engine connection issues, missing server listings, or local multiplayer problems, check launch parameters, NAT mappings, firewall rules, UDP inbound and outbound policy, Steam query ports, and related ports such as 27005, 27015, 27016, and 27020.
Source Game Server
Common UDP port for Source engine game servers, typically used for player connections, server queries, and multiplayer game traffic.
Details
UDP port 27015 is one of the most common ports for Source, GoldSrc, and many Steam game servers. It is frequently used for player connections, server discovery, query responses, and multiplayer game traffic.
For a single game server, 27015 is often the default entry point. In multi-instance deployments, additional servers may use adjacent ports such as 27016 and 27017. The exact role should always be checked against server launch parameters, game type, and hosting provider configuration.
This port may be intentionally exposed to players, but it still needs basic protection. Public game servers should avoid exposing unnecessary management interfaces, use strong RCON credentials, and monitor for DDoS activity, query abuse, plugin vulnerabilities, malicious clients, and abnormal traffic patterns.
If players cannot join the server or the server does not appear in server lists, verify that UDP 27015 is listening, cloud security groups and host firewalls allow the traffic, NAT or port forwarding points to the right host, Steam query ports match the configuration, and the server bind address and launch parameters are correct.
Source Game Server Alt
Common alternate UDP port for Source engine game servers, often used for multi-instance deployments, adjacent servers, or a second game server slot.
Details
UDP port 27016 is commonly used by a second Source or GoldSrc game server instance, an alternate instance, or an adjacent game server port. Many multi-server deployments start at 27015 and then assign additional instances to 27016, 27017, and nearby ports.
Its exact purpose depends on the game server launch parameters and hosting platform configuration. It may be used for player connections, server queries, an alternate game room, a test server, or a specific instance entry point rather than representing a separate fixed protocol.
Opening 27016 to the public is usually done to let players reach a specific game instance, but only the required UDP ports should be exposed. Avoid exposing RCON, management panels, file managers, or host administration services alongside it.
When troubleshooting multi-instance game servers, common 27016 issues include port conflicts, multiple instances binding to the same port, NAT forwarding to the wrong container, cloud security groups allowing only 27015, mismatched query and game ports, or server IP and port parameters not being updated consistently.
MongoDB
Default MongoDB client connection port, commonly used by applications, command-line clients, and admin tools to access database instances.
Details
TCP port 27017 is the most common default connection port for MongoDB. Application services, mongosh, database drivers, and administration tools often use it to connect to MongoDB instances for queries, writes, index management, aggregation, and routine operations.
Port 27017 usually represents a real database entry point, not a simple web endpoint or health check. The service behind it may store user records, orders, logs, configuration, sessions, analytics events, or internal system state, so its exposure should be handled more carefully than ordinary application ports.
Exposing MongoDB directly to the internet is high risk, especially when authentication is disabled, passwords are weak, bindIp is too broad, test databases are accidentally promoted to production, backup instances are reachable from the internet, old defaults are still in use, or security groups are overly permissive.
In production, 27017 should normally be limited to application servers, bastion hosts, VPNs, private networks, or controlled database access ranges. Authentication, TLS, least-privilege users, IP allowlists, audit logging, backup policies, and abnormal connection monitoring should be enabled.
When troubleshooting connection failures, do not only check whether the port is open. Also verify the mongod bind address, authentication database, user permissions, TLS and certificate settings, replica set name, whether the client receives reachable replica set member addresses, and whether host firewalls or cloud security groups allow the current source.
MongoDB Shard
Common MongoDB shard server port, used by shard nodes that store actual data in a sharded cluster.
Details
TCP port 27018 is commonly used for MongoDB shard servers in sharded clusters. A shard stores a portion of the application data and works with mongos routers, config servers, other shards, and replica set members as part of the sharded database architecture.
Port 27018 is usually not the primary endpoint that applications should connect to directly. Most applications should connect to the mongos routing layer, which uses shard keys and cluster metadata to route requests to the correct shard. Direct shard access can bypass the intended access path and complicate troubleshooting and permission management.
If 27018 appears on an internet-facing asset, treat it as a serious finding. Shard nodes often contain real business data, and public exposure can lead to data reads, data modification, index damage, resource exhaustion, lateral movement, or disclosure of cluster topology.
In production, shard servers should be restricted to database networks, Kubernetes cluster networks, dedicated VPCs, or tightly controlled security groups. Access should normally be limited to mongos, internal cluster members, backup systems, and required operations entry points, with authentication, TLS, keyFile or x.509 internal auth, least-privilege roles, and audit logging enabled.
When troubleshooting sharded cluster issues, check shard replica set health, mongos routing configuration, config server metadata, shard key design, chunk migration, network latency, disk capacity, and connectivity among MongoDB-related ports such as 27017, 27018, and 27019.
MongoDB Config
Common MongoDB config server port, used to store sharded cluster metadata, routing information, and chunk distribution state.
Details
TCP port 27019 is commonly used for MongoDB config servers in sharded clusters. A config server does not primarily handle normal application reads and writes; instead, it stores critical cluster metadata such as sharding state, chunk distribution, routing information, and cluster configuration.
This port is essential to sharded cluster operation. mongos relies on config server metadata to decide which shards should receive a request. If config servers are unavailable or their metadata is unhealthy, applications may see query failures, routing errors, chunk migration problems, or blocked cluster administration tasks.
Port 27019 should not be exposed as a public entry point. Even though it may not look like a normal application database port, leaking or damaging config server metadata can affect the availability, data routing, and operational safety of the entire MongoDB sharded cluster.
In production, config servers should live in a strictly controlled internal network and should only be reachable by mongos, cluster members, and required operations or backup components. Authentication, TLS, internal cluster authentication, least privilege, audit logging, and reliable backups should be enabled, and ordinary applications should not connect directly to config servers.
When troubleshooting issues around 27019, focus on config server replica set health, connectivity from mongos to config servers, cluster metadata consistency, time synchronization, disk space, authentication settings, and version compatibility among shards, mongos routers, and config servers.
Source TV / Game Auxiliary
Auxiliary Source engine game port, commonly used for SourceTV, server queries, spectator replay, and related game traffic.
Details
UDP port 27020 is commonly seen in auxiliary communication for Source engine game servers, including SourceTV, spectator mode, replay features, server queries, or extra network traffic from related game components.
This port should usually not be interpreted in isolation. Its purpose is best confirmed together with nearby ports such as 27015, 27016, 27017, and 27005, as well as server launch parameters, game type, query port settings, and SourceTV configuration.
If players can join the server but server listing, spectator mode, replay, or query status behaves inconsistently, the issue may not be the main game port. Port 27020 or a related UDP port may be blocked, incorrectly mapped, or bound to the wrong interface.
Public game servers may expose this port when needed, but the allowed UDP range should stay as narrow as possible. During troubleshooting, check host firewalls, NAT rules, cloud security groups, container port mappings, and the actual game server configuration.
Kafka Internal / Advertised Listener
Common Kafka container or dual-listener port, used to separate broker addresses advertised to internal components and external clients.
Details
TCP port 29092 is commonly used in Kafka Docker Compose, Kubernetes, local development clusters, or deployments with separate internal and external listeners. It is usually not a new Kafka protocol port, but a broker listener chosen to distinguish internal and external access paths.
Kafka clients do more than connect to the initial bootstrap address. After connecting to a broker, they read the broker metadata returned through advertised.listeners and then connect to the advertised broker addresses. If 29092 or advertised.listeners is misconfigured, the first connection may succeed while producers or consumers later time out.
In containerized environments, 29092 often represents the container-network listener, while 9092, 9093, or 9094 may be used for host access, TLS, SASL, or external clients. The actual meaning depends on listeners, advertised.listeners, listener.security.protocol.map, and the network location of the client.
This port should normally be limited to Kafka clusters, application services, container networks, or private networks. Exposing a Kafka listener to the internet can lead to topic enumeration, unauthorized message reads or writes, consumer group disclosure, data pollution, or theft of business event streams.
When troubleshooting Kafka connectivity, check the listener configuration for 9092, 9093, 9094, and 29092, DNS resolution, Docker or Kubernetes networking, TLS/SASL settings, security groups, client bootstrap.servers, and whether the broker-advertised addresses are reachable from the client.
Kubernetes NodePort
Start of the default Kubernetes NodePort range, representing the lower boundary of Service ports exposed on node IPs.
Details
TCP port 30000 is the start of the default Kubernetes NodePort range, 30000-32767. A NodePort opens a fixed port on every node IP and forwards external traffic to the Service and its backing Pods.
Port 30000 does not identify one specific application by itself. It may map to a web service, API, monitoring endpoint, admin console, database proxy, game server, or almost any workload inside the cluster. The real risk depends on the exposed Service, backend Pods, and access controls.
NodePort is sometimes mistaken for an internal Kubernetes detail, but it creates a real network entry point on the nodes. If node IPs are reachable from the internet, the NodePort may also become internet-facing.
In production, services are usually better exposed through Ingress, LoadBalancer, gateways, private load balancers, or controlled reverse proxies rather than arbitrary NodePorts. When NodePort is required, document the service purpose, restrict sources, enable authentication, apply network policies, and keep access logs.
When troubleshooting NodePort access, check the Service type, nodePort value, kube-proxy status, node security groups, host firewall rules, Pod readiness, EndpointSlices, externalTrafficPolicy, and whether traffic actually reaches the target Pods.
Kubernetes NodePort
End of the default Kubernetes NodePort range, representing the upper boundary of node-level service exposure.
Details
TCP port 32767 is the end of the default Kubernetes NodePort range, 30000-32767. It represents the upper boundary of allocatable NodePort values and does not inherently identify a fixed business service.
If 32767 is open, first confirm whether a Kubernetes Service has actually been assigned this nodePort. In different clusters, the same NodePort value may point to completely different backends, such as a web service, internal API, monitoring component, admin console, or temporary test application.
The key risk of NodePort is that it binds a service to every node IP. If the node network is reachable, external users may be able to access backend services directly, especially when security groups, load balancer rules, and Ingress policies are not aligned.
Production clusters should regularly audit open ports in the 30000-32767 range and confirm that each NodePort has a clear business purpose, owner, access control model, and retirement plan. Services that do not need direct node-level exposure should usually use ClusterIP or a controlled gateway path instead.
For investigation, start with Kubernetes Service manifests, kubectl get svc output, kube-proxy rules, node listening ports, firewall policy, and cloud security groups to confirm whether 32767 is mapped to a Service and whether the backend matches expectations.
Dynamic/private
Dynamic / Ephemeral
Start of the IANA dynamic/private port range, commonly assigned temporarily by the operating system for client-side connections and short-lived sessions.
Details
TCP port 49152 is the start of the IANA dynamic/private port range. It is usually not the default listening port for a fixed service; instead, operating systems often choose ports from this range for temporary client-side connections.
Ports in this range commonly appear when browsers access websites, applications connect to databases, services call APIs, proxies forward traffic, containers make outbound connections, or test processes communicate locally. After the connection ends, the port is usually released and may later be reused by another process.
If a scan reports port 49152 as open, the port number alone is not enough to identify the service. Confirm the actual listening process, launch arguments, container port mappings, NAT rules, firewall policy, and connection direction on the host.
The port is low risk when used as a normal ephemeral client port, but the risk changes if an application is deliberately listening on it. Do not assume that a high-numbered dynamic-range port is automatically safe, and do not ignore it just because it belongs to the ephemeral range.
In production, dynamic ports usually should not be exposed as stable public entry points. If this port is persistently listening, verify whether it belongs to a real service, debug tool, reverse proxy backend, leftover test process, or unexpected program, and restrict access accordingly.
WireGuard
Common WireGuard UDP port, used to establish lightweight encrypted VPN tunnels and remote access links.
Details
UDP port 51820 is a common listening port for WireGuard. WireGuard uses UDP to build encrypted tunnels and is often used for remote access, site-to-site VPNs, cloud server networking, home network access, and lightweight private networks.
Unlike many traditional VPN stacks, WireGuard is relatively simple to configure. Its security depends on public/private key pairs, peer definitions, AllowedIPs, routing rules, and firewall policy. An open port does not automatically let anyone into the tunnel, but weak peer management, broad routes, or exposed keys can significantly expand internal access.
Port 51820 may be intentionally exposed to the internet for legitimate VPN clients, but it represents a boundary into a private network. Production deployments should protect private keys, review peers regularly, keep AllowedIPs narrow, monitor connection behavior, and avoid exposing unnecessary internal networks to remote devices.
When WireGuard cannot connect, common causes include UDP 51820 being blocked, incorrect NAT forwarding, missing cloud security group rules, wrong client Endpoint settings, conflicting AllowedIPs, disabled IP forwarding, or host firewall rules that do not allow tunnel-interface traffic.
If an internet scan finds 51820 open, confirm that it is really WireGuard, that it only serves expected peers, that no stale keys or former-user peers remain, and that the internal networks reachable through the tunnel follow least-privilege access.
Dynamic / Ephemeral
Highest valid TCP/UDP port number and the upper boundary of the dynamic/private port range.
Details
TCP port 65535 is the highest valid port number and the upper boundary of the IANA dynamic/private port range. It usually does not represent a fixed standard service and is more often seen in ephemeral connections, custom services, test setups, or unusual scan results.
During normal network communication, an operating system may choose high-numbered ports from the dynamic range as local client ports for short-lived outbound connections. The value 65535 is mainly a boundary value and has no special business meaning by itself.
If port 65535 is persistently listening, verify the actual process instead of treating it as just another dynamic port. Applications, proxies, debug tools, malware, misconfigurations, or leftover tests may use high ports to avoid conflicts or reduce visibility.
Investigation should combine ss, netstat, lsof, process command lines, container mappings, system logs, firewall rules, and external scan results. It is also important to distinguish between a temporary outbound client port and a true listening service exposed to other hosts.
Production systems usually should not use 65535 as a stable public entry point. If there is a valid business reason, document it clearly and add authentication, source restrictions, monitoring, and change records. If there is no clear purpose, close the listener or restrict it to a controlled network.
What this port reference helps you check
The page is built for practical network troubleshooting and asset review. It explains not only which service often uses a port, but also how that port behaves in real deployments and what exposure usually means.
-
Port-to-service lookup
Quickly map common port numbers to services such as SSH, DNS, HTTP, HTTPS, SMTP, IMAP, PostgreSQL, MySQL, Redis, RDP, Kubernetes, WireGuard, and other infrastructure components.
-
Protocol-aware explanations
Many services behave differently over TCP and UDP. The reference separates protocol entries where that distinction matters, such as DNS, DHCP, VPN protocols, discovery protocols, and monitoring traffic.
-
Exposure and risk guidance
Each entry includes risk level and exposure recommendation so a scan result can be interpreted as public, restricted, internal-only, or unsuitable for direct internet exposure.
-
Operations and security context
Descriptions include firewall, NAT, cloud security group, container, reverse proxy, mail, database, remote access, and VPN considerations that are common in production reviews.
How to use the port lookup
Use this page while reviewing scan output, firewall changes, cloud security groups, Docker or Kubernetes port mappings, VPN routes, or incident notes.
- 1
Search the exact port number first when you have a scan result or log entry.
- 2
Use the protocol filter when the same port has different TCP and UDP meanings.
- 3
Read the summary to identify the common service, then open details for deployment notes and security implications.
- 4
Compare related ports when a protocol uses multiple channels, such as FTP, DNS, mail, VPN, database, or web traffic.
- 5
Use the risk and exposure labels to decide whether the port should be public, restricted to trusted sources, internal only, or closed.
Information included in each port entry
Entries are structured for both fast lookup and deeper review during network operations, audit preparation, and troubleshooting.
- Port number, transport protocol, and common service name.
- Port range type: well-known, registered, or dynamic/private.
- Assignment status such as official, common convention, unofficial, deprecated, or reserved.
- Risk level and recommended exposure boundary.
- Deployment notes for firewalls, NAT, cloud security groups, containers, proxies, and remote access.
- Related ports that are often needed to understand the full protocol behavior.
- Source information when the entry is based on IANA, vendor documentation, implementation conventions, or common deployment practice.
Common use cases
A port number alone rarely tells the whole story. This reference helps connect the number to the service, protocol behavior, and exposure decision.
-
Firewall and security group review
Check whether a port should be open to the internet, limited to office IPs, restricted to private networks, or closed entirely.
-
Vulnerability scan triage
Turn scanner output into a clearer service inventory by identifying likely services, risk level, and the next host-level checks to perform.
-
Application deployment debugging
Confirm whether web servers, databases, queues, caches, mail services, VPNs, DNS, and admin services are listening on expected ports.
-
Network incident investigation
Understand whether an unexpected open port is a real service, a dynamic client port, a container mapping, a proxy backend, or a legacy device interface.
Port exposure best practices
Open ports should be treated as part of the system boundary. A port may be safe internally and risky when exposed to untrusted networks.
- Do not expose administrative ports such as SSH, RDP, database ports, cache ports, or management consoles without strong source restrictions and authentication controls.
- Use private networks, VPNs, bastion hosts, service meshes, or zero-trust access layers for internal services instead of opening them directly to the public internet.
- Document why a public port is open, which service owns it, which sources are allowed, and which monitoring or alerting applies.
- Check both TCP and UDP when troubleshooting protocols such as DNS, DHCP, VPNs, NTP, QUIC, and discovery traffic.
- Do not assume high-numbered ports are safe; confirm whether they are ephemeral outbound ports or real listening services.
- Review cloud security groups, host firewalls, container mappings, reverse proxy routes, and load balancer listeners together rather than in isolation.
Limitations and interpretation notes
Port references describe common usage. The real service behind an open port must still be verified on the host or infrastructure layer.
- A port number is not proof of a service. Custom deployments, proxies, containers, and malware can use non-standard ports.
- A closed external port does not always mean the service is absent; it may be restricted by firewall, security group, VPN, private routing, or source allowlists.
- An open UDP port can be harder to identify than TCP because many UDP services do not respond predictably to generic probes.
- Use host process listings, service configuration, firewall logs, flow logs, load balancer configuration, and application logs to confirm the real owner.
Port reference FAQ
Answers to common questions about usage, data handling, result checks, and practical limits.
01 What is the difference between TCP and UDP ports?
What is the difference between TCP and UDP ports?
TCP is connection-oriented and commonly used for web, SSH, databases, mail submission, and many admin protocols. UDP is connectionless and often used for DNS, DHCP, VPNs, NTP, QUIC, discovery, and real-time traffic. The same number can have different meanings depending on the protocol.
02 Are high-numbered ports safe to ignore?
Are high-numbered ports safe to ignore?
No. High-numbered ports are often ephemeral client ports, but applications can also listen on them intentionally. If a high port is persistently open, identify the process and owner before dismissing it.
03 Should database ports be public?
Should database ports be public?
Usually no. Database ports such as PostgreSQL, MySQL, MongoDB, Redis, SQL Server, and Elasticsearch should normally be private or restricted to trusted networks, application servers, VPNs, or controlled access layers.
04 Why does a port scan show a service I do not recognize?
Why does a port scan show a service I do not recognize?
The port may be used by a custom service, container mapping, reverse proxy backend, legacy process, device firmware, scanner fingerprinting error, or infrastructure component. Confirm with host-level process and firewall data.
05 Does opening a port always mean a security issue?
Does opening a port always mean a security issue?
Not always. Public web ports such as 80 and 443 are expected for websites. The risk depends on the service, authentication, patch level, exposure scope, logging, rate limiting, and whether the port matches the intended architecture.
Continue browsing more reference tools
Use the reference category for adjacent lookup pages when port review leads into HTTP status codes, MIME types, headers, DNS behavior, or other implementation details.