Common Port Numbers Every Admin Should Know

A practical reference for the TCP and UDP ports that power modern network infrastructure

Web and Proxy Ports

Web traffic uses a handful of well-known ports that every administrator must know:

Use our port checker to verify whether your web server's ports are accessible from the internet, and our HTTP headers tool to inspect the response headers your server returns.

Email Ports

Email protocols use multiple ports depending on the function (sending vs receiving) and whether encryption is used:

Remote Access and File Transfer Ports

System administrators rely heavily on remote access protocols:

Database and Infrastructure Ports

Database ports are common attack targets and should never be directly exposed to the internet:

Network Services and Security-Related Ports

Essential infrastructure ports used for network operation and monitoring:

Use our port checker to test any of these ports on your external IP, and run a reverse IP lookup to see what services are associated with your address.

🛡️

Test Any Port in Seconds

Our port checker instantly shows whether any port on your IP is open, closed, or filtered

Hide My IP Now
Special Offer

Frequently Asked Questions

What are the most dangerous ports to leave open?

The highest-risk ports to expose to the internet are: RDP (3389) — targeted constantly by ransomware; SMB (445) — exploited by EternalBlue and similar; Telnet (23) — completely unencrypted; database ports (3306, 5432, 27017, 6379) — often misconfigured with no authentication; and any custom application port running without authentication. Never expose these without IP allowlisting.

How do I see which ports are open on my computer?

Use <code>netstat -an</code> on Windows, Mac, or Linux to list all listening and connected ports. On Linux, <code>ss -tlnp</code> gives more detail including which process owns each port. Use <code>nmap -sS 127.0.0.1</code> (requires root) for a scanner-style view. For external visibility, use our <a href="/port-checker">port checker</a> to see what's reachable from the internet.

Can I run a service on any port number?

Yes, with some restrictions. Ports below 1024 require root/administrator privileges on Unix-like systems. Any user process can bind to ports 1024–65535. Port numbers are just identifiers — the underlying protocol is determined by the software, not the port. However, deviating from standard ports (e.g., running SSH on port 2222) means clients must explicitly specify the port.

What is a privileged port?

On Unix/Linux systems, ports 0–1023 are 'privileged' (also called 'well-known') ports that require root privileges to bind to. This prevents unprivileged users from impersonating standard system services like HTTP (80) or SSH (22). On Windows, this restriction is less strictly enforced. Modern systems often use capabilities or socket activation (systemd) to allow services to bind privileged ports without running as root.

Special Offer×