Common ports

Common ports reference

Port number, protocol, service, and security notes for 60+ commonly encountered ports

PortProtoServiceDescription / Notes
22TCPSSHSecure Shell — encrypted remote access, SFTP, tunneling
Default port — change in hardened configs. Brute-force magnet.
23TCPTelnetUnencrypted remote terminal
Cleartext credentials. Never use. Presence = legacy or misconfigured system.
3389TCPRDPRemote Desktop Protocol — Windows remote desktop
High-value lateral movement target. BlueKeep (CVE-2019-0708). NLA bypass attacks.
5985TCPWinRM HTTPWindows Remote Management (HTTP)
PowerShell remoting. Evil-WinRM for lateral movement. Often overlooked in firewall rules.
5986TCPWinRM HTTPSWindows Remote Management (HTTPS)
5900TCPVNCVirtual Network Computing — remote desktop
Often weak/no authentication on IoT and legacy systems. Shodan-exposed frequently.
80TCPHTTPHypertext Transfer Protocol — unencrypted web
Cleartext. Modern sites redirect to 443. Intercept with Burp/mitmproxy.
443TCPHTTPSHTTP over TLS — encrypted web
8080TCPHTTP-altAlternative HTTP — dev servers, proxies, Tomcat
Commonly unauthenticated admin interfaces. Tomcat manager default.
8443TCPHTTPS-altAlternative HTTPS — dev/admin panels
8888TCPHTTP-altJupyter notebooks, various dev servers
Jupyter often runs without auth on default config.
3000TCPHTTP-devNode.js/React dev servers, Grafana
25TCPSMTPSimple Mail Transfer Protocol — MTA to MTA relay
Open relay = spam source. Should only accept from authorized MTAs.
587TCPSMTP-subSMTP Submission — client to MTA (STARTTLS)
465TCPSMTPSSMTP over SSL (deprecated but still used)
110TCPPOP3Post Office Protocol v3 — email retrieval (cleartext)
Cleartext credentials. Use POP3S (995) instead.
995TCPPOP3SPOP3 over SSL
143TCPIMAPInternet Message Access Protocol — email (cleartext)
Cleartext. Use IMAPS (993).
993TCPIMAPSIMAP over SSL
21TCPFTPFile Transfer Protocol control channel — cleartext
Cleartext credentials and data. Anonymous FTP common on old systems. Use SFTP/FTPS.
20TCPFTP-dataFTP active mode data channel
990TCPFTPSFTP over SSL (implicit)
69UDPTFTPTrivial FTP — no auth, used for PXE boot, network device config
No authentication. Used by network devices for config/firmware. Often forgotten.
445TCPSMBServer Message Block — Windows file sharing, AD
EternalBlue/WannaCry (CVE-2017-0144). Relay attacks (NTLM). Block at perimeter always.
139TCPNetBIOS-SSNNetBIOS Session — legacy SMB over NetBIOS
2049TCP/UDPNFSNetwork File System
Often misconfigured with world-readable exports. Check /etc/exports.
389TCP/UDPLDAPLightweight Directory Access Protocol — cleartext
Cleartext. LDAP null bind often allowed. Enumerate AD with ldapsearch.
636TCPLDAPSLDAP over SSL
3268TCPGC LDAPActive Directory Global Catalog
88TCP/UDPKerberosKerberos authentication — Active Directory
Kerberoasting: request TGS for SPNs → crack offline. AS-REP roasting targets no-preauth accounts.
464TCP/UDPKerberos PWKerberos password change
53TCP/UDPDNSDomain Name System — UDP for queries, TCP for zone transfers and large responses
DNS tunneling C2 (iodine, dnscat2). Zone transfer (AXFR) exposes all records. DNS exfil via subdomains.
67UDPDHCP-serverDHCP server — assigns IP addresses
Rogue DHCP server can redirect traffic. DHCP starvation attack.
68UDPDHCP-clientDHCP client
123UDPNTPNetwork Time Protocol
NTP amplification DDoS. Monlist command exposes client list.
161UDPSNMPSimple Network Management Protocol — monitoring
Community string "public" default. v1/v2c cleartext. SNMP walk reveals full device config.
162UDPSNMP-trapSNMP trap receiver
514UDPSyslogSystem log forwarding — cleartext
Cleartext UDP. Log injection possible. TCP syslog (514/TCP) more reliable.
1433TCPMSSQLMicrosoft SQL Server
xp_cmdshell for RCE if sysadmin. SA account brute-force common.
1434UDPMSSQL-monMSSQL Browser/Monitor
3306TCPMySQLMySQL / MariaDB
Root with no password default on some installs. UDF injection for code execution.
5432TCPPostgreSQLPostgreSQL database
6379TCPRedisRedis in-memory database
No auth by default. Write SSH keys, cron jobs, or webshells via Redis CONFIG SET.
27017TCPMongoDBMongoDB database
No auth by default. Massive data breaches from exposed instances.
9200TCPElasticsearchElasticsearch REST API
No auth by default. Read/write all data via HTTP.
5601TCPKibanaElasticsearch Kibana UI
500UDPIKEIPsec IKE — VPN key exchange
4500UDPIPsec NAT-TIPsec NAT traversal
1194TCP/UDPOpenVPNOpenVPN
51820UDPWireGuardWireGuard VPN
1723TCPPPTPPoint-to-Point Tunneling Protocol — deprecated
Cryptographically broken. Do not use.
179TCPBGPBorder Gateway Protocol — internet routing
520UDPRIPRouting Information Protocol
2181TCPZooKeeperApache ZooKeeper — distributed coordination
No auth by default. Access = read/write all ZK data including Kafka configs.
9092TCPKafkaApache Kafka message broker
2375TCPDockerDocker daemon API (unencrypted)
Exposed Docker socket = root on host. Trivial container escape → host access.
2376TCPDocker TLSDocker daemon API (TLS)
6443TCPK8s APIKubernetes API server
Unauthenticated access = cluster takeover. Often exposed in cloud misconfigs.
10250TCPKubeletKubernetes Kubelet API
Unauthenticated kubelet allows exec into any pod on the node.
111TCP/UDPRPCbindRPC portmapper
Enumerate NFS/NIS services. Often a pivot point for NFS exploitation.
135TCPMS-RPCMicrosoft RPC endpoint mapper
WMI, DCOM, PsExec all use this. Required for many Windows remote operations.
137UDPNetBIOS-NSNetBIOS name service
NBNS poisoning with Responder. Should not be exposed outside LAN.
138UDPNetBIOS-DGMNetBIOS datagram service
623UDPIPMIIntelligent Platform Management Interface
IPMI 2.0 RAKP auth flaw allows offline hash crack. Cipher 0 bypass. High-value target.
64 / 64 ports · amber rows have security notes