Port Number Lookup
Search 200+ common TCP/UDP ports by number or service name. View protocol details, descriptions, and security notes. 100% client-side — no data leaves your browser.
Search Ports
Enter a port number or service name to find matching entries.
Complete Port Reference
| Port | Service | Protocol | Description | Security |
|---|
Understanding Network Ports and Protocols
Network ports are virtual endpoints for communication in computer networking. They are identified by 16-bit numbers (0 through 65535) and work alongside IP addresses to direct traffic to the correct application or service running on a host. When you connect to a website, your browser sends a request to port 443 (HTTPS) or port 80 (HTTP) on the web server. Understanding ports is essential for network security, firewall configuration, and troubleshooting connectivity issues in any environment from home networks to enterprise data centers.
Port Number Ranges
The Internet Assigned Numbers Authority (IANA) divides the port number space into three ranges. Well-known ports (0 to 1023) are assigned to widely used protocols like HTTP (80), HTTPS (443), SSH (22), and DNS (53). These ports typically require root or administrator privileges to bind to on most operating systems. Registered ports (1024 to 49151) are assigned by IANA to specific services upon request, including databases like MySQL (3306), PostgreSQL (5432), and MongoDB (27017), as well as application servers and middleware. Dynamic or private ports (49152 to 65535) are used for temporary connections, often as ephemeral source ports for client-side TCP connections.
TCP vs UDP
TCP (Transmission Control Protocol) provides reliable, ordered, and error-checked delivery of data between applications. It uses a three-way handshake to establish connections and guarantees that all packets arrive in the correct order. Most web traffic, email, file transfers, and database connections use TCP. UDP (User Datagram Protocol) is a simpler, connectionless protocol that trades reliability for speed. It is used for DNS queries, video streaming, VoIP, online gaming, and other applications where occasional packet loss is acceptable and low latency is critical. Some services like DNS (port 53) use both TCP and UDP depending on the query type and response size.
Security Considerations
Properly managing open ports is one of the most fundamental aspects of network security. Every open port represents a potential attack vector that must be monitored and protected. Legacy protocols like Telnet (port 23), FTP (port 21), and unencrypted HTTP (port 80) transmit data in plaintext and should be replaced with their encrypted alternatives SSH (22), SFTP/SCP (22), and HTTPS (443) whenever possible. Database ports like MySQL (3306) and PostgreSQL (5432) should never be exposed to the public Internet without strict access controls. Regular port scanning using tools like nmap helps identify unexpected open ports that could indicate misconfigurations or compromises.
Firewall and Cloud Security Groups
In cloud environments like AWS, Azure, and GCP, security groups and network ACLs control which ports are accessible. A common best practice is to follow the principle of least privilege, opening only the specific ports required for each service. For web servers, this typically means ports 80 and 443 for HTTP/HTTPS, and port 22 for SSH management access restricted to known IP addresses. Kubernetes clusters require additional ports like 6443 for the API server, 10250 for kubelet, and 2379-2380 for etcd, all of which should be carefully restricted to cluster-internal traffic.
Port Forwarding and NAT
Port forwarding (or port mapping) is a technique used in NAT (Network Address Translation) environments to redirect incoming traffic on a specific port to a different internal host and port. This is commonly used in home networks to make game servers, web servers, or remote desktop services accessible from the Internet. In enterprise environments, load balancers and reverse proxies perform similar functions, distributing incoming traffic across multiple backend servers. Understanding how ports map through these layers is essential for troubleshooting connectivity issues and maintaining secure network architectures.
100% Client-Side Processing
This port lookup tool operates entirely in your browser. The complete database of 200+ ports is embedded directly in the page, and all searching and filtering happens locally using JavaScript. No queries or data are ever sent to any server, making this tool safe to use in any security-sensitive environment.