LookMyIPLookMyIP
Blog/What Are Ports? Common Port Numbers Every Admin Should Know
Networking7 min read

What Are Ports? Common Port Numbers Every Admin Should Know

By LookMyIP Editorial

Learn what network ports are, how they work, the difference between TCP and UDP, and a reference guide to the most common port numbers used on the internet.

What Are Network Ports?

A network port is a virtual endpoint for communication on a computer. While an IP address identifies a device on a network, a port identifies a specific application or service running on that device.

Think of it this way: if an IP address is like a building's street address, a port number is like the suite number inside that building. The address gets you to the right building, and the suite number gets you to the right office.

Port numbers range from 0 to 65535. When your browser connects to a web server, it connects to the server's IP address on port 443 (for HTTPS). When you send an email, your mail client connects to the mail server on port 587 (for SMTP submission).

Port Number Ranges

Ports are divided into three ranges by IANA (Internet Assigned Numbers Authority):

Well-Known Ports (0–1023): Reserved for common, standardized services. These ports are assigned by IANA and typically require administrator/root privileges to use. Examples: HTTP (80), HTTPS (443), SSH (22), FTP (21), DNS (53).

Registered Ports (1024–49151): Used by software applications and services. Vendors can register ports with IANA for their applications. Examples: MySQL (3306), PostgreSQL (5432), Redis (6379), Minecraft (25565).

Dynamic/Ephemeral Ports (49152–65535): Temporarily assigned by the operating system for outgoing connections. When your browser connects to a website, the OS assigns a random port from this range as the source port for that connection.

TCP vs UDP Ports

Ports work with two transport protocols:

TCP (Transmission Control Protocol): Connection-oriented, reliable delivery. TCP establishes a connection (three-way handshake) before sending data and guarantees that all packets arrive in order. Used for: web browsing, email, file transfer, SSH — anything where data integrity matters.

UDP (User Datagram Protocol): Connectionless, faster but unreliable. UDP sends packets without establishing a connection or guaranteeing delivery. Used for: DNS queries, video streaming, online gaming, VoIP — anything where speed matters more than perfect delivery.

Many services use both TCP and UDP. DNS, for example, uses UDP for standard queries (faster) but falls back to TCP for large responses or zone transfers.

Essential Port Numbers Reference

PortProtocolServiceDescription
20/21TCPFTPFile Transfer Protocol (data/control)
22TCPSSHSecure Shell (remote login, SFTP)
23TCPTelnetUnencrypted remote login (deprecated)
25TCPSMTPEmail sending between servers
53TCP/UDPDNSDomain name resolution
67/68UDPDHCPAutomatic IP address assignment
80TCPHTTPUnencrypted web traffic
110TCPPOP3Email retrieval
143TCPIMAPEmail retrieval (synced)
443TCPHTTPSEncrypted web traffic
465TCPSMTPSEncrypted SMTP (legacy)
587TCPSMTP SubmissionEmail submission from clients
993TCPIMAPSEncrypted IMAP
995TCPPOP3SEncrypted POP3
3306TCPMySQLMySQL database
3389TCPRDPWindows Remote Desktop
5432TCPPostgreSQLPostgreSQL database
8080TCPHTTP AltAlternative HTTP / proxy
8443TCPHTTPS AltAlternative HTTPS

Use LookMyIP's Port Checker tool to test whether specific ports are open and reachable on your server or network.

Port Security Best Practices

Close unnecessary ports: Every open port is a potential attack vector. Only keep ports open that are actively needed for services you run.

Use non-standard ports for sensitive services: Moving SSH from port 22 to a non-standard port (e.g., 2222) reduces automated brute-force attempts. This is security through obscurity — not a substitute for proper authentication, but it reduces noise.

Firewall rules: Configure your firewall to explicitly whitelist required ports and block everything else. Review open ports regularly.

Port scanning awareness: Attackers use port scanners (like nmap) to discover open ports on your network. Regular self-scanning helps you identify and close unintended exposures. Use LookMyIP's Port Checker to see what ports are visible from the outside.

Keep services updated: An open port is only as secure as the service listening on it. Outdated software with known vulnerabilities is a primary entry point for attackers.

Try It Yourself

Use LookMyIP's free tools to look up IP addresses, check DNS records, verify SSL certificates, and more.