Ports are essential for networking—they define how data is routed to specific services. In cybersecurity, knowing port numbers helps with firewall rules, network forensics, and attack detection.
📌 What Are Well-Known Ports?
Ranges from 0–1023
Assigned by IANA for standardised services
Used by operating systems and common applications
Most are TCP, UDP, or both
🔐 Common TCP Ports (Connection-Oriented)
Port
Protocol
Service
Description / Use Case
20
TCP
FTP (Data)
File Transfer Protocol (data channel)
21
TCP
FTP (Control)
Commands and login credentials for FTP
22
TCP
SSH
Secure remote login / file transfer (SCP, SFTP)
23
TCP
Telnet
Insecure remote shell—legacy system access
25
TCP
SMTP
Email sending (can be abused for spam relays)
53
TCP/UDP
DNS
Resolves hostnames to IP addresses
80
TCP
HTTP
Unencrypted web traffic
110
TCP
POP3
Legacy email retrieval
143
TCP
IMAP
Email retrieval (more flexible than POP3)
443
TCP
HTTPS
Secure web traffic using SSL/TLS
465
TCP
SMTPS
Secure SMTP (legacy)
993
TCP
IMAPS
Secure IMAP
995
TCP
POP3S
Secure POP3
3306
TCP
MySQL
Default MySQL database port
3389
TCP
RDP
Remote Desktop Protocol (Windows)
8080
TCP
HTTP-alt
Often used for proxy servers or development servers
📡 Common UDP Ports (Connectionless)
Port
Protocol
Service
Description / Use Case
53
UDP
DNS
Faster hostname resolution using UDP (TCP for large responses)
67
UDP
DHCP (Server)
Dynamic Host Configuration Protocol – server replies