Network port scanning
The Port Scan tool provides you with information about valid network connection methods. Scan your network for open ports and determine if these open ports need to be closed to ensure greater network security and fewer vulnerabilities.
What is a port?
Network ports are used to route incoming information from the network to specific applications on a specific computer. Example: If you want to enable Remote Desktop on a Windows computer on the network, you need to make sure that port 3389 is open and forwarded to the appropriate computer.
What is a port scanner?
The Port Scanner tool shows which ports on the network are open for communication. Whether a port is open can be helpful in setting up IP security cameras, determining if the network is secure, and other network-related operations.
Types of scans
Enter a valid IP address or URL at the top of the page to get started. You can then scan ports for IP/URLs individually or in prepared packets.
- To scan individually, select "individual", enter a valid port number, and select "Scan". The tool displays the status of the selected port under the "Scan" button.
- To scan by packet type, select "Packet" and choose a packet from the drop-down menu. The ports included in the packet are then displayed below the drop-down list. After making your selection, select "Scan". The tool displays the status of each port in the package below the "Scan" button.
- To scan by number range, select "Range", enter a valid port number for the beginning and another valid port number for the end, and select "Scan". The tool then displays the status of each port between the start and end ports, also under the "Scan" button.
- To scan a custom packet, select the "Custom" option, enter each port to be scanned on a custom line in the text box that appears, and select "Scan". The tool then displays the status of each specified port below the scan button.
Port Scan Packages
- 21 - File Transfer Protocol (FTP)
- 22 - Secure File Transfer Protocol (SFTP)
- 25 - Simple Mail Transfer Protocol (SMTP)
- 26 - [threat] W32.Netsky
- 80 - Hypertext Transfer Protocol (HTTP)
- 110 - Post Office Protocol v3 (POP3)
- 143 - Internet Message Access Protocol (IMAP)
- 443 - Hypertext Transfer Protocol over TLS/SSL (HTTPS)
- 587 - Simple Mail Transfer Protocol (Often more secure than port 25
- 993 - Internet Message Access Protocol over TLS/SSL (IMAPS)
- 995 - Post Office Protocol 3 over TLS/SSL (POP3S)
- 2525 - Remote Access Trojans
- 3306 - MySQL database system
Web - Scans ports in the Basic Package plus the ports below
- 23 - Telnet protocol - unencrypted text communications
- 43 - WHOIS protocol
- 53 - Domain Name System (DNS)
- 67 - Dynamic Host Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP) server
- 68 - Dynamic Host Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP) client
- 69 - Trivial File Transfer Protocol (TFTP)
- 123 - Network Time Protocol (NTP) - time synchronization
- 137 - NetBIOS Name Service
- 138 - NetBIOS Datagram Service
- 139 - NetBIOS Session Service
- 161 - Simple Network Management Protocol (SNMP)
- 162 - Simple Network Management Protocol Trap (SNMPTRAP)
- 389 - Lightweight Directory Access Protocol (LDAP)
- 636 - Lightweight Directory Access Protocol over TLS/SSL (LDAPS)
- 989 - FTPS Protocol (data), FTP over TLS/SSL
- 990 - FTPS Protocol (control), FTP over TLS/SSL
- 2077 - TrelliSoft Agent
- 2078 - TrelliSoft Server
- 2082 - cPanel default
- 2083 - Secure RADIUS Service (radsec)
- 2086 - WebHost Manager default
- 2087 - WebHost Manager default SSL
- 2095 - cPanel web mail default
- 2096 - cPanel SSL web mail default
- 1725 - Valve Steam Client
- 2302 - ArmA and Halo: Combat Evolved
- 3074 - Xbox Live and/or Games for Windows Live
- 3724 - World of Warcraft
- 6112 - Blizzard's Battle.net Gaming Service
- 6500 - Gamespy Arcade, Unreal, Tony Hawk, Warhammer, Starwars, Civilization III and IV, BoKS Master, Command & Conquer
- 12035 - Linden Lab viewer to sim on SecondLife
- 12036 - Second Life
- 14567 - Battlefield 1942
- 25565 - Minecraft Dedicated Server
- 27015 - GoldSrc and Source engine dedicated server port
- 28960 - Call of Duty
- 1080 - W32.Beagle, WinHole, W32.HLLW.Deadhat, and several others like keyloggers, remote peekers, etc.
- 2745 - Bagle Virus Backdoor
- 3127 - W32.Mockbot, W32.Solame, and others
- 4444 - Metasploit's default listener port
- 5554 - W32.Dabber and W32.Sasser
- 8866 - W32.Beagle
- 9898 - CrashCool and W32.Dabber
- 9988 - Used by many trojans and worms
- 12345 - Used by many trojans and worms
- 27374 - Used by many trojans, remote access hacks, worms, etc.
- 31337 - Used by many trojans and worms