Back to Resources

Common Ports Cheat Sheet

Cheat Sheet

Quick reference for common network ports and their typical uses in SOC analysis. Includes well-known ports, registered ports, and common malicious ports.

Common Ports Cheat Sheet

Quick reference for common network ports and their typical uses in SOC analysis.

Well-Known Ports (0-1023)

PortProtocolServiceCommon UseSecurity Notes
20TCPFTP DataFile TransferOften blocked, use SFTP
21TCPFTP ControlFile TransferUnencrypted, security risk
22TCPSSHSecure ShellSecure remote access
23TCPTelnetRemote AccessUnencrypted, security risk
25TCPSMTPEmail (Outgoing)Email server communication
53TCP/UDPDNSDomain Name SystemCritical for network operations
80TCPHTTPWeb TrafficUnencrypted web traffic
88TCP/UDPKerberosAuthenticationWindows domain authentication
110TCPPOP3Email (Incoming)Email retrieval
135TCPRPCRemote Procedure CallWindows services
139TCPNetBIOSNetwork File SharingWindows file sharing
143TCPIMAPEmail (Incoming)Email retrieval
443TCPHTTPSSecure Web TrafficEncrypted web traffic
445TCPSMBServer Message BlockWindows file sharing
993TCPIMAPSSecure IMAPEncrypted email
995TCPPOP3SSecure POP3Encrypted email

Registered Ports (1024-49151)

PortProtocolServiceCommon UseSecurity Notes
1433TCPMSSQLMicrosoft SQL ServerDatabase access
1521TCPOracleOracle DatabaseDatabase access
3306TCPMySQLMySQL DatabaseDatabase access
3389TCPRDPRemote Desktop ProtocolWindows remote desktop
5432TCPPostgreSQLPostgreSQL DatabaseDatabase access
5900TCPVNCVirtual Network ComputingRemote desktop
8080TCPHTTP-ProxyWeb ProxyAlternative HTTP port
8443TCPHTTPS-AltAlternative HTTPSAlternative HTTPS port

Common Malicious Ports

PortProtocolCommon MalwareNotes
4444TCPMetasploitCommon backdoor port
5555TCPAndroid ADBAndroid debugging (can be abused)
6666-6669TCPIRCInternet Relay Chat (malware C2)
8080TCPVariousCommon malware C2 port
31337TCPBack OrificeClassic backdoor port

SOC Analysis Tips

Suspicious Port Activity

  • Non-standard ports for common services: HTTP on port 8080, 8443, etc.
  • High-numbered ports (>49151): Often used by malware to avoid detection
  • Ports commonly used by malware: 4444, 5555, 6666-6669, 31337
  • Unexpected outbound connections: May indicate data exfiltration

Common Attack Patterns

  • Port scanning: Sequential connection attempts to multiple ports
  • Brute force: Repeated connection attempts to same port (SSH 22, RDP 3389)
  • Backdoor ports: Unusual ports with active connections
  • Data exfiltration: Large outbound connections on non-standard ports

Firewall Rules

  • Default deny: Block all inbound, allow specific outbound
  • Whitelist approach: Only allow necessary ports
  • Monitor outbound: Track unusual outbound connections
  • Log everything: Log all blocked/allowed connections for analysis

Quick Reference Commands

Check Listening Ports

# Linux netstat -tulpn ss -tulpn # Windows netstat -ano

Check Connections

# Linux netstat -an | grep ESTABLISHED ss -tun # Windows netstat -an | findstr ESTABLISHED

Port Scanning (Authorized Testing Only)

# Nmap nmap -p 1-1000 target-ip nmap -p- target-ip # All ports

Last Updated: [Date]
Version: 1.0