Port Scanner Tool
This port scanner tool allows you to check which ports are open on any server or IP address. Enter a hostname or IP address below to start scanning.
Important: Only scan hosts that you have permission to scan. Port scanning without authorization may be illegal in some jurisdictions.
Understanding Port Scanning
Port scanning is a technique used to identify open ports and services running on a network host. It's an essential tool for network administrators and security professionals to assess network security, but it can also be used by attackers to find potential vulnerabilities.
What is a Port?
In networking, a port is a virtual point where network connections start and end. Ports are software-based and managed by a computer's operating system. Each port is associated with a specific process or service, allowing computers to differentiate between different kinds of traffic.
Common Port Numbers and Services
Web Services
- Port 80: HTTP - Standard web browsing
- Port 443: HTTPS - Secure web browsing
- Port 8080: HTTP Alternate - Often used for web proxies
Email Services
- Port 25: SMTP - Sending email
- Port 110: POP3 - Receiving email
- Port 143: IMAP - Email retrieval
- Port 465: SMTPS - Secure email sending
- Port 993: IMAPS - Secure email retrieval
File Transfer
- Port 20: FTP Data - File transfers
- Port 21: FTP Control - FTP commands
- Port 22: SSH/SFTP - Secure file transfers
- Port 115: SFTP - Secure FTP
Database Services
- Port 1433: MSSQL - Microsoft SQL Server
- Port 1521: Oracle - Oracle Database
- Port 3306: MySQL/MariaDB - MySQL Database
- Port 5432: PostgreSQL - PostgreSQL Database
Why Scan Ports?
Port scanning serves several legitimate purposes:
- Security Auditing: Identifying potential security vulnerabilities in your network
- Network Inventory: Discovering what services are running on your network
- Troubleshooting: Verifying if specific services are accessible and responding
- Firewall Testing: Checking if your firewall rules are working correctly
Port Scanning and Security
While port scanning is a valuable tool for network administrators, it's important to use it responsibly:
- Only scan systems you own or have explicit permission to scan
- Be aware that port scanning may trigger intrusion detection systems
- Some jurisdictions may consider unauthorized port scanning illegal
- Regularly scan your own systems to identify and address security vulnerabilities