Port Lookup
Search and explore 110+ network ports with descriptions, protocols, known vulnerabilities, Wireshark filters, and security best practices.
Try Port Lookup →What It Does
The Port Lookup tool is a comprehensive reference database of 110+ common network ports used by IT professionals. Each port entry includes the service name, protocol (TCP/UDP), description, OSI layer, known vulnerabilities with CVE references, Wireshark display filters, and security best practices.How to Use It
- The Port Lookup is the default view when you visit 2network.app.
- Use the search bar to find ports by number (e.g.,
443), service name (e.g.,SSH), keyword (e.g.,database), or even CVE ID. - Click a filter chip to narrow results by category (Top 10, Critical Risks, Web, Email, VPN, Databases, Gaming, Infrastructure, IoT, DevOps).
- Click any port card to expand it and see the full detail view.
- In the detail view, click Copy Wireshark Filter to copy the display filter for packet analysis.
- Click View on NVD to open the NIST vulnerability database for that service.
Filter Categories
- Top 10 Essentials: The most critical ports every network engineer must know (FTP, SSH, HTTP, HTTPS, DNS, SMB, RDP, etc.).
- Critical Risks: Ports with critical-severity vulnerabilities (EternalBlue, BlueKeep, Log4Shell, etc.).
- Web & Browser: HTTP, HTTPS, proxies, and web application ports.
- Email: SMTP, POP3, IMAP, and their encrypted variants.
- File Transfer: FTP, SFTP, SMB, NFS, rsync.
- VPN & Remote: SSH, RDP, VNC, OpenVPN, WireGuard, IPsec.
- Databases: MySQL, PostgreSQL, MSSQL, MongoDB, Redis, Elasticsearch.
- Gaming: Minecraft, Steam/Source Engine.
- Infrastructure: DNS, DHCP, NTP, BGP, SNMP, Kerberos, Syslog.
- IoT & OT: Modbus, BACnet, MQTT, RTSP, S7comm.
- DevOps: Docker, Grafana, Prometheus, Elasticsearch, RabbitMQ, Jenkins.
Vulnerability Information
Each port card shows a severity indicator (red dot for critical, orange for high, yellow for medium, green for low). The detail view lists specific known threats with CVE IDs where available, plus a plain-English summary of the risk and recommended best practices.Wireshark Integration
Every port includes a pre-built Wireshark display filter. Click Copy Wireshark Filter in the detail view to copy it directly — then paste into Wireshark's filter bar for instant packet analysis. Filters follow official Wireshark syntax (e.g.,smb || smb2 || tcp.port==445).
Use Cases
- Firewall policy review: Look up what a port does before creating rules.
- Incident response: Identify suspicious ports and their known attack vectors.
- Network scanning: Cross-reference nmap results with vulnerability data.
- Packet analysis: Grab the right Wireshark filter for the protocol you're investigating.
- Training: Learn about common ports and their security implications.