← All Docs

Port Lookup

Search and explore 110+ network ports with descriptions, protocols, known vulnerabilities, Wireshark filters, and security best practices.

Try Port Lookup →

What It Does

The Port Lookup tool is a comprehensive reference database of 110+ common network ports used by IT professionals. Each port entry includes the service name, protocol (TCP/UDP), description, OSI layer, known vulnerabilities with CVE references, Wireshark display filters, and security best practices.

How to Use It

  1. The Port Lookup is the default view when you visit 2network.app.
  2. Use the search bar to find ports by number (e.g., 443), service name (e.g., SSH), keyword (e.g., database), or even CVE ID.
  3. Click a filter chip to narrow results by category (Top 10, Critical Risks, Web, Email, VPN, Databases, Gaming, Infrastructure, IoT, DevOps).
  4. Click any port card to expand it and see the full detail view.
  5. In the detail view, click Copy Wireshark Filter to copy the display filter for packet analysis.
  6. Click View on NVD to open the NIST vulnerability database for that service.

Filter Categories

  • Top 10 Essentials: The most critical ports every network engineer must know (FTP, SSH, HTTP, HTTPS, DNS, SMB, RDP, etc.).
  • Critical Risks: Ports with critical-severity vulnerabilities (EternalBlue, BlueKeep, Log4Shell, etc.).
  • Web & Browser: HTTP, HTTPS, proxies, and web application ports.
  • Email: SMTP, POP3, IMAP, and their encrypted variants.
  • File Transfer: FTP, SFTP, SMB, NFS, rsync.
  • VPN & Remote: SSH, RDP, VNC, OpenVPN, WireGuard, IPsec.
  • Databases: MySQL, PostgreSQL, MSSQL, MongoDB, Redis, Elasticsearch.
  • Gaming: Minecraft, Steam/Source Engine.
  • Infrastructure: DNS, DHCP, NTP, BGP, SNMP, Kerberos, Syslog.
  • IoT & OT: Modbus, BACnet, MQTT, RTSP, S7comm.
  • DevOps: Docker, Grafana, Prometheus, Elasticsearch, RabbitMQ, Jenkins.

Vulnerability Information

Each port card shows a severity indicator (red dot for critical, orange for high, yellow for medium, green for low). The detail view lists specific known threats with CVE IDs where available, plus a plain-English summary of the risk and recommended best practices.

Wireshark Integration

Every port includes a pre-built Wireshark display filter. Click Copy Wireshark Filter in the detail view to copy it directly — then paste into Wireshark's filter bar for instant packet analysis. Filters follow official Wireshark syntax (e.g., smb || smb2 || tcp.port==445).

Use Cases

  • Firewall policy review: Look up what a port does before creating rules.
  • Incident response: Identify suspicious ports and their known attack vectors.
  • Network scanning: Cross-reference nmap results with vulnerability data.
  • Packet analysis: Grab the right Wireshark filter for the protocol you're investigating.
  • Training: Learn about common ports and their security implications.