Well Known Port Numbers

I will probably build a whole section out of this page later this month. For now here is a list of all the "Well Known Port Numbers" based upon RFC1700 and

Do you want to perform searches for ports that are used by Trojans and Viruses? Try the Trojan port search engine found on my Other Search Tools page.

You should also read the following pages:

Sponsored Content

Read the Best Personal and Business Tech without Ads

Staying updated on what is happening in the technology sector is important to your career and your personal life but ads can make reading news, distracting. With Thurrott Premium, you can enjoy the best coverage in tech without the annoying ads.

Your browser does not support inline frames or is currently configured not to display inline frames.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Download this eBook!

External Sharing and Guest User Access in Microsoft 365 and Teams

his eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure. The eBook will also outline some of the major decision points across four general-purpose guest access policy scenarios for how an organization can set this up with standard licensing.

Download Now

Sponsored By