What Is Port Scanning?

Port scanning is the process of probing a host's network ports to discover which ones are open, closed, or filtered. It is a fundamental technique used by network administrators to audit their own infrastructure, by security researchers to assess attack surface, and by attackers to identify services they can target. Scan your own public IP with our port scanner to see what services you're exposing.

Common Port Scanning Techniques

TechniqueHow It WorksDetectabilitySpeed
TCP Connect ScanCompletes the full 3-way TCP handshake - Logged by targetHigh - Appears in connection logsSlow
SYN Scan (half-open)Sends SYN, waits for SYN-ACK, sends RST without completing handshakeMedium - May not appear in app logsFast
UDP ScanSends UDP packets; closed ports return ICMP unreachableLowVery slow
FIN / XMAS / NULL ScanSends packets with unusual TCP flags to bypass some firewallsLowSlow
Idle ScanUses a third-party "zombie" host as a proxy; hides scanner's IPVery LowVery slow
Version Detection (-sV)Probes open ports to identify service version and OSHighSlow

Well-Known Port Numbers

PortProtocolService
21TCPFTP - File Transfer Protocol
22TCPSSH - Secure Shell
25TCPSMTP - Outbound email
53TCP/UDPDNS - Domain Name System
80TCPHTTP - Web traffic
443TCPHTTPS - Encrypted web traffic
3389TCPRDP - Windows Remote Desktop
5900TCPVNC - Remote desktop
8080TCPHTTP alternate / proxy

Protecting Against Unauthorized Port Scans

  • Keep a firewall in front of your public IP that defaults to dropping all unsolicited inbound connections.
  • Close or disable services you don't actively use - Every open port is a potential attack surface.
  • Move SSH from port 22 to a high non-standard port - This won't stop a determined attacker but eliminates nearly all automated scanning noise.
  • Use an IDS/IPS (Intrusion Detection/Prevention System) like Fail2Ban or Snort to detect and block scanning behavior.
  • Regularly scan your own network with our port scanner or nmap to audit what is actually exposed. Also check for blacklist listings that indicate your IP has been flagged for suspicious activity.