Please enter your username and password.

Do you need to reset your password ?

Your web browser has JavaScript disabled which is required in order to properly use the foundryvtt.com website. Certain website features will be disabled or will not work as expected unless JavaScript is enabled.

The Foundry Virtual Tabletop website uses cookies to store and identify your user session.

To use the website you must agree to our Privacy Policy and Terms of Service .

Please confirm your understanding and acceptance of these policies to proceed.

Port Forwarding

As with any server software, hosting Foundry VTT can require some network configuration to allow users to connect. It is also possible to use some simple network configuration for convenience or to provide some additional, more advanced features of FVTT (such as Audio/Video Chat Integration ). This article will introduce you to the following topics:

What is Port Forwarding?

Port forwarding is a topic that is often seen with some nervousness or frustration from users due to past negative experiences with configuration. To allow users to connect to your home network, however, some level of port forwarding is necessary.

To take some of the mystery and complexity away from port forwarding and explain it simply, let's use an analogy:

Think of your home network like an apartment building. The building has a front desk where a security guard directs visitors to the apartment they're looking for. The apartment building has an address, but every apartment in the building has an apartment number. In our case: The apartment building is your home network. Its street address is your WAN IP (or Internet IP) address, assigned by your Internet Service Provider. The security guard is your router, and has a registry of all the apartment numbers. Your apartment is your computer. Your apartment number is your computer's LAN (or Local) IP address the other residents are the devices connected to your network, such as your phone, your smart TV, or your printer. Suppose someone wants to visit you - they would receive an invitation to the address of the building (YOUR WAN/LOCAL IP), and upon arriving they would ask the security guard (ROUTER) how to find your apartment (YOUR COMPUTER). The security guard (ROUTER) would then check its list of apartment numbers (DEVICES) to find your apartment number (YOUR COMPUTER'S LAN IP ADDRESS) before directing them to your apartment (YOUR COMPUTER). In order to tell the security guard that it's okay to send people to your apartment, however, the security guard needs permission (A PORT FORWARDING RULE). Simplified completely, connections trying to reach your computer have to follow this path: Their computer → Internet → Your Router (WAN IP) → Your Computer(LAN IP)

What port forwarding does is it helps to send users which are trying to connect to your WAN/INTERNET IP address to the correct LAN/LOCAL IP address. It does this by way of a port number which tells your router what kind of connection it is. For Foundry Virtual Tabletop, when traffic arrives at your WAN IP address on port 30000 (or an alternative port you can choose in the Setup menu), the port forwarding rule will automatically send the connections to your computer's LAN/LOCAL IP address.

When is Port Forwarding Not Required?

Under some circumstances, port forwarding may not be required:

  • If you have an IPv6 address you probably do not need to port forward. IPv6 is an expanded protocol which is able to refer to specific device IPs. In this case, all you should have to do is configure your firewall to allow connections as per the firewall section of this article.
  • If you are using a router which supports Universal Plug and Play (UPnP) and has that feature enabled you probably do not need to port forward. Some negative interactions between routers and UPNP can result in connection issues. If you experience connection issues while using UPnP, please disable it and manually port forward.

How do I Port Forward?

The exact steps necessary in order to port forward vary depending on you router and the interface it provides, but at a high level process is the same in all cases. Some screenshots are provided for assistance with Windows use cases, although the process uses similar concepts for macOS or Linux.

Note: Before beginning to set up a manual port-forwarding rule, it is beneficial to disable UPnP from the Foundry VTT main menu.

Windows IP Config Command

  • Access your network router configuration panel. Usually you do this by visiting your router's IP address in a web browser. You can learn your router's IP address by looking at the Default Gateway field of the ipconfig command on Windows. For most router models this address is 192.168.0.1 .
  • Discover your computer's local IP address by referring to the IPv4 Address field of the ipconfig command.
  • Access the Port Forwarding section of your router configuration panel. The router interface will depend on the model, but some instructions for specific router models are available on the portforward website: https://portforward.com/router.htm
  • Forward traffic on TCP for the port you are using for Foundry Virtual Tabletop ( 30000 by default) to your local IPv4 address. The image below illustrates an example using the management interface of my router (yours will look different).
  • Once you have applied the port forwarding rule, restart the Foundry Virtual Tabletop software and verify that it is working properly by having a friend connect to your game or by using the Open Port Check Tool . Note that even if the port forwarding rule is applied correctly the port will not show as open unless Foundry VTT is actively running.

If you are trying to test if port-forwarding is working by connecting to the 'internet' invitation link from your hosting computer, it will commonly fail as most routers do not provide support for this type of connection. Try using a smartphone through cellular data, instead.

Port Forwarding Example

Firewall Configuration

Most modern operating systems come pre-equipped with a built in firewall designed to prevent incoming connections and stop unwanted access to your computer. For the most part, these firewall softwares should be automatically configured when opening Foundry VTT through an Operating System level prompt which will ask if you wish to allow incoming connections. However, in some cases (particularly Windows Firewall) it is necessary to manually allow connections to FVTT through your firewall.

As this most commonly arises related to Windows Defender, the following steps are provided:

Windows Defender Firewall

  • Navigate to Control Panel, System and Security and Windows Firewall.
  • Select Advanced settings and highlight Inbound Rules in the left pane.
  • Right click Inbound Rules and select New Rule.
  • Add the port you need to open (30000) and click Next.
  • Add the protocol (TCP) and the port number (30000) into the next window and click Next.
  • Select "Allow the connection" in the next window and click Next.
  • Select the network type (both) and click Next.
  • Name the rule something meaningful and click Finish.

About IPv6 and Firewalls

While IPv6 does not require port forwarding, it does require access to the ports on the hosting device. This means that any firewall software must be configured to allow connection on that port for IPv6 connections.

Frequently Asked Questions

What if my internet IP address changes?

If your public IP address changes, you don't need to make any change to your port forwarding rule. The forwarding rule only needs to change if your local IP address changes.

What if my local IP address changes?

Whenever your device reconnects to your local network there is a possibility that your local IP address will change. If this happens your existing port forwarding rule will now be directing traffic to the wrong place and you will need to update the rule accordingly. The best way to avoid this issue is to configure a DHCP Reservation which always assigns your computer the same local IP address. There are two ways to accomplish this:

1. Most routers support a DHCP Reservation utility which can be configured to always assign your device the same IP address.

2. Alternatively, you can configure your Windows adapter to request a specific IP address when it connects to the network. Review the following knowledge base article to learn how to request a manual DHCP assignment: https://support.microsoft.com/en-us/help/15089/windows-change-tcp-ip-settings

It just doesn't work, HELP!

Even if you followed these instructions carefully there are situations in which this approach will not work for you. Common examples include university or community networks with a "router behind a router" configuration where you do not have control over the outer layer of routing. In such cases there are a few fallback options which you can explore:

  • Using a Virtual Private Network (VPN) which mimics a local area network that all participants connect to externally. Using a VPN will rely on all your players installing and using the same VPN software, so it imposes some additional setup overhead. Popular VPN options include ZeroTier or Hamachi . There are some downsides of a VPN including more setup steps for your players as well as possibly slower network transfer speeds so it is not recommended unless conventional port forwarding is impossible.
  • Hosting a dedicated server using a cloud host. Instead of self-hosting the application on your own PC, you can host Foundry Virtual Tabletop in the cloud where your server is available for all players (including yourself) to connect using a web browser. See the Hosting Options Guide page for instructions. There are numerous advantages of running a dedicated server for Foundry VTT - but a disadvantage of this approach is that it will impose some additional cost and may be too complex to set up for non-technical users.
  • Utilize one of the premium hosting providers which specialize in Foundry Virtual Tabletop. See our Partnerships for a list of hosting service providers who will handle the setup and management of a dedicated Foundry Virtual Tabletop server on your behalf.

Common Ports Cheat Sheet: The Ultimate List

Common Ports Cheat Sheet

Perhaps you’re angsty that you’ve forgotten what a certain port number meant. Rest assured, you don’t have to remember all 65,535 port numbers. With so much information to remember, it’s understandable if you forget a common port. That’s why we put together this cheat sheet of common network ports for you.

A crucial domain of expertise in IT-related certifications such as Cisco Certified Network Associate (CCNA) and those of CompTIA is port numbers and associated services , which this common ports and protocols cheat sheet covers. If you want to remember a port number or protocol, this cheat sheet will help everyone, from students to professionals.

Get a copy of this common ports cheat sheet here to keep on your desk. When you're ready, scroll below to find the port you’re looking for.

Common Ports Cheat Sheet Search

Search our Common Ports cheat sheet to find the right cheat for the term you're looking for. Simply enter the term in the search bar and you'll receive the matching cheats available.

Common Ports and Protocols Cheat Sheet

The following tables cover services (and malware) that use common TCP ports and some UDP or SCTP ports.

Well-known/System Ports: 0 – 1023

Registered ports: 1024 – 49151, dynamic/private ports: 49152 – 65535.

You may use these ports for custom applications free from concerns that it may clash with existing processes.

The Most Common Ports for Exams

If you’re studying for IT certifications such as CCNA , focus on these ports:

We hope that you found this cheat sheet useful. Familiarity with ports and protocols is vital to building secure applications and troubleshooting problems on computer networks. Whether you're studying or working, this cheat sheet of common network ports will help you in academic and professional settings.

For further resources, or if you’re curious about how ports and protocols fit into cyber security, look into network security courses available with our StationX Accelerator Program .

Frequently Asked Questions

FTP: ports 20-21; SSH/SCP: port 22; HTTP: 80; HTTPS: 443; POP3: 110; POP3 over SSL: 995; IMAP: 143; IMAP over SSL: 993. We recommend you download the graphic in Well-known/System Ports .

It depends on whether you’re referring to system ports (1024) or want to include ports registered with apps (49152) because system ports range from 0 through 1023, and registered ports span 1024 – 49151.

FTP: ports 20-21; SSH/SCP: port 22; Telnet: 23; SMTP: 25; DNS: 53; HTTP: 80; POP3: 110; IMAP: 143; HTTPS: 443.

FTP: port 21; SSH/SCP: 22; Telnet: 23; SMTP: 25; DNS: 53; POP3: 110; IMAP: 145; HTTP: 80; HTTPS: 443; MySQL: 3306; RDP: 3389; VNC: 5900.

The following are the three types of ports with corresponding port number ranges: • Well-known/System ports: 0 – 1023 • Registered ports: 1024 – 49151 • Dynamic/Private ports: 49152 – 65535

Level Up in Cyber Security: Join Our Membership Today!

Nathan House is the founder and CEO of StationX. He has over 25 years of experience in cyber security, where he has advised some of the largest companies in the world. Nathan is the author of the popular "The Complete Cyber Security Course", which has been taken by over half a million students in 195 countries. He is the winner of the AI "Cyber Security Educator of the Year 2020" award and finalist for Influencer of the year 2022.

Related Articles

Nmap cheat sheet 2024: all the commands & flags.

The one downside to a tool as robust and powerful […]

Read More »

Linux Command Line Cheat Sheet: All the Commands You Need

You may need to open a compressed file, but you've […]

Wireshark Cheat Sheet: All the Commands, Filters & Syntax

Wireshark is arguably the most popular and powerful tool you […]

The Only IPv4 Subnetting Cheat Sheet You’ll Ever Need

Our beginner networking students often describe IPv4 subnetting as the […]

' src=

Nathan, thank you for supplying this sheet. It comes in handy when you’re trying to remember what a particular port is used by.

Our pleasure.

' src=

Thank you, Nathan

' src=

This is a great single point to reference all default ports. Thank you!!!

' src=

Very good, it will be in front of me!

' src=

Ports on computers are required for networking, and without them, the computer would be completely isolated and it would be unable to communicate with other devices. So thank you for proving this list of the Common TCP and UDP Port numbers.

' src=

After resetting my router cause the password got changed and all the setting were changed to gain access to my computer. I spent about 20 minutes setting up the router. It appears the router never got set up from the cable company when it was installed. So if you have not done so lately check your router and settings.

' src=

Cool, Thanks for sharing!!

' src=

Sorry Nathan, i did not leave a comment for this “Common Ports” Chart last-week. I am glad i signed up to your news letter you are a good researcher. thank you for sharing with us all..

' src=

Nathan, I must thank you for these cheat sheets! They’ve been great on my learning and certification journey!

Thank you too!

' src=

Really really useful.Thanks a lot!!

' src=

Session expired

Please log in again. The login page will open in a new tab. After logging in you can close it and return to this page.

  • iPhone 15 Plus vs. Pro Max
  • 3 Key Tech Trends to Watch in 2024

List of TCP Ports and UDP Ports (Well-Known)

Numbered 0 Through 1023

  • Massachusetts Institute of Technology
  • University of Illinois
  • Installing & Upgrading
  • The Wireless Connection
  • Routers & Firewalls
  • Network Hubs
  • Wi-Fi & Wireless

The  Transmission Control Protocol (TCP)  and User Datagram Protocol (UDP) each use port numbers for their communication channels. The ports numbered 0 through 1023 are the  well-known   system ports , reserved for special uses. 

Port 0  is not used for TCP/UDP communication although it used as a network programming construct. 

The Breakdown of Other System Ports

  • (TCP) TCPMUX - TCP Port Service Multiplexer . Allows any of multiple TCP services to be contacted by their service name. See RFC 1078.
  • (TCP)  Management Utility . Formerly used by the Compressnet product, for compression of TCP WAN traffic.
  • (TCP)  Compression Process . Formerly used by Compressent for compression of TCP WAN traffic.
  • (TCP/UDP) Unassigned
  • (TCP/UDP) Remote Job Entry . Mechanism for executing batch jobs remotely. See RFC 407.
  • (TCP/UDP)  Echo.  When enabled for debugging purposes, returns to the source any data received. See RFC 862.
  • (TCP/UDP)  Discard . When enabled for debugging purposes, throws away any data received with no response sent. See RFC 86.
  • (TCP)  Active Users . Unix TCP systat. See RFC 866.
  • (TCP/UDP)  Daytime . See RFC 867.
  • (TCP/UDP) Unassigned. Formerly reserved for Unix netstat.
  • (TCP/UDP) Unassigned.
  • (TCP/UDP)  Quote of the Day . For Unix qotd. See RFC 865.
  • (TCP) Message Send Protocol (formerly) and Remote Write Protocol . (UDP)  Remote Wire Protocol . See RFC 1312 and RFC 1756.
  • (TCP/UDP)  Character Generator Protocol . See RFC 864.
  • (TCP)  File Transfer . For FTP data.
  • (TCP)  File Transfer . For FTP control.
  • (TCP)  SSH Remote Login Protocol . (UDP)  pcAnywhere .
  • (TCP) Telnet
  • (TCP/UDP) For private mail systems.
  • (TCP)  Simple Mail Transfer Protocol (SMTP) . See RFC 821.
  • (TCP/UDP)  ESMTP . POP mail service of SLMail.
  • (TCP/UDP)  MSG ICP .
  • (TCP/UDP) MSG Authentication
  • (TCP/UDP) Unassigned
  • (TCP/UDP)  Display Support Protocol
  • (TCP/UDP) For private printer servers.
  • (TCP/UDP)  Time Protocol . See RFC 868.
  • (TCP/UDP)  Route Access Protocol (RAP) . See RFC 1476.
  • (UDP) Resource Location Protocol . See RFC 887.
  • (TCP/UDP)  Graphics
  • (UDP) Host Name Server - Microsoft WINS
  • (TCP) WHOIS . Also known as NICNAME. RFC 954.
  • (TCP) MPM FLAGS Protocol
  • (TCP) Message Processing Module (receive)
  • (TCP) Message Processing Module (send)
  • (TCP/UDP)  NI FTP
  • (TCP/UDP)  Digital Audit Daemon
  • (TCP) Login Host Protocol . Also known as TACACS. See RFC 927 and RFC 1492.
  • (TCP/UDP)  Remote Mail Checking Protocol (RMCP) . See RFC 1339.
  • (TCP/UDP)  IMP Logical Address Maintenance
  • (TCP/UDP)  XNS Time Protocol
  • (TCP/UDP)  Domain Name Server (DNS)
  • (TCP/UDP)  XNS Clearinghouse
  • (TCP/UDP)  ISI Graphics Language
  • (TCP/UDP)  XNS Authentication
  • (TCP/UDP) private terminal access. For example, TCP Mail Transfer Protocol (MTP). See RFC 772 and RFC 780.
  • (TCP/UDP) XNS Mail
  • (TCP/UDP) private file services. For example, NFILE. See RFC 1037.
  • (TCP/UDP)  NI Mail
  • (TCP/UDP)  ACA Services
  • (TCP/UDP)  Whois and Network Information Lookup Service . Also known as Whois++. See RFC 1834.
  • (TCP/UDP)  Communications Integrator
  • (TCP/UDP)  TACACS Database Service
  • (TCP/UDP)  Oracle SQL*NET
  • (TCP/UDP)  Bootstrap Protocol Server . (UDP) Unofficially, Dynamic Host Configuration Protocol (DHCP) servers use this port.
  • (TCP/UDP)  Bootstrap Protocol Client (BOOTP) . See RFC 951. (UDP) Unofficially, DHCP clients use this port.
  • (TCP/UDP)  Trivial File Transfer Protocol (TFTP) . See RFC 906 and RFC 1350.
  • (TCP/UDP)  Gopher . See RFC 1436.
  • (TCP/UDP)  Remote Job Service
  • (TCP/UDP) private dial-out services
  • (TCP/UDP)  Distributed External Object Store
  • (TCP/UDP) private remote job execution services
  • (TCP/UDP)  Vettcp Service
  • (TCP/UDP)  Finger User Information Protocol . See RFC 1288.
  • (TCP) Hypertext Transfer Protocol (HTTP) . See RFC 2616.
  • (TCP/UDP)  HOSTS2 Name Server
  • (TCP/UDP)  XFER Utility
  • (TCP/UDP)  MIT ML Device
  • (TCP/UDP)  Common Trace Facility
  • (TCP/UDP)  Micro Focus COBOL
  • (TCP/UDP) private terminal links
  • (TCP/UDP)  Kerberos Network Authentication Service . See RFC 1510.
  • (TCP/UDP)  SU/MIT Telnet Gateway
  • (TCP/UDP)  DNSIX Security Attribute Token Map
  • (TCP/UDP)  MIT Dover Spooler
  • (TCP/UDP)  Network Printing Protocol
  • (TCP/UDP)  Device Control Protocol
  • (TCP/UDP)  Tivoli Object Dispatcher
  • (TCP/UDP)  SUPDUP Display Protocol . See RFC 734.
  • (TCP/UDP)  DIXIE Protocol . See RFC 1249.
  • (TCP/UDP)  Swift Remote Virtual File Protoc ol
  • (TCP/UDP)  TAC News . Unofficially used today by Linux utility linuxconf.
  • (TCP/UDP)  Metagram Relay

Get the Latest Tech News Delivered Every Day

  • The Most Popular TCP and UDP Port Numbers
  • Xbox Network TCP and UDP Port Numbers
  • What Is Port 0 Used For?
  • TCP vs. UDP
  • Understanding Transmission Control Protocol/Internet Protocol (TCP/IP)
  • What Is TFTP? (Trivial File Transfer Protocol)
  • TCP Port Number 21 and How It Works With FTP
  • The 7 Best Chrome Flags of 2024
  • Port Numbers Used for Computer Networks
  • USB Physical Compatibility Chart
  • How HTTP Works: Hypertext Transfer Protocol Explained
  • 16 Best Free Remote Access Software Tools (2024)
  • How IP Network Routing Works
  • Remote Utilities 7.2 Review (Free Remote Access Tool)
  • An Overview of the Nagle Algorithm for TCP Network Communication
  • Seecreen v0.8.2 Review

Wireshark logo

PortReference

Port number reference.

TCP , UDP , and SCTP all use port numbers to identify the logical communications between hosts. The combination of a port and IP address identifies a TCP/UDP/SCTP Endpoint , and the endpoint pairs on either end of a "connection" make up a TCP/UDP/SCTP Conversation .

As the underlying IP protocol can "only" transfer data between two IP hosts, it's often desired to transfer TCP / UDP data from more than one application between two IP hosts.

The concept of a TCP/UDP port is to provide several logical channels between the same IP hosts. When sending a packet, TCP/UDP multiplexes the data from separate applications over one IP "host to host transfer". While receiving, TCP/UDP demultiplexes the IP packets again, providing the received data to the applications interested in.

The addressing of this multiplexing/demultiplexing is done using the ports.

Port numbers are unsigned 16-bit integers, ranging from 0 to 65535. The IANA list of assigned port numbers has divided ports into three ranges ( RFC 6335 ):

  • 0 through 1023: Well Known Ports
  • 1024 through 49151: Registered Ports
  • 49152 through 65535: Dynamic or Private Ports

Ports 1024 and above are also referred to as ephemeral ports .

Ports are officially registered with the IANA . Unofficial lists are maintained by many people, including the following:

  • Kurt Seifried
  • Network Sorcery
  • Emsi Software

A local list is maintained below:

| 0 - 99 | 100 - 199 | 200 - 299 | 300 - 399 | 400 - 499 | | 500 - 599 | 600 - 699 | 700 - 799 | 800 - 899 | 900 - 999 | | 1000 - 1099 | 1100 - 1199 | 1200 - 1299 | 1300 - 1399 | 1400 - 1499 | | 1500 - 1599 | 1600 - 1699 | 1700 - 1799 | 1800 - 1899 | 1900 - 1999 | | 2000 - 2099 | 2100 - 2199 | 2200 - 2299 | 2300 - 2399 | 2400 - 2499 | | 2500 - 2599 | 2600 - 2699 | 2700 - 2799 | 2800 - 2899 | 2900 - 2999 | | 3000 - 3099 | 3100 - 3199 | 3200 - 3299 | 3300 - 3399 | 3400 - 3499 | | 3500 - 3599 | 3600 - 3699 | 3700 - 3799 | 3800 - 3899 | 3900 - 3999 | | 4000 - 4099 | 4100 - 4199 | 4200 - 4299 | 4300 - 4399 | 4400 - 4499 | | 4500 - 4599 | 4600 - 4699 | 4700 - 4799 | 4800 - 4899 | 4900 - 4999 | | 5000 - 5099 | 5100 - 5199 | 5200 - 5299 | 5300 - 5399 | 5400 - 5499 | | 5500 - 5599 | 5600 - 5699 | 5700 - 5799 | 5800 - 5899 | 5900 - 5999 | | 6000 - 6099 | 6100 - 6199 | 6200 - 6299 | 6300 - 6399 | 6400 - 6499 | | 6500 - 6599 | 6600 - 6699 | 6700 - 6799 | 6800 - 6899 | 6900 - 6999 | | 7000 - 7099 | 7100 - 7199 | 7200 - 7299 | 7300 - 7399 | 7400 - 7499 | | 7500 - 7599 | 7600 - 7699 | 7700 - 7799 | 7800 - 7899 | 7900 - 7999 | | 8000 - 8099 | 8100 - 8199 | 8200 - 8299 | 8300 - 8399 | 8400 - 8499 | | 8500 - 8599 | 8600 - 8699 | 8700 - 8799 | 8800 - 8899 | 8900 - 8999 | | 9000 - 9099 | 9100 - 9199 | 9200 - 9299 | 9300 - 9399 | 9400 - 9499 | | 9500 - 9599 | 9600 - 9699 | 9700 - 9799 | 9800 - 9899 | 9900 - 9999 | | 10000 - 10099 | 10100 - 10199 | 10200 - 10299 | 10300 - 10399 | 10400 - 10499 | | 10500 - 10599 | 10600 - 10699 | 10700 - 10799 | 10800 - 10899 | 10900 - 10999 | | 11000 - 11099 | 11100 - 11199 | 11200 - 11299 | 11300 - 11399 | 11400 - 11499 | | 11500 - 11599 | 11600 - 11699 | 11700 - 11799 | 11800 - 11899 | 11900 - 11999 | | 12000 - 12099 | 12100 - 12199 | 12200 - 12299 | 12300 - 12399 | 12400 - 12499 | | 12500 - 12599 | 12600 - 12699 | 12700 - 12799 | 12800 - 12899 | 12900 - 12999 | | 13000 - 13099 | 13100 - 13199 | 13200 - 13299 | 13300 - 13399 | 13400 - 13499 | | 13500 - 13599 | 13600 - 13699 | 13700 - 13799 | 13800 - 13899 | 13900 - 13999 | | 14000 - 14099 | 14100 - 14199 | 14200 - 14299 | 14300 - 14399 | 14400 - 14499 | | 14500 - 14599 | 14600 - 14699 | 14700 - 14799 | 14800 - 14899 | 14900 - 14999 | | 15000 - 15099 | 15100 - 15199 | 15200 - 15299 | 15300 - 15399 | 15400 - 15499 | | 15500 - 15599 | 15600 - 15699 | 15700 - 15799 | 15800 - 15899 | 15900 - 15999 | | 16000 - 16099 | 16100 - 16199 | 16200 - 16299 | 16300 - 16399 | 16400 - 16499 | | 16500 - 16599 | 16600 - 16699 | 16700 - 16799 | 16800 - 16899 | 16900 - 16999 | | 17000 - 17099 | 17100 - 17199 | 17200 - 17299 | 17300 - 17399 | 17400 - 17499 | | 17500 - 17599 | 17600 - 17699 | 17700 - 17799 | 17800 - 17899 | 17900 - 17999 | | 18000 - 18099 | 18100 - 18199 | 18200 - 18299 | 18300 - 18399 | 18400 - 18499 | | 18500 - 18599 | 18600 - 18699 | 18700 - 18799 | 18800 - 18899 | 18900 - 18999 | | 19000 - 19099 | 19100 - 19199 | 19200 - 19299 | 19300 - 19399 | 19400 - 19499 | | 19500 - 19599 | 19600 - 19699 | 19700 - 19799 | 19800 - 19899 | 19900 - 19999 | | 20000 - 20099 | 20100 - 20199 | 20200 - 20299 | 20300 - 20399 | 20400 - 20499 | | 20500 - 20599 | 20600 - 20699 | 20700 - 20799 | 20800 - 20899 | 20900 - 20999 | | 21000 - 21099 | 21100 - 21199 | 21200 - 21299 | 21300 - 21399 | 21400 - 21499 | | 21500 - 21599 | 21600 - 21699 | 21700 - 21799 | 21800 - 21899 | 21900 - 21999 | | 22000 - 22099 | 22100 - 22199 | 22200 - 22299 | 22300 - 22399 | 22400 - 22499 | | 22500 - 22599 | 22600 - 22699 | 22700 - 22799 | 22800 - 22899 | 22900 - 22999 | | 23000 - 23099 | 23100 - 23199 | 23200 - 23299 | 23300 - 23399 | 23400 - 23499 | | 23500 - 23599 | 23600 - 23699 | 23700 - 23799 | 23800 - 23899 | 23900 - 23999 | | 24000 - 24099 | 24100 - 24199 | 24200 - 24299 | 24300 - 24399 | 24400 - 24499 | | 24500 - 24599 | 24600 - 24699 | 24700 - 24799 | 24800 - 24899 | 24900 - 24999 | | 25000 - 25099 | 25100 - 25199 | 25200 - 25299 | 25300 - 25399 | 25400 - 25499 | | 25500 - 25599 | 25600 - 25699 | 25700 - 25799 | 25800 - 25899 | 25900 - 25999 | | 26000 - 26099 | 26100 - 26199 | 26200 - 26299 | 26300 - 26399 | 26400 - 26499 | | 26500 - 26599 | 26600 - 26699 | 26700 - 26799 | 26800 - 26899 | 26900 - 26999 | | 27000 - 27099 | 27100 - 27199 | 27200 - 27299 | 27300 - 27399 | 27400 - 27499 | | 27500 - 27599 | 27600 - 27699 | 27700 - 27799 | 27800 - 27899 | 27900 - 27999 | | 28000 - 28099 | 28100 - 28199 | 28200 - 28299 | 28300 - 28399 | 28400 - 28499 | | 28500 - 28599 | 28600 - 28699 | 28700 - 28799 | 28800 - 28899 | 28900 - 28999 | | 29000 - 29099 | 29100 - 29199 | 29200 - 29299 | 29300 - 29399 | 29400 - 29499 | | 29500 - 29599 | 29600 - 29699 | 29700 - 29799 | 29800 - 29899 | 29900 - 29999 | | 30000 - 30099 | 30100 - 30199 | 30200 - 30299 | 30300 - 30399 | 30400 - 30499 | | 30500 - 30599 | 30600 - 30699 | 30700 - 30799 | 30800 - 30899 | 30900 - 30999 | | 31000 - 31099 | 31100 - 31199 | 31200 - 31299 | 31300 - 31399 | 31400 - 31499 | | 31500 - 31599 | 31600 - 31699 | 31700 - 31799 | 31800 - 31899 | 31900 - 31999 | | 32000 - 32099 | 32100 - 32199 | 32200 - 32299 | 32300 - 32399 | 32400 - 32499 | | 32500 - 32599 | 32600 - 32699 | 32700 - 32799 | 32800 - 32899 | 32900 - 32999 | | 33000 - 33099 | 33100 - 33199 | 33200 - 33299 | 33300 - 33399 | 33400 - 33499 | | 33500 - 33599 | 33600 - 33699 | 33700 - 33799 | 33800 - 33899 | 33900 - 33999 | | 34000 - 34099 | 34100 - 34199 | 34200 - 34299 | 34300 - 34399 | 34400 - 34499 | | 34500 - 34599 | 34600 - 34699 | 34700 - 34799 | 34800 - 34899 | 34900 - 34999 | | 35000 - 35099 | 35100 - 35199 | 35200 - 35299 | 35300 - 35399 | 35400 - 35499 | | 35500 - 35599 | 35600 - 35699 | 35700 - 35799 | 35800 - 35899 | 35900 - 35999 | | 36000 - 36099 | 36100 - 36199 | 36200 - 36299 | 36300 - 36399 | 36400 - 36499 | | 36500 - 36599 | 36600 - 36699 | 36700 - 36799 | 36800 - 36899 | 36900 - 36999 | | 37000 - 37099 | 37100 - 37199 | 37200 - 37299 | 37300 - 37399 | 37400 - 37499 | | 37500 - 37599 | 37600 - 37699 | 37700 - 37799 | 37800 - 37899 | 37900 - 37999 | | 38000 - 38099 | 38100 - 38199 | 38200 - 38299 | 38300 - 38399 | 38400 - 38499 | | 38500 - 38599 | 38600 - 38699 | 38700 - 38799 | 38800 - 38899 | 38900 - 38999 | | 39000 - 39099 | 39100 - 39199 | 39200 - 39299 | 39300 - 39399 | 39400 - 39499 | | 39500 - 39599 | 39600 - 39699 | 39700 - 39799 | 39800 - 39899 | 39900 - 39999 | | 40000 - 40099 | 40100 - 40199 | 40200 - 40299 | 40300 - 40399 | 40400 - 40499 | | 40500 - 40599 | 40600 - 40699 | 40700 - 40799 | 40800 - 40899 | 40900 - 40999 | | 41000 - 41099 | 41100 - 41199 | 41200 - 41299 | 41300 - 41399 | 41400 - 41499 | | 41500 - 41599 | 41600 - 41699 | 41700 - 41799 | 41800 - 41899 | 41900 - 41999 | | 42000 - 42099 | 42100 - 42199 | 42200 - 42299 | 42300 - 42399 | 42400 - 42499 | | 42500 - 42599 | 42600 - 42699 | 42700 - 42799 | 42800 - 42899 | 42900 - 42999 | | 43000 - 43099 | 43100 - 43199 | 43200 - 43299 | 43300 - 43399 | 43400 - 43499 | | 43500 - 43599 | 43600 - 43699 | 43700 - 43799 | 43800 - 43899 | 43900 - 43999 | | 44000 - 44099 | 44100 - 44199 | 44200 - 44299 | 44300 - 44399 | 44400 - 44499 | | 44500 - 44599 | 44600 - 44699 | 44700 - 44799 | 44800 - 44899 | 44900 - 44999 | | 45000 - 45099 | 45100 - 45199 | 45200 - 45299 | 45300 - 45399 | 45400 - 45499 | | 45500 - 45599 | 45600 - 45699 | 45700 - 45799 | 45800 - 45899 | 45900 - 45999 | | 46000 - 46099 | 46100 - 46199 | 46200 - 46299 | 46300 - 46399 | 46400 - 46499 | | 46500 - 46599 | 46600 - 46699 | 46700 - 46799 | 46800 - 46899 | 46900 - 46999 | | 47000 - 47099 | 47100 - 47199 | 47200 - 47299 | 47300 - 47399 | 47400 - 47499 | | 47500 - 47599 | 47600 - 47699 | 47700 - 47799 | 47800 - 47899 | 47900 - 47999 | | 48000 - 48099 | 48100 - 48199 | 48200 - 48299 | 48300 - 48399 | 48400 - 48499 | | 48500 - 48599 | 48600 - 48699 | 48700 - 48799 | 48800 - 48899 | 48900 - 48999 | | 49000 - 49099 | 49100 - 49199 | 49200 - 49299 | 49300 - 49399 | 49400 - 49499 | | 49500 - 49599 | 49600 - 49699 | 49700 - 49799 | 49800 - 49899 | 49900 - 49999 | | 50000 - 50099 | 50100 - 50199 | 50200 - 50299 | 50300 - 50399 | 50400 - 50499 | | 50500 - 50599 | 50600 - 50699 | 50700 - 50799 | 50800 - 50899 | 50900 - 50999 | | 51000 - 51099 | 51100 - 51199 | 51200 - 51299 | 51300 - 51399 | 51400 - 51499 | | 51500 - 51599 | 51600 - 51699 | 51700 - 51799 | 51800 - 51899 | 51900 - 51999 | | 52000 - 52099 | 52100 - 52199 | 52200 - 52299 | 52300 - 52399 | 52400 - 52499 | | 52500 - 52599 | 52600 - 52699 | 52700 - 52799 | 52800 - 52899 | 52900 - 52999 | | 53000 - 53099 | 53100 - 53199 | 53200 - 53299 | 53300 - 53399 | 53400 - 53499 | | 53500 - 53599 | 53600 - 53699 | 53700 - 53799 | 53800 - 53899 | 53900 - 53999 | | 54000 - 54099 | 54100 - 54199 | 54200 - 54299 | 54300 - 54399 | 54400 - 54499 | | 54500 - 54599 | 54600 - 54699 | 54700 - 54799 | 54800 - 54899 | 54900 - 54999 | | 55000 - 55099 | 55100 - 55199 | 55200 - 55299 | 55300 - 55399 | 55400 - 55499 | | 55500 - 55599 | 55600 - 55699 | 55700 - 55799 | 55800 - 55899 | 55900 - 55999 | | 56000 - 56099 | 56100 - 56199 | 56200 - 56299 | 56300 - 56399 | 56400 - 56499 | | 56500 - 56599 | 56600 - 56699 | 56700 - 56799 | 56800 - 56899 | 56900 - 56999 | | 57000 - 57099 | 57100 - 57199 | 57200 - 57299 | 57300 - 57399 | 57400 - 57499 | | 57500 - 57599 | 57600 - 57699 | 57700 - 57799 | 57800 - 57899 | 57900 - 57999 | | 58000 - 58099 | 58100 - 58199 | 58200 - 58299 | 58300 - 58399 | 58400 - 58499 | | 58500 - 58599 | 58600 - 58699 | 58700 - 58799 | 58800 - 58899 | 58900 - 58999 | | 59000 - 59099 | 59100 - 59199 | 59200 - 59299 | 59300 - 59399 | 59400 - 59499 | | 59500 - 59599 | 59600 - 59699 | 59700 - 59799 | 59800 - 59899 | 59900 - 59999 | | 60000 - 60099 | 60100 - 60199 | 60200 - 60299 | 60300 - 60399 | 60400 - 60499 | | 60500 - 60599 | 60600 - 60699 | 60700 - 60799 | 60800 - 60899 | 60900 - 60999 | | 61000 - 61099 | 61100 - 61199 | 61200 - 61299 | 61300 - 61399 | 61400 - 61499 | | 61500 - 61599 | 61600 - 61699 | 61700 - 61799 | 61800 - 61899 | 61900 - 61999 | | 62000 - 62099 | 62100 - 62199 | 62200 - 62299 | 62300 - 62399 | 62400 - 62499 | | 62500 - 62599 | 62600 - 62699 | 62700 - 62799 | 62800 - 62899 | 62900 - 62999 | | 63000 - 63099 | 63100 - 63199 | 63200 - 63299 | 63300 - 63399 | 63400 - 63499 | | 63500 - 63599 | 63600 - 63699 | 63700 - 63799 | 63800 - 63899 | 63900 - 63999 | | 64000 - 64099 | 64100 - 64199 | 64200 - 64299 | 64300 - 64399 | 64400 - 64499 | | 64500 - 64599 | 64600 - 64699 | 64700 - 64799 | 64800 - 64899 | 64900 - 64999 | | 65000 - 65099 | 65100 - 65199 | 65200 - 65299 | 65300 - 65399 | 65400 - 65499 | | 65500 - 65599 | | | | |

Imported from https://wiki.wireshark.org/PortReference on 2020-08-11 23:18:00 UTC

Port selection interactions

You can assign or reserve ports by using several methods, and the various methods interact in the following ways:

  • An application explicitly binds to port 0.
  • An implicit bind() call is processed as an application issues a connect() call, and the port number is not known.

Ephemeral ports can also be used by servers in some cases, such as the FTP server in passive mode.

  • An implicit bind() call is processed as the application sends data, and the port number is not known.
  • You can use the EPHEMERALPORTS parameter to control the range of ephemeral port numbers that the stack assigns.
  • Separate definitions for the TCPCONFIG and UDPCONFIG statements enable different ranges per protocol.
  • The default ephemeral port numbers for each protocol are port numbers in the range 1024 – 65535.
  • Generally, other methods of assigning ports take precedence over assigning ephemeral ports from the EPHEMERALPORTS range. The ports available for ephemeral port assignment are those ports in the EPHEMERALPORTS range that are left after other methods of assigning ports are applied.
  • Ports can be reserved for specific uses with the PORT and PORTRANGE statements.
  • Ports can be reserved for a protocol by the PORT or PORTRANGE statement and are not available as ephemeral ports for that protocol. If the ports are also within the defined EPHEMERALPORTS range for that protocol, the stack cannot assign them as ephemeral ports.
  • IPv4 address INADDR_ANY
  • IPv6 unspecified address (in6addr_any)
  • The most recently processed profile or VARY TCPIP,,OBEYFILE command that specifies the EXPLICITBINDPORTRANGE parameter defines the range of ports for the sysplex.
  • An explicitly bound port that is within the EXPLICITBINDPORTRANGE pool is not available for assignment by the stack as an EXPLICITBINDPORTRANGE port.
  • The EXPLICITBINDPORTRANGE pool is not required to be within the EPHEMERALPORTS range.
  • The EXPLICITBINDPORTRANGE pool takes precedence over the EPHEMERALPORTS range. Ports in the EXPLICITBINDPORTRANGE pool that are also within the defined EPHEMERALPORTS range cannot be assigned by the stack as ephemeral ports. Ports in the EXPLICITBINDPORTRANGE pool are available only for EXPLICBINDPORTRANGE use.
  • If a bind is made to a distributed DVIPA with SYSPLEXPORTS and port 0 specified, the coupling facility assigns a block of sysplex ports from the EPHEMERALPORTS range to the stack for use with the DVIPA. The stack chooses a port from this block.
  • If the bind specifies a specific port from the EPHEMERALPORTS range, the coupling facility attempts to assign that port as a sysplex port for that DVIPA.
  • TCP/IP communicates the EPHEMERALPORTS range to the coupling facility to ensure that sysplex port assignments are in the correct range.
  • The PASSIVEDATAPORTS statement in the FTP server configuration file assigns a range of port numbers for use by the FTP server. The PASSIVEDATAPORTS range must also be reserved on a PORTRANGE statement with the AUTHPORT parameter.
  • Ports in this range are available for assignment only to the FTP server.
  • Ports in this range are not required to be within the EPHEMERALPORTS range.
  • Ports in this range that are also within the EPHEMERALPORTS range are not available for use by the stack when assigning an ephemeral port.
  • The range that is specified by the INADDRANYPORT and INADDRANYCOUNT parameters must be restricted by the PORT or PORTRANGE statement to the job name OMVS. These ports are not assigned by the stack unless the user has the job name OMVS.
  • Ports in this range that are within the defined EPHEMERALPORTS range are not available for use by the stack when assigning an ephemeral port.

Because ports that are reserved by using some of these methods cannot be used by the stack as ephemeral ports, the actual number of available ephemeral ports might not equal the number of ports that are specified in the EPHEMERALPORTS range. You can use the Netstat STATS/-S command to display the actual number of ephemeral ports that are available for assignment by the stack. The CONFIGURED EPHEMERAL PORTS field of the Netstat STATS/-S report accounts for ports that are in the EPHEMERALPORTS range that are unavailable because they are reserved by some other method. This field reflects the actual number of ports that are available for assignment by the stack.

For example, consider the following portion of a TCP/IP profile:

This configuration results in the following values for the CONFIGURED EPHEMERAL PORTS field of the Netstat STATS/-S report:

For TCP, the total number of configured ephemeral ports is 10000 (ports 30000 – 39999), and this number is reduced by the following amounts:

  • 100 because of the GLOBALCONFIG EXPLICITBINDPORTRANGE setting (ports 30200 – 30299)
  • 2 because of the two PORT statements with ports that are within the TCP ephemeral port range (ports 30005 and 30015)
  • 355 because of the three PORTRANGE statements with ports that are within the TCP ephemeral port range (ports 30025 – 30029, 30100 – 30149, and 30500 – 30799)

Subtracting these ports results in the CONFIGURED EPHEMERAL PORTS value of 9543. The CONFIGURED EPHEMERAL PORTS value is not affected by any PORT and PORTRANGE statements that include ports outside of the EPHEMERALPORTS range.

For UDP, the total number of configured ephemeral ports is 10000 (ports 30000 – 39999), and this number is reduced by the following amounts:

  • 2 because of the two PORT statements with ports that are within the UDP ephemeral port range (ports 30010 and 30015)
  • 305 because of the two PORTRANGE statements with ports that are within the UDP ephemeral port range (ports 30030 – 30034 and 30500 – 30799)

Subtracting these ports results in the CONFIGURED EPHEMERAL PORTS value of 9693. The CONFIGURED EPHEMERAL PORTS value is not affected by any PORT and PORTRANGE statements that include ports outside of the EPHEMERALPORTS range.

Related ports: 3003   3007   15400   15401   5000  

« back to SG Ports

External Resources SANS Internet Storm Center: port 3000

Notes: Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify a specific process, or network service. IANA is responsible for internet protocol resources, including the registration of commonly used port numbers for well-known internet services. Well Known Ports: 0 through 1023. Registered Ports: 1024 through 49151. Dynamic/Private : 49152 through 65535. TCP ports use the Transmission Control Protocol, the most commonly used protocol on the Internet and any TCP/IP network. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and that packets will be delivered in the same order in which they were sent. Guaranteed communication/delivery is the key difference between TCP and UDP. UDP ports use the Datagram Protocol. Like TCP, UDP is used in combination with IP (the Internet Protocol) and facilitates the transmission of datagrams from one computer to applications on another computer, but unlike TCP, UDP is connectionless and does not guarantee reliable communication; it's up to the application that received the message to process any errors and verify correct delivery. UDP is often used with time-sensitive applications, such as audio/video streaming and realtime gaming, where dropping some packets is preferable to waiting for delayed data. When troubleshooting unknown open ports, it is useful to find exactly what services/processes are listening to them. This can be accomplished in both Windows command prompt and Linux variants using the "netstat -aon" command. We also recommend runnig multiple anti-virus/anti-malware scans to rule out the possibility of active malicious software. For more detailed and personalized help please use our forums.

  • SG Ports Database » Vulnerable Ports
  • SG Security Scan » Scanned Ports » Commonly Open Ports
  • SG Broadband Tools
  • All Known Ports
  • All Vulnerable Ports
  • Scanned Ports
  • Recently Updated Ports
  • Popular Ports/Ranges
  • SG Security Scan

Service Name and Transport Protocol Port Number Registry

port number 30000

Contact Information

How-To Geek

How do i open a port on windows firewall.

Firewalls keep your PC safe, but they can also get in the way.

Quick Links

What do ports do, how to open a port on windows 10, key takeaways.

  • Firewalls block unsolicited traffic from the internet by default, but you may need to open a port to allow specific traffic through for programs like game servers.
  • To open a port on Windows 10, search for "Windows Firewall" and go to "Windows Defender Firewall." Click on "Advanced Settings" and create a new inbound rule for the specific port number.
  • You can choose when the rule applies (domain, private, public) and give it a name and description. If needed, you can disable the rule or repeat the steps to open ports for different programs.

Firewalls are there to protect you from threats on the internet (both traffic from the internet and from local applications trying to gain access when they shouldn't). Sometimes, though, you'll want to allow otherwise restricted traffic through your firewall. To do so, you'll have to open a port.

When a device connects to another device on a network (including the internet), it specifies a port number that lets the receiving device know how to handle the traffic. Where an IP address shows traffic how to get to a particular device on a network, the port number lets the receiving device know which program gets that traffic. By default, most unsolicited traffic from the internet is blocked by Windows Firewall. If you're running something like a game server, you might need to open a port to allow that specific kind of traffic through the firewall.

This article shows you how to open a port on a particular PC's firewall to let traffic in. If you have a router on your network (which you likely do), you will also need to allow the same traffic through that router by forwarding the port there.

Clicking Start, type "Windows Firewall" into the search box, and then click on "Windows Defender Firewall."

Search for

Once Windows Firewall opens, click on "Advanced Settings."

Click on

This launches Windows Defender Firewall with Advanced Security. Click the "Inbound Rules" category on the left. In the far right pane, click the "New Rule" command.

Click the

If you need to open a rule for outgoing traffic, instead of clicking "Inbound Rule," you'd click "Outbound Rule." Most apps are pretty good about creating their own outbound rules when you install them, but you might occasionally run into one that cannot.

There is also an

On the Rule Type page, select the "Port" option and then click "Next."

Select

On the next screen, you'll have to choose whether the port you're opening uses the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP). Unfortunately, we can't tell you specifically which to use because different apps use different protocols. Port numbers can range from 0-65535, with ports up to 1023 being reserved for privileged services. You can find an unofficial list of (most) TCP/UDP ports on the Wikipedia page , and you can also search for the app you're using. If you can't determine the specific protocol to use for your app, you can create two new inbound rules — one for TCP and one for UDP.

Select the "Specific Local Ports" option and then type the port number into the field provided. If you're opening more than one port, you can separate them by commas. If you need to open a range of ports, use a hyphen (-).

Click "Next" when you're done.

Select the port you want to forward. Do not open

On the next page, click "Allow the Connection" and then click "Next."

port number 30000

For this guide, we'll be using the "Allow the Connection" option, as we trust the connection for which we're creating a rule. If you want a little more piece of mind, the "Allow the connection if it is secure" rule uses Internet Protocol security (IPsec) to authenticate the connection. You can try that option, but many apps do not support it. If you try the more secure option and it doesn't work, you can always come back and change to the less secure one.

Next, choose when the rule applies and click "Next." You can choose one or all of the following:

  • Domain: When a PC is connected to a domain controller that Windows can authenticate access to the domain.
  • Private: When a PC is connected to a private network, like a home network or a network that you trust.
  • Public: When a PC is connected to an open network, like a cafe, airport, or library where anyone can join, and the security is unknown to you.

Choose which networks the rule applies to.

In the final window, give your new rule a name and an optional, more detailed description. Click "Finish" when you're done.

Enter a rule name and description.

If you want to disable the rule at any point, locate it in the list of Inbound or Outbound Rules, right-click it, and then click "Disable Rule."

Right-click the rule to disable it without removing it.

That's all there is to it. If you need to open any other ports for a different program or with a different rule, repeat the steps above using a different set of ports to open.

  • IPv4 Subnet Calculator
  • Password Generator/Decryptor
  • MAC Address Finder

TCP/UDP Port Finder

Search results for "30000".

  • Service Details Source
  •   Unassigned IANA
  • threat [threat] Infector Bekkoame
  • infector [trojan] Infector SANS
  • trojan [trojan] DataRape. Remote Access / Keylogger / Steals passwords. Works on Windows. Aliases: Backdoor.Latinus.c, Backdoor.Latinus.h Simovits
  • trojan [trojan] Infector. Keylogger / Steals passwords / ICQ trojan / IRC trojan / Downloading trojan / EXE binder / Trojan dropper. Works on Windows 95, 98 and ME, together with ICQ. Aliases: The Infector, FC Infector, Backdoor.Infector Simovits

About TCP/UDP ports

Recent searches.

TCP UDP Ports

Commonly used Windows Ports

Here you can find some of the frequently used ports in windows by various applications/services. For more detailed information, please refer to detailed information about ports in  this site  (official microsoft site).

TCP UDP Ports

  • Privacy Policy
  • Terms & Conditions

195.158.225.230

Check a port's status by entering an address and port number above.

Use Connected to monitor your ports.

The open port checker is a tool you can use to check your external IP address and detect open ports on your connection. This tool is useful for finding out if your port forwarding is setup correctly or if your server applications are being blocked by a firewall. This tool may also be used as a port scanner to scan your network for ports that are commonly forwarded. It is important to note that some ports, such as port 25, are often blocked at the ISP level in an attempt to prevent malicious activity. For more a comprehensive list of TCP and UDP ports, check out this Wikipedia article .

  • 139 NetBIOS
  • 3389 Remote Desktop
  • 5632 PCAnywhere
  • 25565 Minecraft
  • Scan All Common Ports

©2009 Kirk Ouimet Design . All rights reserved. Privacy Policy . Hosted by VPSServer.com .

Stack Exchange Network

Stack Exchange network consists of 183 Q&A communities including Stack Overflow , the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.

Q&A for work

Connect and share knowledge within a single location that is structured and easy to search.

What is the range of ports that is usually used in the traceroute command?

I wanted to know if there is a range which is usually used for destination port that is used in traceroute command. Like the starting address for destination port is 33434. but is there some standard range which is preferred for traceroute ?

j10's user avatar

3 Answers 3

Using UDP for traceroute is considered by some poor practice, because UDP is supposed to be a data-carrying application protocol. ICMP ECHO_REQUEST is the preferred method, though there is no standard . The main reason to use ICMP is that UDP can carry a payload, so allowing it through a firewall has greater security implications; for the end-user it's more likely to be blocked. It's also possible for an application to use the UDP ports resulting in potentially unwanted side-effects. Despite the preference for ICMP, classic traceroute(1) and its decedents all use UDP, including the implementations shipped with Mac OS X, most Linux distros, the BSDs and Cisco IOS.

For these UDP implementations the port number is incremented by 1 for each probe so the highest port number for any given run is equal to 33434 + (max-ttl * probes-per-hop - 1) . The default setting for max-ttl is usually 32 or 64, depending on the implementation. The default probes-per-hop is usually 1 or 3. Using the more liberal defaults of 64 and 3, the range would be 33434-33625 . In practice a max-ttl of 32 is usually more than enough in which case the range would be 33434-33529 .

Also note that IANA has allocated only port 33434 to traceroute, but it has left 33435-33655 unallocated.

For info on ICMP vs. UDP see: Why do some common traceroute implementations default to using UDP probes?

Lucas Yamanishi's user avatar

After googling I found out that 33434 is the port that is used as the base port for traceroute .

The range goes to 33434 + (max-ttl * numberofprobes - 1) , that usually means

  • max-ttl = 30
  • numberofprobes = 3

slhck's user avatar

Traceroute works by sending ICMP packets, which are their own protocol entirely. No ports.

In more detail - traceroute sends ICMP echo packets starting with a TTL of 1. That causes the packet to return a failure at the first router. Then a TTL of 2 - which brings it to the second router. TTL is increased until the destination is reached. The set of routers found along the way is the traced route.

ObscureRobot's user avatar

  • We can specify the destination port where the udp packets are send to the destination .(I am going for linux implementaion) . –  Jiten Shah Nov 9, 2011 at 4:50
  • Why do you prefer a UDP packet over the standard ICMP echo? –  ObscureRobot Nov 9, 2011 at 5:00
  • actually i have a assignment in my college and I need to add some options to it . the orignal code provided to me uses UDP . –  Jiten Shah Nov 9, 2011 at 5:12
  • What does the assignment ask you to do? –  ObscureRobot Nov 9, 2011 at 5:26
  • to add the port option to the command . It internally uses 33434(default value) as the destination port but I need to add option to the command thru which we can specify the destiantion port . –  Jiten Shah Nov 9, 2011 at 5:35

You must log in to answer this question.

Not the answer you're looking for browse other questions tagged ports traceroute ..

  • The Overflow Blog
  • Who owns this tool? You need a software component catalog
  • Featured on Meta
  • Upcoming privacy updates: removal of the Activity data section and Google...
  • Changing how community leadership works on Stack Exchange: a proposal and...

Hot Network Questions

  • How can I make a sleek, 3D look in Inkscape Vector for a ring?
  • How do I properly present dialogue in a scene with two female characters?
  • Are views logically redundant?
  • Word request: Sensatory words
  • Is it fine to email several people regarding internship programs and potentially have to turn down one?
  • Gradient along the surface of a helical spiral
  • Evergreen visa runs between Thailand, Malaysia, Philippines
  • Should long PCB traces be treated as transmission lines?
  • Do American supermarkets have shopping cart conveyors or shopping cart coins?
  • Does Android OS impose an SMS sending limit?
  • How to write subequations for an equation
  • True Detective season 4: The tongue
  • Can someone else put tefillin on a Jew
  • A canal between two rivers
  • I have a trigger that makes callout to external system in a future(callout=true) but does not run immediately. Where is this callout queued?
  • Math calculation JavaScript. Am I using Objects correctly? Can I use methods / functions to shorten my code further? Also error logging?
  • Saturation region of BJT
  • What's wrong with my furnace blower wiring (only works on AUTO)?
  • What is going on with Edmée's marriage settlement?
  • What are the differences between a synagogue and a temple?
  • Convergence rate of a nonparametric estimator
  • Why did it take so long for the U.S. government to give Medicare the power to negotiate prescription drug prices directly with drug companies?
  • Are Feroli (italy) and Olimp (Greece) legitimate brands of extra virgin olive oil?
  • Hydrazine and liquid fluorine as a semi-cryogenic storable lunar space propellant

port number 30000

Stack Exchange Network

Stack Exchange network consists of 183 Q&A communities including Stack Overflow , the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.

Q&A for work

Connect and share knowledge within a single location that is structured and easy to search.

Which ports to use on a self-written tcp server

I am about to write tcp-server for a project my company is working on. The server will use several port for different tasks. During development we use just some portnumber we like: 1400, 1500, 1600-1650 .

Could we use this ports on our production server? Or are there some security and / or compatibility issues we have to think about?

TheHippo's user avatar

5 Answers 5

As mentioned by Paul, ports <1024 are generally reserved for 'core' services. (Also, many operating systems require services that bind to ports <1024 to be run as root).

However, there are other ports that are commonly in use. The IANA Port number list is normally a good place to look; you should try and avoid using any port on there that is already reserved. Although, practically, this only makes a difference if you are going to be using a service that has a reserved port within your network/on your servers, checking this list is a good habit to get in to whenever you are developing a new network application.

Murali Suriar's user avatar

Do not design your software to use any port below 49152 by default, since these are reserved by IANA (even those unassigned). The user may be able to set a port manually during configuration. If you have to ship the software with a default port preconfigured, use some port from the range 49152 through 65535.

Juliano's user avatar

Anything over 1024 should be fine, if not used by anything else on your production servers.

However, why not make it configurable? Have the ports defined in a configuration file / or directory or something, then if you do have a clash, it's just a quick edit to change it to something else.

Also, this technique allows you to run more than one instance on the same machine (if you have everything that more than one application/process needs defined in the config file - this might include message queue ids, directory names and so on). Our current product doesn't do this, and it's a pain in the proverbial.

The Archetypal Paul's user avatar

  • 1 we have configurable ports... but the configurations still must be written for the production server... –  TheHippo May 25, 2009 at 12:05

I've had trouble using port 2000 for some things. The problem was a virus used that port a long time ago and some routers/firewalls/etc are suspicious of data on the port. I started to default the port numbers to above 30,000.

Robert Deml's user avatar

Simply any port number between 1025 and 65535. The ports below 1024 are reserved for various things basically for OS oriented tasks. Ex 25 for SMTP, 23 for Telnet, 80 for HTTP, 443 for HTTPS likewise.

You must be careful to get a port that is not used by another service, program as well.

Chathuranga Chandrasekara's user avatar

  • Not true, there are lots of ports above 1024 that are reserved by IANA (see Murali Suriar's answer). Port numbers above 49152 are not reserved. –  Graeme Perrow May 24, 2009 at 18:24
  • Hi Graeme, They are NOT the ports used by OS. They are for custom applications. IANA has published them just for reference. –  Chathuranga Chandrasekara May 24, 2009 at 18:36
  • 1 Chathuranga, Ports above 1024 may or may not be used by operating system services, but they are reserved. From the link above: "The Registered Ports are those from 1024 through 49151 DCCP Registered ports SHOULD NOT be used without IANA registration. The registration procedure is defined in [RFC4340], Section 19.9." –  Murali Suriar May 24, 2009 at 19:39
  • It is for permanant registrations right? As an example you are going to release your own application and you are using port 1521 then it will make a conflict with Oracle. Other than that no problem with using any port for local applications.. iana.org/assignments/port-numbers –  Chathuranga Chandrasekara May 25, 2009 at 6:34

You must log in to answer this question.

Not the answer you're looking for browse other questions tagged linux port tcp ..

  • The Overflow Blog
  • Who owns this tool? You need a software component catalog
  • Featured on Meta
  • Upcoming privacy updates: removal of the Activity data section and Google...
  • Changing how community leadership works on Stack Exchange: a proposal and...

Hot Network Questions

  • How can I understand neutrino mixing and the difference between flavour and mass eigenstates?
  • True Detective season 4: The tongue
  • Why does this simple fit run forever?
  • Math calculation JavaScript. Am I using Objects correctly? Can I use methods / functions to shorten my code further? Also error logging?
  • Why didn't NASA launch communications relay satellites outside the asteroid belt to communicate easily with interstellar satellite?
  • Gradient along the surface of a helical spiral
  • How can I properly make a bash prompt with error colors and emoji?
  • Are flights in fast jet streams more dangerous?
  • The Devil's Shell Game
  • Can a judge assign a murder victim's paid counsel to represent her murderer?
  • What investments for US expats don't trigger taxes on unrealized gains
  • Are Feroli (italy) and Olimp (Greece) legitimate brands of extra virgin olive oil?
  • How to write subequations for an equation
  • Can Survival Models model the time at which a random variable will first pass a certain point?
  • Old romantic horror movie about a guy that fell in love with a girl and later found out she's a ghost
  • Should long PCB traces be treated as transmission lines?
  • Is it possible to survive your appendix bursting without surgical intervention?
  • What is the etiquette for applying for multiple PhDs?
  • Do American supermarkets have shopping cart conveyors or shopping cart coins?
  • Effectiveness of Requiring Students to Repeat Proofs Presented in Class
  • When updating a package version, what should the license year be?
  • My PhD supervisor gave up on me
  • Could someone explain the proof of this formula clearly? I got the wrong values for spanning trees with this formula and with Cayley's formula
  • What theorems from single-variable calculus break down in the multi-variable context?"

port number 30000

  • Election 2024
  • Entertainment
  • Newsletters
  • Photography
  • Press Releases
  • Israel-Hamas War
  • Russia-Ukraine War
  • Latin America
  • Middle East
  • Asia Pacific
  • AP Top 25 College Football Poll
  • Movie reviews
  • Book reviews
  • Financial Markets
  • Business Highlights
  • Financial wellness
  • Artificial Intelligence
  • Social Media

More than 29,000 Palestinians have been killed in Israel-Hamas war, Gaza Health Ministry says

Israeli War Cabinet member Benny Gantz warned of an expansion of its ground offensive in Gaza to Rafah if hostages are not released before the upcoming Muslim holy month of Ramadan. (Feb. 20)

Palestinian emergency services look for survivors after an Israeli strike on a residential building in Rafah, Monday, Feb. 19, 2024. (AP Photo/Hatem Ali)

Palestinian emergency services look for survivors after an Israeli strike on a residential building in Rafah, Monday, Feb. 19, 2024. (AP Photo/Hatem Ali)

  • Copy Link copied

People hold torches as they demand the immediate release of the Israeli hostages held in the Gaza Strip by the Hamas militant group, in Jerusalem, Monday, Feb. 19, 2024. (AP Photo/Leo Correa)

Palestinian emergency hose flames after an Israeli strike on a residential building in Rafah, Monday, Feb. 19, 2024. (AP Photo/Hatem Ali)

A man checks a burning and destroyed warehouse, attacked by Israeli strikes, at an industrial district, in the southern coastal town of Ghazieh, Lebanon, Monday, Feb. 19, 2024. Israel’s air force carried out at least two airstrikes near the southern port city of Sidon in one of the largest attacks near a major city, state media reported. (AP Photo/Mohammed Zaatari)

Black smoke and flames rise from an industrial district that attacked by Israeli strikes, in the southern coastal town of Ghazieh, Lebanon, Monday, Feb. 19, 2024. Israel’s air force carried out at least two airstrikes near the southern port city of Sidon in one of the largest attacks near a major city, state media reported. (AP Photo/Mohammed Zaatari)

Firefighters extinguish fire at a destroyed warehouse, attacked by Israeli, strikes at an industrial district, in the southern coastal town of Ghazieh, Lebanon, Monday, Feb. 19, 2024. Israel’s air force carried out at least two airstrikes near the southern port city of Sidon in one of the largest attacks near a major city, state media reported. (AP Photo/Mohammed Zaatari)

People burn torches after a march demanding the immediate release of the Israeli hostages held in the Gaza Strip by the Hamas militant group, in Jerusalem, Monday, Feb. 19, 2024. (AP Photo/Leo Correa)

Women hold a torches during a march demanding the immediate release of the Israeli hostages held in the Gaza Strip by the Hamas militant group, in Jerusalem, Monday, Feb. 19, 2024. (AP Photo/Leo Correa)

Israeli soldiers drive a tanks near the Gaza Strip border, in southern Israel, Monday, Feb. 19, 2024. (AP Photo/Tsafrir Abayov)

A woman holds a torch during a march demanding the immediate release of the Israeli hostages held in the Gaza Strip by the Hamas militant group, in Jerusalem, Monday, Feb. 19, 2024. (AP Photo/Leo Correa)

Black smoke and flames rise from a burning warehouse, attacked by Israeli strikes, at an industrial district, in the southern coastal town of Ghazieh, Lebanon, Monday, Feb. 19, 2024. Israel’s air force carried out at least two airstrikes near the southern port city of Sidon in one of the largest attacks near a major city, state media reported. (AP Photo/Mohammed Zaatari)

Civil defence workers check a burning warehouse, attacked by Israeli strikes, at an industrial district, in the southern coastal town of Ghazieh, Lebanon, Monday, Feb. 19, 2024. Israel’s air force carried out at least two airstrikes near the southern port city of Sidon in one of the largest attacks near a major city, state media reported.(AP Photo/Mohammed Zaatari)

Palestinians run away after an Israeli strike on a residential building in Rafah, Monday, Feb. 19, 2024. (AP Photo/Hatem Ali)

RAFAH, Gaza Strip (AP) — Israel’s assault in Gaza has killed more than 29,000 Palestinians since Oct. 7, the territory’s Health Ministry said Monday, marking another grim milestone in one of the deadliest and most destructive military campaigns in recent history.

Israeli Prime Minister Benjamin Netanyahu has vowed to continue the offensive until “total victory” against Hamas after the militants’ Oct. 7 attack on Israeli communities. He and the military have said troops will move soon into the southernmost town of Rafah on the Egyptian border, where over half of Gaza’s 2.3 million people have sought refuge from fighting elsewhere.

The United States, Israel’s top ally, says it is still working with mediators Egypt and Qatar to try to broker another cease-fire and hostage release agreement. But those efforts appear to have stalled in recent days , and Netanyahu angered Qatar by calling on it to pressure Hamas and suggesting it funds the militant group.

The conflict has also brought near daily exchanges of fire between Israel and Lebanon’s Hezbollah militant group that frequently threaten to escalate.

FILE - Luiz Inacio Lula da Silva, President of Brazil, arrives for a German and Brazil governments meeting at the chancellery in Berlin, Germany, Monday, Dec. 4, 2023. Israel on Sunday, Feb. 18, 2024, condemned Brazil's president for comparing the situation in Gaza to the Holocaust, accusing him of being antisemitic and trivializing the Naza genocide of European Jews during World War II. The outcry further strained relations between the countries, which have deteriorated since President Lula returned to office last year. (AP Photo/Markus Schreiber, File)

Israeli warplanes on Monday carried out at least two strikes near the southern port city of Sidon in one of the largest attacks near a major city, wounding 14 people, Lebanese state media said. The Israeli military said it attacked Hezbollah arms depots near Sidon in retaliation for a drone that exploded in an open field near the northern Israeli city of Tiberias earlier Monday.

In Gaza, the Health Ministry said the death toll had risen to 29,092 since the start of the war, around two-thirds of them women and children. More than 69,000 Palestinians have been wounded, overwhelming the territory’s hospitals, less than half of which are even partially functioning. The ministry does not distinguish between civilians and combatants in its count.

The war began when Hamas-led militants stormed into southern Israel from Gaza on Oct. 7, killing some 1,200 people, mostly civilians, and taking around 250 men, women and children hostage . After a round of exchanges for Palestinians imprisoned by Israel in November, around 130 remain captive, a fourth of them believed to be dead.

The Israeli military released a video Monday showing what is believed to be the youngest hostage, his brother and mother being led through the streets of the southern Gaza city of Khan Younis soon after their kidnapping on Oct. 7.

The video provides evidence that Shiri Bibas and her two young boys, Ariel, 4, and Kfir, who was 9 months old at the time, survived the initial kidnapping. The boys are the only children who remain in captivity, along with their mother.

Rear Adm. Daniel Hagari, the military’s chief spokesman, said the army is “very concerned” about the family’s wellbeing. He said the army found the videos in security cameras seized during its offensive in Khan Younis.

The video appears to show Bibas, wrapped in a blanket, being led through a dirt street by her captors as she carries Ariel. The military said it believed that Kfir was in a baby sling and could not be seen under the blanket.

The infant with red hair and a toothless smile has become a symbol across Israel for the helplessness and anger over the hostages still held in Gaza. Their father, Yarden Bibas, is also still in captivity.

In a statement, the extended Bibas family said the videos “tear our hearts out.” They made a desperate plea for negotiations to release all of the hostages. In January, the family and hundreds of activists marked Kfir’s first birthday in what his family called “the saddest birthday party in the world.”

With thousands of Palestinians detained by Israel since the war began, an Israeli human rights group reported that Palestinians inside Israeli prisons face daily violence from guards, who enter cells and beat inmates with batons, kicks and fists without provocation in abuse it said could amount to torture. Physicians for Human Rights—Israel said in a report Monday that detainees reported guards urinating on them and forcing them to kiss the Israeli flag and to strip. Prisoners are also held in overcrowded cells and deprived of water for long periods, it said.

The U.N. High Commissioner for Human Rights expressed concern about hundreds of Palestinian women and girls in Israeli detention. It said there were credible reports that at least two were raped, and others “subjected to multiple forms of sexual assault,” including being stripped naked and searched by male officers and being photographed “in degrading circumstances.”

Israel says it has killed over 10,000 Palestinian militants but has provided no evidence for its count. The military says it tries to avoid harming civilians and blames the high death toll on Hamas because the militant group fights in dense residential neighborhoods. The military says 236 of its soldiers have been killed since the start of the ground offensive in late October.

On Sunday, Benny Gantz, a member of Netanyahu’s three-man War Cabinet, warned that the offensive would expand to Rafah if the hostages are not freed by the start of the Muslim holy month of Ramadan, expected around March 10.

Israel has said it is developing plans to evacuate civilians from Rafah, but it’s not clear where they would go in the devastated territory, large areas of which have been flattened . Egypt has sealed the border and warned that any mass influx of Palestinians could threaten its decades-old peace treaty with Israel .

Already, the war has driven around 80% of the Palestinians in Gaza from their homes and has left a quarter of the population starving , according to U.N. officials.

The United States says it is still pushing for a truce and hostage-release, and that it would veto a U.N. Security Council resolution calling for an immediate cease-fire because it conflicts with those efforts.

In an interview with Al-Jazeera, a senior official in Hamas, Khalil al-Haya, repeated the group’s demands for releasing the remaining hostages — an end to Israel’s assault, the withdrawal of its troops from Gaza and the release of hundreds of Palestinian prisoners, including top militants. He also said regional stability hinges on the establishment of a fully sovereign Palestinian state — though he did not specify what its borders should be.

Netanyahu has rejected Hanas’ demands. In a speech before American Jewish leaders on Sunday, he said pressure should be applied on Qatar, which played a key role in mediating last year’s cease-fire and hostage release deal.

“Qatar can press Hamas as no one else can. They host Hamas leaders, Hamas is dependent on them financially,” Netanyahu said. “I urge you to press Qatar to press Hamas because we want our hostages released.”

Majed al-Ansari, Qatar’s foreign ministry spokesperson, dismissed Netanyahu’s remarks as “a new attempt to stall and prolong the war for reasons that have become obvious to everyone,” alluding to the Israeli leader’s domestic political troubles .

Qatar denies funding Hamas and says its provision of aid to Gaza in recent years was carried out in full coordination with Israel, the U.S. and other parties.

“The Israeli prime minister knows very well that Qatar has been committed from day one to mediation efforts, ending the crisis and freeing the hostages,” al-Ansari said.

Magdy reported from Cairo

Find more of AP’s coverage at https://apnews.com/hub/israel-hamas-war

port number 30000

Vineyard Wind logs another milestone delivering energy to MA homes. Here's how.

port number 30000

NEW BEDFORD — Five Vineyard Wind turbines are now operating at full power and delivering energy to thousands of homes and businesses in Massachusetts. 

The announcement Thursday comes on the heels of an earlier milestone this year when Vineyard Wind delivered approximately 5 megawatts of power from one turbine to the grid. on Jan. 2. Since then, the project has provided power from each of the first five turbines intermittently as it ramped up to initial operations. 

How much energy are Vineyard Wind's five turbines generating?

Its five turbines are now generating 68 megawatts of energy, enough to power 30,000 homes. Once completed, the project is expected to save consumers $1.4 million in its first 20 years of operation.

Vineyard Wind 1 will be the largest renewable energy in New England once fully operational, delivering 806 megawatts, enough clean electricity to power 400,000 homes and businesses. 

Gov. Healey calls it a turning point

In the Gov. Maura Healey administration press release announcing the milestone she called it a turning point in the transition to clean, affordable energy.  

“This will make the air we breathe safer and healthier, save customers money, and bring us one step closer to achieving net-zero emissions,” Healey said. “I’m grateful to the Legislature for their leadership in developing our offshore wind industry, state and local officials for their efforts, and the union workers who built this industry from the ground up.”   

How many turbines will Vineyard Wind install?

The power from the project interconnects to the New England grid in Barnstable, transmitted by underground cables that connect to a substation further inland on Cape Cod. Once completed, the project will consist of 62 wind turbines off Martha's Vineyard.   

Vineyard Wind CEO and Vineyard Offshore Chief Project Officer Klaus S. Moeller, said in the release that it's a new era of energy production. 

“These 68 megawatts are powering thousands of homes and businesses right now, while also providing a glimpse at our clean energy future,” he said. “Working together with our partners throughout the Commonwealth, we are turning the promise of our industry into reality.”  

What is Vineyard Wind's connection to New Bedford?

New Bedford Mayor Jon Mitchell weighed in on New Bedford’s partnership with the Healey-Driscoll Administration. 

“Vineyard Wind’s latest milestone is further evidence that offshore wind has established itself in the U.S.," he said in the release. "With the benefit of a robust partnership with the Healey-Driscoll Administration, New Bedford is leading the way.”  

Vineyard Wind operates out of the New Bedford Marine Terminal, the first port facility in the nation specifically designed for offshore wind.

Lawmakers, advocates weigh in

A number of local and state lawmakers and environmental groups joined in to praise efforts to produce clean energy by way of offshore wind in the press release. 

Michelle Manion, vice president of policy and advocacy for Mass Audubon said clean energy is essential for protecting people and nature from climate change.

“Vineyard Wind sending clean power to our grid represents a welcome and critical milestone in our transition to clean energy that is essential for protecting people, birds, and other wildlife from the worst impacts of a fast-changing climate," she said in the release.

"Mass Audubon applauds the Commonwealth’s continued leadership on ramping up responsible offshore wind as well as the Healey-Driscoll Administration’s strong commitment to delivering on the Next-Generation Climate Roadmap," she added.

Standard-Times staff writer Kathryn Gallerani can be reached at  [email protected] . Follow her on Twitter: @kgallreporter. Support local journalism by purchasing a digital or print subscription to The Standard-Times today.  

IMAGES

  1. TCP/IP common Port's cheet sheet

    port number 30000

  2. Common & Popular Ports Number used in OS

    port number 30000

  3. what are port numbers in networking

    port number 30000

  4. What is Port Number in networking

    port number 30000

  5. What Is A Port? What Else To Know About The Port?

    port number 30000

  6. CompTIA A+ Port Numbers- What You Should Know In 2023

    port number 30000

COMMENTS

  1. List of TCP and UDP port numbers

    The port numbers in the range from 0 to 1023 (0 to 2 10 − 1) are the well-known ports or system ports. They are used by system processes that provide widely used types of network services. On Unix-like operating systems, a process must execute with superuser privileges to be able to bind a network socket to an IP address using one of the well-known ports.

  2. Port 30000 (tcp/udp) :: SpeedGuide

    SANS Internet Storm Center: port 30000 Notes: Port numbers in computer networking represent communication endpoints. Ports are unsigned 16-bit integers (0-65535) that identify a specific process, or network service.

  3. Port 30000

    Official UnOfficial Unofficialy or sometimes with conflict, the same port may be used by different applications. Other ports How to Open TCP Port 445 on Windows 10: A Comprehensive Step-by-Step Guide If you're a Windows 10 user and need to open a TCP port, specifically Port 8193

  4. Port Forwarding

    For Foundry Virtual Tabletop, when traffic arrives at your WAN IP address on port 30000 (or an alternative port you can choose in the Setup menu), the port forwarding rule will automatically send the connections to your computer's LAN/LOCAL IP address. When is Port Forwarding Not Required?

  5. Common Ports Cheat Sheet: The Ultimate Ports & Protocols List

    Registered Ports: 1024 - 49151 Dynamic/Private Ports: 49152 - 65535 You may use these ports for custom applications free from concerns that it may clash with existing processes. The Most Common Ports for Exams If you're studying for IT certifications such as CCNA, focus on these ports: Conclusion We hope that you found this cheat sheet useful.

  6. The Most Popular TCP and UDP Port Numbers

    The Transmission Control Protocol (TCP) uses a set of communication channels called ports to manage system messaging among several different applications running on the same physical device. Unlike the physical ports on computers like USB ports or Ethernet ports, TCP ports are virtual—programmable entries numbered between 0 and 65535.. Most TCP ports are general-purpose channels that can be ...

  7. Ports explained

    TCP and UDP specify the source and destination port numbers in their packet headers and that information, along with the source and destination IP addresses and the transport protocol (TCP or UDP), enables applications running on hosts on a TCP/IP network to communicate.

  8. Why are ports 30000 to 60000 needed when browsing the net

    1 Answer Sorted by: 9 The web browser needs a port for each HTTP request. Those ports are (rarely) chosen by the browser, but by the kernel. The kernel doesn't look at ipfilter rules, it only tries to use a free port. And most of the time the ports between 30000 and 60000 are used. To see which port range your kernel is trying to use:

  9. List of TCP and UDP port numbers

    This is a list of TCP and UDP port numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need one port for duplex, bidirectional traffic. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist.

  10. List of TCP Ports and UDP Ports (Well-Known)

    The Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) each use port numbers for their communication channels. The ports numbered 0 through 1023 are the well-known system ports, reserved for special uses. Port 0 is not used for TCP/UDP communication although it used as a network programming construct. vaeenma / Getty Images.

  11. What are port numbers and how do they work?

    Lynn Haber, Senior Writer What is a port number? A port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server. All network-connected devices come equipped with standardized ports that have an assigned number.

  12. PortReference

    o the System Ports, also known as the Well Known Ports, from 0-1023 (assigned by IANA) o the User Ports, also known as the Registered Ports, from 1024- 49151 (assigned by IANA) o the Dynamic Ports, also known as the Private or Ephemeral Ports, from 49152-65535 (never assigned) Ports 1024 and above are also referred to as ephemeral ports.

  13. networking

    Trouble opening port 30000 in Arris Asked 7 years, 9 months ago Modified 7 years, 9 months ago Viewed 795 times 0 I'm trying to run a server of an old game, the server is running well, I can connect to it using the 127.0.0.1 with no problems, but I can't get it to be externally acessed, it uses the 30000 port.

  14. Port selection interactions

    For UDP, the total number of configured ephemeral ports is 10000 (ports 30000 - 39999), and this number is reduced by the following amounts: 2 because of the two PORT statements with ports that are within the UDP ephemeral port range (ports 30010 and 30015)

  15. Service Name and Transport Protocol Port Number Registry

    Note. Service names and port numbers are used to distinguish between different services that run over transport protocols such as TCP, UDP, DCCP, and SCTP. Service names are assigned on a first-come, first-served process, as documented in [ RFC6335 ]. Port numbers are assigned in various ways, based on three ranges: System Ports (0-1023), User ...

  16. Port 3000 (tcp/udp) :: SpeedGuide

    23 records found SG security scan: port 3000 jump to: Related ports: 3003 3007 15400 15401 5000 « back to SG Ports err. External Resources SANS Internet Storm Center: port 3000 Notes: Port numbers in computer networking represent communication endpoints.

  17. Service Name and Transport Protocol Port Number Registry

    Port numbers are assigned in various ways, based on three ranges: System Ports (0-1023), User Ports (1024-49151), and the Dynamic and/or Private Ports (49152-65535); the different uses of these ranges are described in [ RFC6335 ].

  18. How Do I Open a Port on Windows Firewall?

    To open a port on Windows 10, search for "Windows Firewall" and go to "Windows Defender Firewall." Click on "Advanced Settings" and create a new inbound rule for the specific port number. You can choose when the rule applies (domain, private, public) and give it a name and description. If needed, you can disable the rule or repeat the steps to ...

  19. Port 30000 (tcp/udp)

    Database updated - March 30, 2016 Search results for "30000" Port: 30000/TCP 30000/TCP - Known port assignments (5 records found) Service Details Source Unassigned IANA threat [threat] Infector Bekkoame infector [trojan] Infector SANS trojan [trojan] DataRape. Remote Access / Keylogger / Steals passwords. Works on Windows.

  20. Commonly used Windows Ports

    Port 0 - 1000 Port 1000 - 2000 Port 2000 - 3000 Port 3000 - 4000 Port 4000 - 5000 Port 5000 - 6000 Port 6000 - 7000 Port 7000 - 8000 Port 8000 - 9000 Port 9000 - 10000 Port 10000 - 11000 Port 11000 - 12000 Port 12000 - 13000 Port 13000 - 14000 Port 14000 - 15000 Port 15000 - 16000 Port 16000 - 17000 Port 17000 - 18000 Port 18000 - 19000 Port 190...

  21. Open Port Check Tool

    Port Number . Check a port's status by entering an address and port number above. Use Connected to monitor your ports. The open port checker is a tool you can use to check your external IP address and detect open ports on your connection. This tool is useful for finding out if your port forwarding is setup correctly or if your server ...

  22. What is the range of ports that is usually used in the traceroute

    The default probes-per-hop is usually 1 or 3. Using the more liberal defaults of 64 and 3, the range would be 33434-33625. In practice a max-ttl of 32 is usually more than enough in which case the range would be 33434-33529. Also note that IANA has allocated only port 33434 to traceroute, but it has left 33435-33655 unallocated.

  23. Which ports to use on a self-written tcp server

    0. Simply any port number between 1025 and 65535. The ports below 1024 are reserved for various things basically for OS oriented tasks. Ex 25 for SMTP, 23 for Telnet, 80 for HTTP, 443 for HTTPS likewise. You must be careful to get a port that is not used by another service, program as well. Share.

  24. Israel-Hamas war: Israel's assault in Gaza has killed more than 29,000

    A man checks a burning and destroyed warehouse, attacked by Israeli strikes, at an industrial district, in the southern coastal town of Ghazieh, Lebanon, Monday, Feb. 19, 2024. Israel's air force carried out at least two airstrikes near the southern port city of Sidon in one of the largest attacks near a major city, state media reported.

  25. Offshore wind supporters celebrate ramping up of turbine power

    Its five turbines are now generating 68 megawatts of energy, enough to power 30,000 homes. Once completed, the project is expected to save consumers $1.4 million in its first 20 years of operation.