Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow , the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Super User is a question and answer site for computer enthusiasts and power users. It only takes a minute to sign up.
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.

What are the differences between the 3 port types?
I have already read through a thread very similar to this one but I still didn't understand it.
Could anyone explain the difference between well known, registered and dynamic ports.
What I know so far:
well known ports are used for listening and are port forwarded to send traffic to a specific ip
dynamic ports are client side and are used only for the active session. once it expires the port becomes available again. These are only used so the traffic comes back to the correct user.
Registered - don't understand at all
- port-forwarding
- Simon, if you have any question on any post then comment on the answer that has been posted, and they can clarify. That can make answers, and your understanding of them, even better. – barlop Aug 13, 2015 at 11:38
4 Answers 4
Well-Known Ports
- The port numbers in the range from 0 to 1023 are the well-known ports or system ports. They are used by system processes that provide widely used types of network services. On Unix-like operating systems, a process must execute with superuser privileges to be able to bind a network socket to an IP address using one of the well-known ports
Dynamic Ports
- The range 49152–65535 (2 15 +2 14 to 2 16 −1) contains dynamic or private ports that cannot be registered with IANA. This range is used for private, or customized services or temporary purposes and for automatic allocation of ephemeral ports.
Registered Ports
- The range of port numbers from 1024 to 49151 are the registered ports. They are assigned by IANA for specific service upon application by a requesting entity.[1] On most systems, registered ports can be used by ordinary users.. Here are the well-known ports and here are the registered ports .
Here is a great explanation of what ports are for, complements of jcrawford
As far as the TCP and UDP protocols are concerned, ports are all the same. Any of them can be used for a service/daemon to listen on, any of them can be port-forwarded in a NAT (a.k.a. NAPT, PAT) gateway, and any of them can be used for a client to initiate a connection from.
Historically, a lot of well known protocols, such as HTTP (80), have been assigned default ports below 1024, so many OSes, including most Unixes and Unix-like OSes, don't allow you to open a listener on those ports unless you have administrator/root credentials. This is under the assumption that your Unix box is actually a multi-user system, and J. Random User shouldn't be able to run an HTTP server on the box and make it seem like that user's HTTP server is THE OFFICIAL HTTP server for that box by running it on port 80. Same with SSH (22), Telnet (23), SMTP (25), FTP (21), etc.
Between 1024 and 49152 are a bunch ports that have been assigned as the default port for a lot of not-so-well-known, especially corporate/proprietary protocols. It's considered best practice for an OS to try not to use these ports.
When a client or server process asks to listen on a port, or asks to initiate an outgoing TCP connection or UDP flow, and doesn't specify a particular port, the TCP and UDP networking code in the kernel (the "network stack") assigns them a currently unused port arbitrarily. In order to not get in the way of services that may later want to use proprietary "registered" ports, the network stack will typically try to avoid using either well-known or registered ports for this, and instead will restrict itself to the ephemeral/dynamic ports between 49152 and 65535.
They're just numbers. You don't need to think of them as any more complicated than that.
For instance, TCP port 80 is widely recognized as being the HTTP port. Because that service was recognized as being important, it was given a relatively low number on IANA's ports list . (Click the "XML" hyperlink on that page if you want to see the whole list, not broken up by port number.)
However, if you wanted to place a different service (like an SSH server) on a non-default port (like TCP port 80), this will work. Typically this means that both the server and the client will need to specify non-default settings, and there may be some other side effects (like "netstat -a" showing "www" even though it is an SSH connection), but it will work.
So what this means is that there's really no technical difference between a "well-known" port, or a "registered port", or a "dynamic"/"ephemeral" port. In many cases the ports behave exactly the same, and if the ports are treated differently based on which number range they fall in, that is often just some default behavior that can be overridden.
The ports 1023 and lower are lumped into the "well-known" category just because the number is 1023 or less. In fact, IANA's page even provides different names for these categories: "System" ports (for 0-1023), User ports (for 1024-49151), and Private ports (for 49152-65535). So, even the names of the categories can vary. In summary, unless you're preparing for an examination, you don't typically need to worry too much about which category a port number falls into.
Your definition for dynamic ports looks clearer in some ways, than any of the answers.
dynamic ports are client side and are used only for the active session. once it expires the port becomes available again. These are only used so the traffic comes back to the correct user".
I'd just amend that last word to "client".
Users aren't relevant, it's all about the computers. Users just facilitate the communication of the computers!
The server can use the IP to send it to the right computer(the client computer). It got a packet it sees the source IP of the packet it got and it can write that in as the dest IP when it sends the packet out.
Toomgo points out in his comment, that a process can start many "conversations".
The client port will identify which conversation that packet is part of.
I'd say well known ports are for listening. So, as you know, they're server side. The computer with the port that listens is the server (according to a main definition for server anyway)
NAT Routers if they're doing port forwarding, would port forward to them. But Port forwarding is something that if done, is done on the "NAT router" but you could connect from one computer in your LAN, to another computer in your LAN. No port forwarding. So it's not part of any definition of when you are using a well known port.
i'm not sure that I do either.
It looks like they might just be the same as well known ports but not as well known.. i.e. one could call them less well known ports. And the so-called well known ports are < 1024, and the so-called registered ports are over 1023.
Really technically it doesn't matter what IANA say a port is for. People can run servers on any port they want as long as they know or find out what is running on the port so they know what they're connecting to / what port to connect on. Of course if you're dealing with people that expect something to on a particular port or software expects it, then you might want to use that port. Like port 80 for webpages.. and some use port 8080 for internal web. Or as a memory aid you might want to stick to convention. As one layer of security people sometimes run a server on a high port so a hacker can't guess it.
A NAT router if doing port forwarding, would port forward to them too.
So the distinction you made, is the best. The dynamic client side ports, and the server side ports. And yeah if any NAT router is doing port forwarding, they'd do it to the server side ports. And IANA seems to have lists that name the server side ports numbers with what conventionally would be on there, and they categorize the lists, with the conventions for ports < 1024 as "well known"and the conventions for ports > 1023 as "registered" which I guess is like less well known. But technically I guess there isn't really a difference beyond that.
- I agree 100% that well-known ports and registered ports are kind of a fuzzy mix. The only main difference I know of is that in Unix environments, you need sudo privileges in order to bind well-known ports. I found a few interesting explanations between the two. – DrZoo Aug 13, 2015 at 0:08
- @barlop Despite your "I'd say" and "i'm not sure" and "I guess", you're pretty right. One note is that the TCP port numbers are meant to distinguish conversations, not users or computers. For instance, you can create multiple HTTP or FTP connections to the same server, and download multiple files at once. The TCP port numbers (combined with the IP/network address) can help keep track of which incoming data is meant for which file transfer communication/conversation, even if the same user @ the same computer is being used. – TOOGAM Aug 13, 2015 at 0:22
- @TOOGAM Yeah.. indeed, more specific than computer.. I'd note though that in the case of UDP ports it can be potentially be a monologue, rather than a connection/"conversation". I suppose it could be a conversation too even with UDP(even though technically UDP is termed connection-less)..And I suppose the ports help the OS identify what process the packet is for, as well as helping process (as you say) identify which "conversation" the packet was/is part of. – barlop Aug 13, 2015 at 1:01
- 1 If I send two DNS queries to the same DNS server (using UDP), the correct response should match the query. So UDP does support the concept of multiple conversations (hence the usefulness of port numbers) and replies, even though it doesn't do TCP's fancy "3-way handshake" method of initiating what TCP calls a "connection". – TOOGAM Aug 13, 2015 at 1:03
You must log in to answer this question.
Not the answer you're looking for browse other questions tagged networking port-forwarding ..
- The Overflow Blog
- An intuitive introduction to text embeddings
- How the co-creator of Kubernetes is helping developers build safer software
- Featured on Meta
- Update: New Colors Launched
- Incident update and uptime reporting
Hot Network Questions
- Two Trains, One Track
- Is it legal to bribe a private eye?
- Install a Python package on Debian/Devuan when apt has no package for it
- 12V piezo buzzer not working using ESP32
- Repeating a list k times
- What considerations would have to be made for a spacecraft with minimal-to-no digital computers on board?
- How ほど is understood in this sentence?
- Is there video evidence that Palestinians avoided targetting civilians during the Oct 7 attacks on Israel?
- How might a science-fiction world's technology advance faster than our own?
- When was the last/prior time a former PM served in another (non-PM) position in the UK government?
- Are pocket-hole screws stronger than 90° screw joints for building these garage shelves?
- Are the stories from Chashukei Chemed real?
- Thermal Superconductors vs Pulse Lasers
- Is the expectation of a random vector multiplied by its transpose equal to the product of the expectation of the vector and that of the transpose
- Rendering of arrowheads in 3D
- How to make garage door easy to manually lift for 5 year old
- Bell shape of student in a class has a height mean of 68 inches with 16% of them taller than 71 inches. What % of students are taller than 65 inches?
- What Is 'Given' Information according to the 'Given-before-New' Principle?
- What variational problem does the parabolic suspension bridge solve?
- "He" as the antecedent of a relative pronoun
- Medical Withdrawals and Grad School Admission
- Is the sum of the reciprocals of the products of pairs of coprime positive integers and their sums equal to 2?
- How to split a table across pages using longtable?
- Detecting a "bad map" in Fintushel-Stern knot surgery
Your privacy
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy .
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow , the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Server Fault is a question and answer site for system and network administrators. It only takes a minute to sign up.
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Ports below 1024
DISCLAIMER : I know how to run daemons that either listen on ports <1024 by using privbind or some iptables REDIRECT. Or more generally spoken, how to make daemons available on priviliged ports that usually don't run there.
The question itself is kind of a meta question.
QUESTION : Why on earth is it that ports <1024 are generally reserved to the root user. From a pragmatic point of view I'd love to be able to just tell a daemon under which port to lisen on and not have to care about root privileges. The more I think about it the more I come to the conclusion that specifically this kind of "security" is just historical bloat.
A sysctl along the lines of sysctl -w net.ipv[46].conf.port.80=www-data (something like that, I hope the idea is what comes trhough) would be what I'd really desire.
This way it would be possible to maintain the "current level of security" but still allow arbitrary users to listen on lower ports. Linux capabilities ( CAP_NET_BIND_SERVICE ) are a first step in the right direction - at least in my mind - but given that I'm used to ports <1024 being something special I hesitate dropping the restriction completely. I just can't see an objective reason why that is the case.
Someone please enlighten me :)
Note : Yes I read some of the similiar titles but I'm not quite satisfied with a "You shouldn't be doing it". Having to jump through hoops to get apache listen on port 80 where all it does is starting up with root and then dropping privileges is unnecessary (at least I think that). Why can't I just let it run as a normal user and do it's work. That way a privilege escalation bug wouldn't even allow for root privileges. All there is are privileges of www-data (or whatever the user on the distro of choice is)
- permissions
As far as I know this is, indeed, mainly just an historical convention ; the idea being that when accessing a port under 1024 you can be sure you're accessing whatever the administrator of the server configured to run on the server. This made more sense back when servers where few and huge and you needed an easy way to authenticate, or at least judge the reliability of a service, by such basic means.
By the way, you may find that Capabilities do what you want. See this SO question for more information on the alternatives, but here's the sample use:
- setcap works if you have kernel 2.6.24+ running – Mike Jun 5, 2011 at 1:54
- I already new about Capabilities thanks. I'd rather like to know what will break (and why) - nfs is a good example but the clients can't possibly know wether my daemon is listening as root or not so it's basically a trust problem (in social terms) not a technical problem. The one thing I could imagine is that anybody can listen anywhere and thus just listen on all ports. Rendering the machine useless for serving "network stuff" – serverhorror Jun 5, 2011 at 12:18
- Binding the network port may be only one of the things apache does before dropping it's privileges and you might take a look into manual or code to see. Although removing eg. apache's need to start as root sounds like a good goal , please don't misunderstand and think this will prevent priv escalatation attacks from getting to root. After all that is their purpose in life :) – adric Jun 5, 2011 at 12:33
- It has been twelve years since RFC 2623, and ten years since Olaf Kirch wrote what you hyperlinked to. Nowadays, the world is different. The MacOS 10 NFS client defaults to using port numbers over 1024 and Linux has had the noresvport mount option since 2009. Repeating the received wisdom of over a decade ago, and saying that it's too hard to change, rather misses the fact that during the intervening decade it has changed. – JdeBP Jun 6, 2011 at 9:35
- I missed the fact because I didn't know that, @JdeBP - why don't you post another, better answer? This is what this site is about, right? – Eduardo Ivanec Jun 6, 2011 at 10:33
You must log in to answer this question.
Not the answer you're looking for browse other questions tagged linux networking port root permissions ..
- The Overflow Blog
- An intuitive introduction to text embeddings
- How the co-creator of Kubernetes is helping developers build safer software
- Featured on Meta
- Update: New Colors Launched
- Incident update and uptime reporting
Hot Network Questions
- How ほど is understood in this sentence?
- Is the expectation of a random vector multiplied by its transpose equal to the product of the expectation of the vector and that of the transpose
- When did criminal discovery rules substantially form?
- Are the stories from Chashukei Chemed real?
- Two ways to install partimage in Ubuntu 22.04?
- How do I determine the apt package name for a given PyPI package?
- Identifying traffic signals for colour blind people
- Short story where an alien signal containing a DNA sequence leads to the end of life on Earth
- What is malicious privacy?
- How to split a table across pages using longtable?
- いいがと、Pattern meaning?
- Did West Germany build or mandate bomb shelters for ordinary civilians?
- Add two natural numbers
- What considerations would have to be made for a spacecraft with minimal-to-no digital computers on board?
- Is There a Lower Limit on the Size of Fusion Reactor?
- How did Kamala do this in The Marvels?
- Freezer dripping water
- Is there a name for the literary device in the expression "Thanks, I hate it."?
- Observation of the effect of gravity on the motion of antimatter
- Meaning of "the field was found to be plowed as thoroughly as any young man at Oxford" in 'The Book of Dragons'
- What is the probability that your life will have lasted for 100 years once you die?
- Repeating definitions in the Abstract in the Introduction?
- Tricky Integral: Evaluating Renormalized Ultraviolet "Divergent" Integral
- Looking for a book where there was a drug that permanently increased intelligence
Your privacy
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy .
services(5) — Linux manual page
Name top, description top, files top, see also top.
Pages that refer to this page: getaddrinfo(3) , getnameinfo(3) , getservent(3) , getservent_r(3) , nscd(8) , rpc.rquotad(8) , rsyslogd(8)
- C Data Types
- C Operators
- C Input and Output
- C Control Flow
- C Functions
- C Preprocessors
- C File Handling
- C Cheatsheet
- C Interview Questions

- Explore Our Geeks Community
- dup() and dup2() Linux system call
- Making your own Linux Shell in C
- C program that does not suspend when Ctrl+Z is pressed
- Fork() - Practice questions
- getppid() and getpid() in Linux
- Non-blocking I/O with pipes in C
- Fork() Bomb
- pipe() System call
- Wait System Call in C
- fork() and memory shared b/w processes created using it
- Reverse a string in C/C++ using Client Server model
- C vs BASH Fork bomb
- Input-output system calls in C | Create, Open, Close, Read, Write
- Working with Magic numbers in Linux
- Accept system call
- TCP Server-Client implementation in C
- Zombie Processes and their Prevention
- Segmentation Fault (SIGSEGV) vs Bus Error (SIGBUS)
- Thread functions in C/C++
How to bind to port number less than 1024 with non root access?
Why are the first 1024 ports restricted to the root user only?
Binding is an integral step for server side socket. It’s like providing some address to end-user (server). So, we assign an IP address and a port number for running a server. But we can not provide any random port number to a server. The port numbers from 1 to 1023 are restricted for root user only and we can not assign those ports without having root access.
The reason behind this restriction is that most major network services like HTTP, FTP, SSH, Telnet, POP etc. runs in this range. So, if any one is allowed to run on those port, following circumstances may arise :
- An untrusted user could run a program that listened on these ports for login (access) details.
- An untrusted user could run an unauthorized server application.
Below program verifies the fact that port numbers from 1 to 1023 are restricted for root access.
We use bind() function which returns 0 on success and -1 on failure. We call bind in a loop for different port numbers until it returns 0.
How to allow non root access to bind below port number 1024?
But there are two method by which we can assign port number less than 1024 without having root privilege :
- Method 1 : Using CAP_NET_BIND_SERVICE to grant low-numbered port access to a process : For this, we just need to run following command in terminal : sudo setcap CAP_NET_BIND_SERVICE=+eip /path/to/binary
- Install authbind using any package manager
- Now execute following command in terminal authbind --deep /path/to/binary command line args
If you like GeeksforGeeks and would like to contribute, you can also write an article using write.geeksforgeeks.org or mail your article to [email protected]. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.
Please Login to comment...

- system-programming
Please write us at contrib[email protected] to report any issue with the above content
Improve your Coding Skills with Practice
Common Ports Cheat Sheet: The Ultimate Ports & Protocols List

Perhaps you’re angsty that you’ve forgotten what a certain port number meant. Rest assured, you don’t have to remember all 65,535 port numbers. With so much information to remember, it’s understandable if you forget a common port. That’s why we put together this cheat sheet of common network ports for you.
A crucial domain of expertise in IT-related certifications such as Cisco Certified Network Associate (CCNA) and those of CompTIA is port numbers and associated services , which this common ports and protocols cheat sheet covers. If you want to remember a port number or protocol, this cheat sheet will help everyone, from students to professionals.
Get a copy of this common ports cheat sheet here to keep on your desk. When you're ready, scroll below to find the port you’re looking for.
Common Ports Cheat Sheet Search
Search our Common Ports cheat sheet to find the right cheat for the term you're looking for. Simply enter the term in the search bar and you'll receive the matching cheats available.
Common Ports and Protocols Cheat Sheet
The following tables cover services (and malware) that use common TCP ports and some UDP or SCTP ports.

Well-known/System Ports: 0 – 1023
Registered ports: 1024 – 49151, dynamic/private ports: 49152 – 65535.
You may use these ports for custom applications free from concerns that it may clash with existing processes.
The Most Common Ports for Exams
If you’re studying for IT certifications such as CCNA , focus on these ports:
We hope that you found this cheat sheet useful. Familiarity with ports and protocols is vital to building secure applications and troubleshooting problems on computer networks. Whether you're studying or working, this cheat sheet of common network ports will help you in academic and professional settings.
For further resources, or if you’re curious about how ports and protocols fit into cyber security, look into network security courses in our VIP membership .
Frequently Asked Questions
FTP: ports 20-21; SSH/SCP: port 22; HTTP: 80; HTTPS: 443; POP3: 110; POP3 over SSL: 995; IMAP: 143; IMAP over SSL: 993. We recommend you download the graphic in Well-known/System Ports .
It depends on whether you’re referring to system ports (1024) or want to include ports registered with apps (49152) because system ports range from 0 through 1023, and registered ports span 1024 – 49151.
FTP: ports 20-21; SSH/SCP: port 22; Telnet: 23; SMTP: 25; DNS: 53; HTTP: 80; POP3: 110; IMAP: 143; HTTPS: 443.
FTP: port 21; SSH/SCP: 22; Telnet: 23; SMTP: 25; DNS: 53; POP3: 110; IMAP: 145; HTTP: 80; HTTPS: 443; MySQL: 3306; RDP: 3389; VNC: 5900.
The following are the three types of ports with corresponding port number ranges: • Well-known/System ports: 0 – 1023 • Registered ports: 1024 – 49151 • Dynamic/Private ports: 49152 – 65535
Level Up in Cyber Security: Join Our Membership Today!
Nathan House is the founder and CEO of StationX. He has over 25 years of experience in cyber security, where he has advised some of the largest companies in the world. Nathan is the author of the popular "The Complete Cyber Security Course", which has been taken by over half a million students in 195 countries. He is the winner of the AI "Cyber Security Educator of the Year 2020" award and finalist for Influencer of the year 2022.
View all posts
Related Articles
Nmap cheat sheet 2023: all the commands, flags & switches.
The one downside to a tool as robust and powerful … Nmap Cheat Sheet 2023: All the Commands, Flags & Switches Read More »
Read More »
Linux Command Line Cheat Sheet: All the Commands You Need
You may need to open a compressed file, but you've … Linux Command Line Cheat Sheet: All the Commands You Need Read More »
Wireshark Cheat Sheet: All the Commands, Filters & Syntax
Wireshark is arguably the most popular and powerful tool you … Wireshark Cheat Sheet: All the Commands, Filters & Syntax Read More »
The Only IPv4 Subnetting Cheat Sheet You’ll Ever Need
Our beginner networking students often describe IPv4 subnetting as the … The Only IPv4 Subnetting Cheat Sheet You’ll Ever Need Read More »
Nathan, thank you for supplying this sheet. It comes in handy when you’re trying to remember what a particular port is used by.
Our pleasure.
Thank you, Nathan
This is a great single point to reference all default ports. Thank you!!!
Very good, it will be in front of me!
Ports on computers are required for networking, and without them, the computer would be completely isolated and it would be unable to communicate with other devices. So thank you for proving this list of the Common TCP and UDP Port numbers.
After resetting my router cause the password got changed and all the setting were changed to gain access to my computer. I spent about 20 minutes setting up the router. It appears the router never got set up from the cable company when it was installed. So if you have not done so lately check your router and settings.
Cool, Thanks for sharing!!
Sorry Nathan, i did not leave a comment for this “Common Ports” Chart last-week. I am glad i signed up to your news letter you are a good researcher. thank you for sharing with us all..
Nathan, I must thank you for these cheat sheets! They’ve been great on my learning and certification journey!
Thank you too!
Really really useful.Thanks a lot!!
Session expired
Please log in again. The login page will open in a new tab. After logging in you can close it and return to this page.
- Affordable Luxury: Top-Tier Tech Delights
- Early Black Friday Deals!
Port Numbers Used for Computer Networks
TCP and UDP ports explained
- Massachusetts Institute of Technology
- University of Illinois
:max_bytes(150000):strip_icc():format(webp)/WorkBadgePhoto-61c0b98ef5a74e4a85851a8f706dbd65.jpg)
In This Article
Jump to a Section
What Is a Port Number in Networking?
How port numbers work, when you may need to take action with port numbers, open and closed ports.
In computer networking , port numbers are part of the addressing information used to identify the senders and receivers of messages. They are associated with TCP/IP network connections and might be described as an add-on to the IP address .
Port numbers allow different applications on the same computer to share network resources simultaneously. Home network routers and computer software work with these ports and sometimes support configuring port number settings.
Networking ports are software-based and unrelated to physical ports that network devices have for plugging in cables.
Hero Images / Getty Images
Port numbers relate to network addressing . In TCP/IP networking, both TCP and UDP use a set of ports that work together with IP addresses.
These port numbers work like telephone extensions. Just as a business telephone switchboard can use the main phone number and assign each employee an extension number, a computer can have a main address and a set of port numbers to handle incoming and outgoing connections.
In the same way that all employees within a building can use one phone number, one IP address can be used to communicate with various applications behind one router. The IP address identifies the destination computer, and the port number identifies the specific destination application.
This is true whether it's a mail application, file transfer program, or web browser. When you request a website from a web browser, the browser communicates over port 80 for HTTP . Then, the data is sent back over the same port and displays in the program that supports that port (the web browser).
In both TCP and UDP, port numbers start at 0 and go up to 65535. The lower ranges are dedicated to common internet protocols such as port 25 for SMTP and port 21 for FTP.
To find the specific values used by certain applications, view a list of the most popular TCP and UDP port numbers . For Apple software, view the TCP and UDP ports used by Apple software products .
The network hardware and the software automatically process port numbers. Casual users of a network do not see these port numbers and don't need to take any action involving their operation. Individuals can, however, encounter network port numbers in certain situations.
Network administrators may need to set up port forwarding to allow the port numbers of specific applications to pass through a firewall . On home networks, a broadband router supports port forwarding on its configuration screens. A common application of homeport forwarding is for online games that use non-standard ports that the router's built-in firewall blocks.
Network programmers sometimes need to specify port numbers in their code, such as in socket programming.
A website URL will sometimes require a specific TCP port number to be included. For example, http://localhost:8080/ uses TCP port 8080 rather than the default port 80. This is usually seen in software development environments more than in mainstream consumer usage.
Network security enthusiasts also frequently discuss the port number used as a key aspect of attack vulnerabilities and protections. Ports can be classified as either open or closed. Open ports have an associated application that listens for new connection requests, and closed ports do not.
A process called network port scanning detects test messages at each port number to identify which ports are open. Network professionals use port scanning as a tool to measure exposure to attackers and often lock down networks by closing non-essential ports. Hackers, in turn, use port scanners to probe networks for open ports that may be exploitable.
You can use the netstat command in Windows to see information regarding active TCP and UDP connections.
Get the Latest Tech News Delivered Every Day
- The Most Popular TCP and UDP Port Numbers
- An Overview of Socket Programming for Computer Networking
- What Is Port 0 Used For?
- 10 Best Free Firewall Programs
- How to Set Up Port Forwarding
- Computer Ports: Usage & Role in Networking
- Xbox Network TCP and UDP Port Numbers
- TCP Port Number 21 and How It Works With FTP
- What Is a Private IP Address?
- How to Fix Common Xbox 360 Wireless Networking Problems
- TCP vs. UDP
- Computer Networking Tutorial - Internet Protocol
- How to Check If a Port Is Open in Windows 10
- How to Open a Port on a Windows or Mac Firewall
- 16 Best Free Remote Access Software Tools
- List of TCP Ports and UDP Ports (Well-Known)
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts.

- Skip to main content
- Skip to footer
Audit My PC - Free Internet Security Audit
Firewall Test and web tools to check your security and privacy
Looking for information on Protocol TCP 1024 ? This page will attempt to provide you with as much port information as possible on TCP Port 1024.
TCP Port 1024 may use a defined protocol to communicate depending on the application. A protocol is a set of formalized rules that explains how data is communicated over a network. Think of it as the language spoken between computers to help them communicate more efficiently.
Protocol HTTP for example defines the format for communication between internet browsers and web sites. Another example is the IMAP protocol that defines the communication between IMAP email servers and clients or finally, the SSL protocol which states the format to use for encrypted communications.
TCP Port 1024
Here is what we know about protocol TCP Port 1024 . If you have information on TCP port 1024 that is not reflected on this page, simply leave a comment and we’ll update our information.
PORT 1024 – Information
- Port Number: 1024
- TCP / UDP: TCP
- Delivery: Yes
- Protocol / Name: [Malware known as Latinus ]
- Port Description: [malware info: Latinus ]
- Virus / Trojan: Yes, Caution! Use our free Digital Footprint and Firewall Test to help verify you are not infected.
Side note: TCP port 1024 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered on port 1024 in the same order in which they were sent. Guaranteed communication over port 1024 is the key difference between TCP and UDP. UDP port 1024 would not have guaranteed communication in the same way as TCP.
Because protocol TCP port 1024 was flagged as a virus (colored red) does not mean that a virus is using port 1024, but that a Trojan or Virus has used this port in the past to communicate.
TCP 1024 – Disclaimer
We do our best to provide you with accurate information on PORT 1024 and work hard to keep our database up to date. This is a free service and accuracy is not guaranteed. We do our best to correct any errors and welcome feedback!
Reader Interactions
Leave a reply.
Your email address will not be published. Required fields are marked *
Miscellaneous
- Free Address Finder
- HTML Encoder Decoder
- Website Monitoring
- Whats My IP Address?

IMAGES
VIDEO
COMMENTS
Why are ports below 1024 privileged? [closed] Ask Question Asked 11 years, 6 months ago Modified 3 years, 2 months ago Viewed 51k times 79 Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
The port numbers in the range from 0 to 1023 (0 to 2 10 − 1) are the well-known ports or system ports. [3] They are used by system processes that provide widely used types of network services.
The TCP/IP port numbers below 1024 are special in that normal users are not allowed to run servers on them. This is a security feaure, in that if you connect to a service on one of these ports you can be fairly sure that you have the real thing, and not a fake which some hacker has put up for you. The normal port number for W3 servers is port 80.
Ports with numbers 0-1023 are called system or well-known ports; ports with numbers 1024-49151 are called user or registered ports, and ports with numbers 49152-65535 are called dynamic, private or ephemeral ports. [2] Both system and user ports are used by transport protocols ( TCP, UDP, DCCP, SCTP) to identify an application or service. See also
You can redirect the low port to a high port and listen on the high port. iptables -t nat -A PREROUTING -p tcp --dport 80 -j REDIRECT --to-ports 1080. You can start your server as root and drop privileges after it's started listening on the privileged port.
Ask Question Asked 11 years ago Modified 11 years ago Viewed 1k times 3 I'm root on a machine I don't know how it was configured. I try to open SSHD on another port than 22 but it does not work. I changed the /etc/ssh/sshd_config file and added a new Port line extra to the Port 22. but it does only work when this second port is a number above 1024.
TCP and UDP port numbers between 1024 and 49151 are called registered ports. The Internet Assigned Numbers Authority maintains a listing of services using these ports in order to minimize conflicting uses. Unlike ports with lower numbers, developers of new TCP/UDP services can select a specific number to register with IANA rather than having a ...
The range of port numbers from 1024 to 49151 are the registered ports. They are assigned by IANA for specific service upon application by a requesting entity.[1] ... Historically, a lot of well known protocols, such as HTTP (80), have been assigned default ports below 1024, so many OSes, including most Unixes and Unix-like OSes, don't allow you ...
53 This question already has answers here : How to run a server on port 80 as a normal user on Linux? (20 answers) Closed 5 years ago. I would like to run applications I'm working on that binds to port numbers less than 1000 without requiring root access. I'm using Linux Mint and have root access to set it up.
1 Answer Sorted by: 1 As far as I know this is, indeed, mainly just an historical convention; the idea being that when accessing a port under 1024 you can be sure you're accessing whatever the administrator of the server configured to run on the server.
Port numbers below 1024 (so-called "low numbered" ports) can be bound to only by root (see bind(2), tcp(7), and udp(7)). This is so clients connecting to low numbered ports can trust that the service running on the port is the standard implementation, and not a rogue service run by a user of the machine. Well-known port numbers specified by the ...
As we mentioned above, the Transport Layer uses Port Numbers to differentiate between various applications that might need communication services. You should be ready to get questions in the CCNA exam regarding port numbers and their association with different applications. You should know that port numbers below 1024 are reserved for several ...
Why are the first 1024 ports restricted to the root user only? Binding is an integral step for server side socket. It's like providing some address to end-user (server). So, we assign an IP address and a port number for running a server. But we can not provide any random port number to a server.
Registered Ports: 1024 - 49151 Dynamic/Private Ports: 49152 - 65535 You may use these ports for custom applications free from concerns that it may clash with existing processes. The Most Common Ports for Exams If you're studying for IT certifications such as CCNA, focus on these ports: Conclusion We hope that you found this cheat sheet useful.
Malware writers don't care what port they listen on, and they are more than happy to open a port greater than 1024. It seems to me that all ports should require privileges, or no ports should require privileges. And requiring root to open a port below 1024 just means you have a high risk application running as root.
Bradley Mitchell Updated on September 17, 2021 Reviewed by Michael Barton Heine Jr In This Article Jump to a Section What Is a Port Number in Networking? How Port Numbers Work When You May Need to Take Action With Port Numbers Open and Closed Ports
For choosing a port number below 1024 select a port within the range 1-1023 that is not already assigned to a well-known service. You can refer to the IANA (Internet Assigned Numbers Authority) service name and port number registry to ensure you don't select a port already in use. Service Name and Transport Protocol Port Number Registry
Big Number Calculator; The Quiet Canine; Port Authority Edition - Internet Vulnerability Profiling by Steve Gibson, Gibson Research Corporation. Goto Port 1020: Probe Port 1024: Enter Port: 0-65535: Goto Port 1025: Port Authority Database Port 1024. Name: reserved: Purpose: Reserved:
Port Number: 1024. TCP / UDP: TCP. Delivery: Yes. Protocol / Name: [Malware known as. Port Description: [malware info: Virus / Trojan: Yes, Caution! Digital Footprint Firewall Test to help verify you are not infected. Side note: TCP port 1024 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks.