Cybersecurity Ports Cheat Sheet (TCP/UDP 2026)
If you have ever been mid-scan and suddenly questioned yourself, “Wait, what port does that run on again?” you are definitely not alone. Even experienced security engineers sometimes blank, especially during late-night audits or fast-paced penetration tests.
That is exactly why having a reliable ports cheat sheet matters. This guide is designed as a quick, practical reference you can bookmark, print, or keep nearby while working. It focuses on the security professionals’ encounters during reconnaissance, vulnerability assessments, and defensive monitoring, and is updated with modern attack trends heading into 2026.
Why Ports Still Matter in Modern Security
Open ports remain one of the most common entry points for attackers. Internet-wide scanners continuously map exposed services, giving threat actors a ready-made target list. Industry breach reports consistently show that misconfigurations and exposed services play a major role in security incidents.
Understanding ports isn’t just about memorization; it’s about recognizing risk patterns quickly.
TCP is connection-oriented, making it reliable and easier to monitor, but still vulnerable when exposed unnecessarily.
UDP is faster and connectionless, which makes it popular for amplification attacks and stealthier malicious traffic.
Knowing which services run where helps you detect anomalies before they become incidents.
High Impact TCP Ports to Know
Some TCP ports appear repeatedly across environments and attack reports. These should always be monitored closely:
- 21 (FTP) – Legacy file transfers often targeted due to weak authentication.
- 22 (SSH) – Essential for administration but constantly hit by brute-force attempts.
- 23 (Telnet) – Unencrypted and risky; should be disabled wherever possible.
- 25 / 465 / 587 (SMTP) – Email services where misconfigurations can enable spam relays.
- 53 (DNS) – Zone transfers may leak valuable reconnaissance data.
- 80 (HTTP) – Common web attack surface for injection and misconfiguration exploits.
- 443 (HTTPS) – Secure web traffic but still vulnerable if poorly configured.
- 3389 (RDP) – Frequent ransomware entry point when exposed publicly.
- 5432 (PostgreSQL) – Database exposure risk if credentials are weak.
- 6379 (Redis) – Often misconfigured without authentication controls.
- 9200 (Elasticsearch) – Sensitive data exposure if accessible from the internet.
Critical UDP Ports to Monitor
UDP services are frequently leveraged for reflection and amplification attacks:
- 53 (DNS) – Major vector for amplification DDoS attacks.
- 67/68 (DHCP) – Rogue DHCP servers can redirect traffic.
- 123 (NTP) – Historically abused for reflection attacks.
- 161/162 (SNMP) – Default community strings expose network intelligence.
- 500 / 4500 (IPsec/IKE) – Weak keys can allow interception attempts.
- 1194 (OpenVPN) – Misconfigurations may expose secure tunnels.
Practical Tips for Using This Cheat Sheet
A ports list is only useful if you apply it effectively in daily operations.
Scan strategically
Use network scanning tools to identify exposed services and verify they are required.
Harden configurations
Disable unused services and enforce least privilege on required ports.
Monitor continuously
Unexpected port activity often signals misconfigurations or compromise attempts.
Stay trend-aware
Emerging IoT and cloud workloads continue introducing new exposed services, so periodic reviews are essential.
ALSO READ
- AI Is Powering Cyber Attacks—Here’s How to Stay Ahead
- How to Protect Yourself From Public WiFi Attacks
- Top Cybersecurity Threats for Businesses in 2026
Final Thoughts
Even with evolving attack techniques, exposed services remain one of the simplest ways attackers gain initial access. Keeping a solid mental map of common ports and regularly reviewing what’s open in your environment goes a long way toward reducing risk.
Use this cheat sheet as a quick reference during assessments, architecture reviews, or incident investigations. And if there’s one habit worth reinforcing, it’s this: always question why a port is open and whether it truly needs to be.
For additional guidance, readers may consult publications from cbt-nuggets.
Disclaimer
This article is provided for educational and defensive cybersecurity purposes only. The information is intended to help organizations, IT professionals, and security practitioners improve security awareness and strengthen their security posture. It does not encourage or support unauthorized testing, exploitation, or access to systems.



