Dangerous Open Ports

A comprehensive list for commonly found Dangerous Open Ports by ReConfirm

List of Dangerous Open Ports


Port: 21

Explanation: This port is used for FTP (File Transfer Protocol).

Impact: This port sends its data over plain text, meaning that attackers can abuse this port to intercept and steal credentials.

Mitigation: Close port 21 or use SFTP instead.

Port: 23

Explanation: This port is used for Telnet.

Impact: Telnet sends its data, including passwords, over plain text, making it vulnerable to eavesdropping.

Mitigation: Close port 23 and use SSH instead.

Port: 25

Explanation: This port is used for SMTP (Simple Mail Transfer Protocol).

Impact: Attackers can exploit this port to send spam or phishing emails if not properly secured.

Mitigation: Secure port 25 with proper authentication and spam filtering, or use alternative secure ports like 587 or 465.

Port: 53

Explanation: This port is used for DNS (Domain Name System).

Impact: Open DNS ports can be exploited for DNS amplification attacks.

Mitigation: Secure port 53 by configuring DNS servers to prevent open recursion.

Port: 80

Explanation: This port is used for HTTP (Hypertext Transfer Protocol).

Impact: HTTP traffic is unencrypted, making it susceptible to eavesdropping and man-in-the-middle attacks.

Mitigation: Redirect HTTP traffic to HTTPS (port 443).

Port: 110

Explanation: This port is used for POP3 (Post Office Protocol version 3).

Impact: POP3 can transmit email credentials in plain text, making them vulnerable to interception.

Mitigation: Use POP3S (POP3 over SSL) on port 995 instead, or prefer IMAP.

Port: 135

Explanation: This port is used for Microsoft RPC (Remote Procedure Call).

Impact: Vulnerabilities in RPC have been exploited in various Windows attacks.

Mitigation: Block this port unless absolutely necessary for your network.

Port: 139

Explanation: This port is used for NetBIOS Session Service.

Impact: Can be exploited for network enumeration and potential unauthorized access.

Mitigation: Disable NetBIOS over TCP/IP if not needed.

Port: 161

Explanation: This port is used for SNMP (Simple Network Management Protocol).

Impact: SNMP can be exploited to gather information about network devices or for denial-of-service attacks.

Mitigation: Use SNMPv3 with proper authentication and encryption, or restrict access to trusted IPs.

Port: 389

Explanation: This port is used for LDAP (Lightweight Directory Access Protocol).

Impact: Unencrypted LDAP can expose sensitive directory information.

Mitigation: Use LDAPS (LDAP over SSL) on port 636 instead.

Port: 445

Explanation: This port is used for SMB (Server Message Block).

Impact: Vulnerabilities in SMB have been exploited in major ransomware attacks.

Mitigation: Keep systems updated and block this port from external access.

Port: 1433

Explanation: This port is used for Microsoft SQL Server.

Impact: Attackers can attempt to exploit vulnerabilities or weak credentials in SQL Server.

Mitigation: Restrict access to this port and use strong authentication.

Port: 1521

Explanation: This port is used for Oracle database.

Impact: Attackers can attempt to exploit vulnerabilities or weak credentials in Oracle databases.

Mitigation: Restrict access to this port and use strong authentication.

Port: 3306

Explanation: This port is used for MySQL database server.

Impact: Attackers can attempt to exploit vulnerabilities or weak credentials in MySQL.

Mitigation: Restrict access to this port and use strong authentication.

Port: 3389

Explanation: This port is used for Remote Desktop Protocol (RDP).

Impact: Attackers can attempt brute-force attacks or exploit RDP vulnerabilities.

Mitigation: Use a VPN for remote access instead of exposing RDP directly.

Port: 5900

Explanation: This port is used for VNC (Virtual Network Computing).

Impact: Unsecured VNC can allow unauthorized remote access to systems.

Mitigation: Use VPN for remote access or implement strong authentication for VNC.

Port: 8080

Explanation: This port is often used for web servers and proxies.

Impact: Can be exploited similarly to port 80 if not properly secured.

Mitigation: Use HTTPS, implement proper authentication, and restrict access if used for administrative interfaces.

Port: 27017

Explanation: This port is used for MongoDB database.

Impact: Unsecured MongoDB instances can lead to data breaches.

Mitigation: Enable authentication and encryption, bind to localhost or use firewall rules.