Open Port Scanner
Open ports on your server represent services accessible from the internet. Every unnecessary open port is an attack surface — a database port exposed to the internet, an old admin panel on a non-standard port, or a development service left running in production can all be entry points for attackers.
What SecurityStatus Checks
- Common dangerous ports: 21 (FTP), 23 (Telnet), 3306 (MySQL), 5432 (PostgreSQL), 6379 (Redis), 27017 (MongoDB), 9200 (Elasticsearch)
- Administrative ports: 22 (SSH), 3389 (RDP), 5900 (VNC), 8080/8443 (admin panels)
- Database ports that should never be internet-facing
- Whether sensitive services are accessible without authentication
Why This Matters
Exposed databases without authentication are the leading cause of data breaches in small and medium businesses. Redis, MongoDB, and Elasticsearch have all been found exposed to the internet without authentication, with billions of records stolen. A single exposed database port can mean total data loss.
How to Fix It
- 1
Close all unnecessary ports in your firewall
In your cloud provider's security group or server firewall (ufw, iptables), block all ports by default and only open what you need. A typical web server needs only ports 80 and 443 open to the internet.
- 2
Move databases behind a firewall
Databases should never accept connections from the internet. Bind them to localhost (127.0.0.1) or a private network interface only. In MySQL: `bind-address = 127.0.0.1`. In Redis: `bind 127.0.0.1` in redis.conf.
- 3
Put SSH on a non-standard port or behind a VPN
Changing SSH from port 22 reduces automated scanning noise. Better: put SSH access behind a VPN or use SSH certificates with short-lived credentials. Disable password authentication in sshd_config.
- 4
Use a jump server or VPN for admin access
Remote desktop (RDP), VNC, and admin panels should never be directly internet-accessible. Use a VPN or SSH tunnel. For cloud instances, use your provider's instance connect or session manager instead of opening RDP/SSH directly.
- 5
Audit regularly
Run SecurityStatus scans regularly and compare results. New open ports between scans may indicate compromised systems running backdoor services or misconfigured deployments.
Frequently Asked Questions
Which ports should always be blocked?
SSH on port 22 is open — should I panic?
What if my application needs a custom port?
Related Guides
Check Your Domain Now
Run all 38 security checks including Open Port Scanner and get your domain's security grade in under 2 minutes.
Scan Your Domain Free