Knowledgebase
search
Ctrlk
  • Welcome!
  • Threats
    • Softwarechevron-right
    • Hardwarechevron-right
    • Humanchevron-right
    • Disinformationchevron-right
  • About
    • Portschevron-right
      • 20
      • 21
      • 22
      • 23
      • 25
      • 587
      • 2323
      • 53
      • 80
      • 194
  • Tools
    • Radio Frequency & SubGHZchevron-right
    • Digital Forensicschevron-right
    • Reverse Engineeringchevron-right
    • Hardware & Virtualizationchevron-right
    • VPN Providerschevron-right
    • Database, Cloud, & Firewallschevron-right
    • Enumeration & Listschevron-right
    • Penetration Testingchevron-right
    • Passwords & Authchevron-right
    • Surface Intelligencechevron-right
    • Networks & Wirelesschevron-right
    • Social Mediachevron-right
    • Miscellaneouschevron-right
  • Operating Systems
    • Ubuntuchevron-right
    • Linux Mintchevron-right
    • Kali Linuxchevron-right
    • Arch Linuxchevron-right
    • NetBSDchevron-right
  • Law, Policy, and Ethics
    • Fair Use
    • DMCAchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. About

Ports

A list of different ports used in computer networking, and information about them.

20chevron-right21chevron-right22chevron-right23chevron-right25chevron-right587chevron-right2323chevron-right53chevron-right80chevron-right194chevron-right
PreviousDeep Fakeschevron-leftNext20chevron-right