This tool checks your public IP address for open TCP ports by having our server attempt a real connection on your behalf. It reports whether each port is open (a service is listening), closed (connection refused), or filtered (a firewall is dropping packets silently) — exactly what any other host on the internet would see.
What is a network port?
A port is a 16-bit number (1–65535) that acts as a numbered door on a networked computer. An IP address routes traffic to the right machine; the port number tells the OS which program should handle that traffic. When a program listens on a port it is waiting for incoming connections. When nothing is listening, the OS rejects connection attempts immediately.
Ports 1–1023 are well-known (reserved for standard services like HTTP on 80 and HTTPS on 443). Ports 1024–49151 are registered (commonly used by applications like MySQL on 3306 or PostgreSQL on 5432). Ports 49152–65535 are ephemeral — used temporarily by your OS for the outgoing side of connections you initiate and not usually associated with listening services.
Open, closed, and filtered — what each status means
- Open — the TCP three-way handshake completed. A service is actively listening and accepted the connection. This port is reachable from the internet.
- Closed — the OS immediately sent back a TCP RST (reset). No service is listening on this port, but the host is reachable. The port is not accessible to remote clients.
- Filtered — our connection attempt received no reply within the timeout. A firewall, router NAT rule, or security group is silently dropping the packet before it reaches the host. This is the most common result for home IP addresses with default router settings.
For most users, nearly all ports will be filtered because home routers apply NAT and block inbound connections by default. Open ports on a public IP mean either a service is intentionally exposed or port forwarding is configured on the router.
How the port check works
Browsers cannot scan external IPs directly — security restrictions prevent JavaScript from making arbitrary TCP connections to public addresses. Instead, this tool uses a server-side endpoint on our infrastructure that initiates the TCP connection on your behalf. The process:
- Your browser sends a request to our
/api/open-ports?port=Nendpoint, authenticated only by being the request origin (we extract your IP from the request). - Our server attempts a TCP connection to your IP on the requested port with a 3-second timeout.
- The result (open / closed / filtered) and elapsed time are returned to your browser and displayed in the table.
This is the same technique used by tools like canyouseeme.org — the check reflects what any external server would see when connecting to your public IP.
Which open ports are security risks?
Not all open ports are dangerous — a web server intentionally exposes port 443. The concern is services that should not be accessible to the public internet:
- Databases (3306 MySQL, 5432 PostgreSQL, 6379 Redis, 27017 MongoDB) — should never be publicly reachable. Even with authentication, exposed databases are constantly probed for weak credentials and known CVEs.
- Remote access (22 SSH, 3389 RDP, 23 Telnet) — SSH with key-based authentication is relatively safe if kept patched; RDP and Telnet are high-risk. All three attract automated brute-force attacks.
- Development servers (3000, 5173, 8080, 8888 Jupyter) — dev tools typically have no authentication and expose sensitive data or code execution. Always bind to
localhostduring development. - Admin panels (9090 Prometheus, 5601 Kibana) — monitoring dashboards often contain credentials and infrastructure details. Restrict to internal networks or VPN.
Related tools
To see the public IP being scanned, visit What Is My IP. To identify your ISP or hosting organization, use What Is My ISP. For round-trip latency to this server, see What Is My Latency.
Privacy note
Port checks are made only to the IP address of the incoming request — we cannot be directed to scan other hosts. Your IP and the scan results are not stored on our servers beyond the duration of your session. See our Privacy Policy for how analytics and advertising operate separately from this diagnostic.