Internet Assigned Numbers Authority

Service Name and Transport Protocol Port Number Registry

Last Updated
2024-11-19
Expert(s)
TCP/UDP: Joe Touch; Eliot Lear, Kumiko Ono, Wes Eddy, Brian Trammell, 
Jana Iyengar, and Michael Scharf
SCTP: Michael Tuexen
DCCP: Eddie Kohler and Yoshifumi Nishida
Reference
[RFC6335]
Note
Service names and port numbers are used to distinguish between different
services that run over transport protocols such as TCP, UDP, DCCP, and
SCTP.

Service names are assigned on a first-come, first-served process, as
documented in [RFC6335].

Port numbers are assigned in various ways, based on three ranges: System
Ports (0-1023), User Ports (1024-49151), and the Dynamic and/or Private
Ports (49152-65535); the different uses of these ranges are described in
[RFC6335]. According to Section 8.1.2 of [RFC6335], System Ports are 
assigned by the "IETF Review" or "IESG Approval" procedures described in 
[RFC8126]. User Ports are assigned by IANA using the "IETF Review" process, 
the "IESG Approval" process, or the "Expert Review" process, as per 
[RFC6335]. Dynamic Ports are not assigned.

The registration procedures for service names and port numbers are
described in [RFC6335].

Assigned ports both System and User ports SHOULD NOT be used without
or prior to IANA registration.

************************************************************************
* PLEASE NOTE THE FOLLOWING:                                           *
*                                                                      *
* ASSIGNMENT OF A PORT NUMBER DOES NOT IN ANY WAY IMPLY AN             *
* ENDORSEMENT OF AN APPLICATION OR PRODUCT, AND THE FACT THAT NETWORK  *
* TRAFFIC IS FLOWING TO OR FROM A REGISTERED PORT DOES NOT MEAN THAT   *
* IT IS "GOOD" TRAFFIC, NOR THAT IT NECESSARILY CORRESPONDS TO THE     *
* ASSIGNED SERVICE. FIREWALL AND SYSTEM ADMINISTRATORS SHOULD          *
* CHOOSE HOW TO CONFIGURE THEIR SYSTEMS BASED ON THEIR KNOWLEDGE OF    *
* THE TRAFFIC IN QUESTION, NOT WHETHER THERE IS A PORT NUMBER          *
* REGISTERED OR NOT.                                                   *
************************************************************************

Request an Assignment
  [https://www.iana.org/protocols/apply]

Available Formats

CSV

XML

HTML

Plain text
Service Name Port Number Transport Protocol Description Assignee Contact Registration Date Modification Date Reference Service Code Unauthorized Use Reported Assignment Notes
corba-iiop 683 tcp CORBA IIOP
corba-iiop 683 udp CORBA IIOP
connendp 693 tcp almanid Connection Endpoint [Ronny_Bremer] [Ronny_Bremer]
connendp 693 udp almanid Connection Endpoint [Ronny_Bremer] [Ronny_Bremer]
epp 700 tcp Extensible Provisioning Protocol [RFC5734]
epp 700 udp Extensible Provisioning Protocol [RFC5734]
iris-beep 702 tcp IRIS over BEEP [RFC3983]
iris-beep 702 udp IRIS over BEEP [RFC3983]
703 Unassigned
tbrpf 712 tcp TBRPF [RFC3684]
tbrpf 712 udp TBRPF [RFC3684]
iris-xpc 713 tcp IRIS over XPC
iris-xpc 713 udp IRIS over XPC
iris-lwz 715 tcp IRIS-LWZ [RFC4993]
iris-lwz 715 udp IRIS-LWZ [RFC4993]
netviewdm2 730 tcp IBM NetView DM/6000 send/tcp
netviewdm2 730 udp IBM NetView DM/6000 send/tcp
netviewdm3 731 tcp IBM NetView DM/6000 receive/tcp [Philippe_Binet] [Philippe_Binet]
netviewdm3 731 udp IBM NetView DM/6000 receive/tcp [Philippe_Binet] [Philippe_Binet]
732-740 Unassigned
743 Unassigned
rrh 753 tcp
rrh 753 udp
cycleserv 763 tcp
cycleserv 763 udp
submit 773 tcp
notify 773 udp
803-809 Unassigned
pkix-3-ca-ra 829 tcp PKIX-3 CA/RA [Carlisle_Adams] [Carlisle_Adams]
pkix-3-ca-ra 829 udp PKIX-3 CA/RA [Carlisle_Adams] [Carlisle_Adams]
netconf-ssh 830 tcp NETCONF over SSH [RFC6242]
netconf-ssh 830 udp NETCONF over SSH [RFC6242]
netconf-beep 831 tcp NETCONF over BEEP [RFC4744]
netconf-beep 831 udp NETCONF over BEEP [RFC4744]
netconfsoaphttp 832 tcp NETCONF for SOAP over HTTPS [RFC4743]
netconfsoaphttp 832 udp NETCONF for SOAP over HTTPS [RFC4743]
netconfsoapbeep 833 tcp NETCONF for SOAP over BEEP [RFC4743]
netconfsoapbeep 833 udp NETCONF for SOAP over BEEP [RFC4743]
834-846 Unassigned
gdoi 848 tcp GDOI [RFC3547]
gdoi 848 udp GDOI [RFC3547]
domain-s 853 tcp DNS query-response protocol run over TLS [IESG] [IETF_Chair] 2015-10-08 2022-04-11 [RFC7858]
domain-s 853 udp DNS query-response protocol run over DTLS or QUIC [IESG] [IETF_Chair] 2015-10-08 2022-04-01 [RFC7858][RFC8094][RFC9250]
iscsi 860 tcp iSCSI [IESG] [IETF_Chair] 2013-08-27 [RFC7143]
iscsi 860 udp iSCSI [IESG] [IETF_Chair] 2013-08-27 [RFC7143]
twamp-control 862 tcp TWAMP-Control [IESG] [IETF_Chair] [RFC5357]
863-872 Unassigned
rsync 873 tcp rsync [Andrew_Tridgell] [Andrew_Tridgell]
rsync 873 udp rsync [Andrew_Tridgell] [Andrew_Tridgell]
ideafarm-panic 903 tcp self documenting Telnet Panic Door [Wo_o_Ideafarm] [Wo_o_Ideafarm]
ideafarm-panic 903 udp self documenting Panic Door: send 0x00 for info [Wo_o_Ideafarm] [Wo_o_Ideafarm]
kink 910 tcp Kerberized Internet Negotiation of Keys (KINK) [RFC4430]
kink 910 udp Kerberized Internet Negotiation of Keys (KINK) [RFC4430]
apex-edge 913 tcp APEX endpoint-relay service [RFC3340]
apex-edge 913 udp APEX endpoint-relay service [RFC3340]
rndc 953 tcp BIND9 remote name daemon controller [Internet_Systems_Consortium_Inc] [Ray_Bellis] 2017-06-08
953 udp Reserved
imaps 993 tcp IMAP over TLS protocol [IESG] [IETF_Chair] 2021-02-22 [RFC3501][RFC8314][RFC9051]
993 udp Reserved 2021-02-22 [RFC9051]
pop3s 995 tcp POP3 over TLS protocol [IESG] [IETF_Chair] 2017-12-12 [RFC8314]
pop3s 995 udp pop3 protocol over TLS/SSL (was spop3) [Gordon_Mangione] [Gordon_Mangione]
webpush 1001 tcp HTTP Web Push [IESG] [IETF_Chair] 2016-11-01 [RFC8030]
exp1 1021 tcp RFC3692-style Experiment 1 [IESG] [IETF_Chair] [1][RFC4727][RFC6335]
exp1 1021 udp RFC3692-style Experiment 1 [IESG] [IETF_Chair] [1][RFC4727][RFC6335]
exp1 1021 sctp RFC3692-style Experiment 1 [IESG] [IETF_Chair] [1][RFC4727][RFC6335]
exp1 1021 dccp RFC3692-style Experiment 1 [IESG] [IETF_Chair] [1][RFC4727][RFC6335]
exp2 1022 tcp RFC3692-style Experiment 2 [IESG] [IETF_Chair] [1][RFC4727][RFC6335]
exp2 1022 udp RFC3692-style Experiment 2 [IESG] [IETF_Chair] [1][RFC4727][RFC6335]
exp2 1022 sctp RFC3692-style Experiment 2 [IESG] [IETF_Chair] [1][RFC4727][RFC6335]
exp2 1022 dccp RFC3692-style Experiment 2 [IESG] [IETF_Chair] [1][RFC4727][RFC6335]
1023 tcp Reserved [IANA] [IANA]
1023 udp Reserved [IANA] [IANA]
1030 Reserved 2013-05-24 This entry is being removed on 2013-05-24.
1031 Reserved 2013-05-24 This entry is being removed on 2013-05-24.
1032 Reserved 2013-05-24 This entry is being removed on 2013-05-24.
netinfo-local 1033 tcp local netinfo port [Marc_Majka] [Marc_Majka] 2002-08
netinfo-local 1033 udp local netinfo port [Marc_Majka] [Marc_Majka] 2002-08
activesync 1034 tcp ActiveSync Notifications [Sandra_Vargas] [Sandra_Vargas] 2003-03
activesync 1034 udp ActiveSync Notifications [Sandra_Vargas] [Sandra_Vargas] 2003-03
mxxrlogin 1035 tcp MX-XR RPC [Valassis] [John_Eckert] 2003-04 2015-05-05
mxxrlogin 1035 udp MX-XR RPC [Valassis] [John_Eckert] 2003-04 2015-05-05
nsstp 1036 tcp Nebula Secure Segment Transfer Protocol [Steve_Ravida] [Steve_Ravida]
nsstp 1036 udp Nebula Secure Segment Transfer Protocol [Steve_Ravida] [Steve_Ravida]
ams 1037 tcp AMS [Ronald_R_Ohmer] [Ronald_R_Ohmer] 2004-02
ams 1037 udp AMS [Ronald_R_Ohmer] [Ronald_R_Ohmer] 2004-02
mtqp 1038 tcp Message Tracking Query Protocol [RFC3887]
mtqp 1038 udp Message Tracking Query Protocol [RFC3887]
sbl 1039 tcp Streamlined Blackhole [Jonathan_A_Zdziaras] [Jonathan_A_Zdziaras] 2004-11
sbl 1039 udp Streamlined Blackhole [Jonathan_A_Zdziaras] [Jonathan_A_Zdziaras] 2004-11
boinc-client 1043 tcp BOINC Client Control [David_Anderson] [David_Anderson] 2004-11
boinc-client 1043 udp BOINC Client Control [David_Anderson] [David_Anderson] 2004-11
remote-as 1053 tcp Remote Assistant (RA) [Roman_Kriis] [Roman_Kriis] Unauthorized Use Known on port 1053
remote-as 1053 udp Remote Assistant (RA) [Roman_Kriis] [Roman_Kriis]
kyoceranetdev 1063 tcp KyoceraNetDev [Shigenaka_Kanemitsu] [Shigenaka_Kanemitsu]
kyoceranetdev 1063 udp KyoceraNetDev [Shigenaka_Kanemitsu] [Shigenaka_Kanemitsu]
bridgecontrol 1073 tcp Bridge Control [Andy_Heron] [Andy_Heron]
bridgecontrol 1073 udp Bridge Control [Andy_Heron] [Andy_Heron]
ansoft-lm-1 1083 tcp Anasoft License Manager
ansoft-lm-1 1083 udp Anasoft License Manager
proofd 1093 tcp PROOFD
proofd 1093 udp PROOFD

Contact Information

ID Name Organization Contact URI Last Updated
[Andrew_Tridgell] Andrew Tridgell mailto:tridge&samba.anu.edu.au
[Andy_Heron] Andy Heron mailto:btexact.ports&bt.com
[Carlisle_Adams] Carlisle Adams mailto:Cadams&entrust.com
[David_Anderson] David Anderson mailto:davea&ssl.berkeley.edu 2004-11
[Gordon_Mangione] Gordon Mangione mailto:gordm&microsoft.com
[IANA] IANA mailto:iana&iana.org
[IESG] IESG mailto:iesg&ietf.org
[IETF_Chair] IETF Chair IETF mailto:chair&ietf.org
[Internet_Systems_Consortium_Inc] Internet Systems Consortium, Inc. mailto:info&isc.org 2017-06-08
[John_Eckert] John Eckert Valassis mailto:eckertj&valassis.com 2015-05-05
[Jonathan_A_Zdziaras] Jonathan A. Zdziaraski mailto:jonathan&nuclearelephant.com 2004-11
[Marc_Majka] Marc Majka mailto:majka&apple.com 2002-08
[Philippe_Binet] Philippe Binet mailto:phbinet&vnet.ibm.com
[Ray_Bellis] Ray Bellis mailto:ray&isc.org 2017-06-08
[Roman_Kriis] Roman Kriis mailto:roman&previo.ee
[Ronald_R_Ohmer] Ronald R. Ohmer mailto:rohmer&aisconsulting.net 2004-02
[Ronny_Bremer] Ronny Bremer mailto:rbremer&almanid.com
[Sandra_Vargas] Sandra Vargas mailto:Sandrama&microsoft.com 2003-03
[Shigenaka_Kanemitsu] Shigenaka Kanemitsu mailto:Shigenaka_Kanemitsu&ypd.kyocera.co.jp
[Steve_Ravida] Steve Ravida mailto:steve.ravida&nebulaholdings.com
[Valassis] Valassis mailto:eckertj&valassis.com 2015-05-05
[Wo_o_Ideafarm] Wo'o Ideafarm mailto:b85f3c23.9ad6f42c&ideafarm.com