Check which ports are open and accessible on your network. Open ports can be gateways for attackers if left unmonitored. Before scanning, make sure you have updated your router firmware and changed the default admin password. This scanner checks common service ports against your public IP to identify potential security exposures.

Port scanning is the process of probing a server or host for open TCP and UDP ports. Network administrators use port scanning to audit their own networks, verify firewall rules, and identify services that should not be publicly accessible. Every network service (web servers, email, databases, remote desktop) listens on a specific port number, and each open port represents a potential entry point for attackers.
Understanding which ports are open on your network is a fundamental step in securing your home WiFi network. If you have configured port forwarding on your router, those ports become accessible from the internet and should be monitored regularly with tools like this scanner and our Port Checker reference.
| Port | Service | Risk Level | Why It Matters |
|---|---|---|---|
| 22 | SSH | Medium | Remote access; brute-force target if exposed |
| 23 | Telnet | Critical | Unencrypted remote access; never expose publicly |
| 80/443 | HTTP/HTTPS | Low | Web servers; expected to be open on web hosts |
| 135/445 | MSRPC/SMB | Critical | Windows file sharing; major ransomware vector |
| 3306 | MySQL | High | Database server; should never face the internet |
| 3389 | RDP | High | Remote Desktop; frequent brute-force target |
| 5900 | VNC | High | Remote desktop; often poorly secured |
| 6379 | Redis | Critical | In-memory database; no authentication by default |
When scanning a port, there are three possible states that tell you different things about the target's security posture:
If the scan reveals open ports you did not expect, take these steps to secure your network. First, identify which service is using the port. Then decide whether that service needs to be publicly accessible. If not, block it at your router's firewall or disable the service entirely.
On most home routers, you can manage open ports through the router admin panel. Check your port forwarding rules and remove any that are no longer needed. If you use UPnP, be aware that applications can automatically open ports without your knowledge. Consider disabling UPnP and manually configuring only the ports you actually need.
# Check listening ports on Linux
sudo ss -tulnp
# Check listening ports on Windows (PowerShell)
Get-NetTCPConnection -State Listen | Format-Table LocalPort, OwningProcess
# Block a port with iptables
sudo iptables -A INPUT -p tcp --dport 3306 -j DROP
For more advanced scanning, Nmap is the gold standard. It can detect operating systems, service versions, and run vulnerability scripts against discovered services.
# Quick scan of common ports
nmap -F 192.168.1.1
# Scan specific ports
nmap -p 22,80,443,3389 192.168.1.1
# Scan all 65535 ports (slow but thorough)
nmap -p- 192.168.1.1
# Service version detection
nmap -sV -p 22,80,443 192.168.1.1
Pro Tip: Always scan your network from both inside and outside. Internal scans show what services are running, while external scans (like this tool) show what is actually reachable from the internet. A port that is open internally but filtered externally is properly firewalled. Use our Ping Test to verify basic connectivity before running a port scan.
If you need certain ports open for gaming, remote access, or hosting services, follow these security practices. Limit forwarding rules to specific IP addresses when possible. Use non-standard ports to reduce automated scanning hits (for example, run SSH on port 2222 instead of 22). Always use strong generated passwords for any service exposed to the internet.
For remote desktop access, consider using a VPN instead of exposing RDP directly. You can set up a VPN on your router and then access RDP through the VPN tunnel, keeping port 3389 completely closed to the internet. This is far more secure than relying on RDP's built-in security. Check the Bandwidth Calculator to ensure your connection can handle the VPN overhead.
Key Takeaways
Scanning your own network is legal and recommended as a security practice. Scanning networks you do not own or have authorization to test may violate computer abuse laws depending on your jurisdiction. Always obtain written permission before scanning third-party networks.
Ideally, no ports should be open to the internet on a home network unless you are hosting a specific service. Most home routers block all inbound connections by default through NAT. If you have set up port forwarding, only those specific ports will be accessible.
Remove the port forwarding rule from your router, disable UPnP if it opened the port automatically, or stop the service that is listening on that port. You can also add a firewall rule to explicitly block the port.
TCP scanning checks for services using the connection-oriented TCP protocol. UDP scanning checks for services using the connectionless UDP protocol. UDP scans are slower and less reliable because UDP does not send acknowledgment packets. Most critical services use TCP.
If all ports show as filtered, your firewall (or your ISP) is dropping all incoming connection attempts without responding. This is actually the most secure configuration, as it makes your network invisible to scanners.
Only with explicit written authorization. Unauthorized port scanning is considered a hostile action by most organizations and may violate laws like the Computer Fraud and Abuse Act (US) or Computer Misuse Act (UK). Stick to scanning your own infrastructure.
About Tommy N.
Tommy is the founder of RouterHax and a network engineer with 10+ years of experience in home and enterprise networking. He specializes in router configuration, WiFi optimization, and network security. When not writing guides, he's testing the latest mesh WiFi systems and helping readers troubleshoot their home networks.
![]() |
![]() |
![]() |
![]() |
Promotion for FREE Gifts. Moreover, Free Items here. Disable Ad Blocker to get them all.
Once done, hit any button as below
![]() |
![]() |
![]() |
![]() |