Network Port Scanning
Maintain safety and performance using port scanning
Automate device tracking and switch port management
Device tracking and switch port management can help you maintain safety and network performance. SolarWinds® User Device Tracker (UDT) is built to automatically discover, map, and monitor switches, ports, and network devices.
With UDT network port scanning, you can quickly find devices and retrieve key details like username, port details, and connection history. You can also more effectively track endpoints with the ability to search by IP address, username, hostname, or MAC address.
For even more control, SolarWinds UDT is built to help you more easily whitelist endpoints approved to access your network and create watch lists of devices or users you want to monitor further. When a device that is not on your whitelist or a device or user on your watch connects to the network, you can receive an automatic alert. Additionally, UDT provides click-of-a-button port shutdown, which can help you remotely shut down a potentially compromised port while you can investigate further.
Analyze and monitor port usage and network capacity
With SolarWinds User Device Tracker, not only can you analyze port usage and capacity on your network, but you can also monitor your network’s users, devices, and ports. UDT makes it easier to find exactly where users and devices are connected in your network with regular polling of switches and routers for data to better inform you about connections.
UDT is built to automatically store current and historical information about where and when a user has connected to your network, so you can track a user’s connection trail through your organization. When it comes to capacity analysis and monitoring, UDT can provide built-in reporting to help you better understand switch port usage data and analyze capacity, including how many ports are used on switches currently and over time, so you can clearly understand just how the ports on your switches are being used.
Monitor, manage, and map switch ports more easily
Network port scanning through SolarWinds UDT is designed to help you control your network’s connectivity landscape with detailed precision. For instance, you can find the current location of a user. You can also locate network ports that aren’t in use and view individual ports per switch to see which ports are vacant.
For quick troubleshooting and easy breach mitigation, UDT lets you rapidly and effectively respond to events and possible security threats, namely by giving you visibility over what MAC addresses and hostnames connect to your network. For suspicious activity, UDT provides a connection trail, detailing where a specific user has been on the network as well as their last known location before disconnecting.
UDT also reduces latency issues and other IT roadblocks by discovering switches operating at or near full capacity, so that you can prevent those switches from overloading and slowing your business down.
Easily find and import network users and devices
Finding and importing existing network users and devices is an important capability for network port scanning software and can help you get started understanding port usage and capacity faster.
SolarWinds User Device Tracker takes a two-step approach to discovering and adding network devices by first adding network devices to monitor and then adding the ports to monitor on those devices.
Adding devices is simple thanks to the built-in Network Sonar Discovery Wizard. The Network Sonar Discovery Wizard is designed to recognize network devices already in your SolarWinds Platform database and prevents you from importing duplicate devices. Once your devices are discovered, you can use the DISCOVER MY PORTS option in Discovery Central to discover and add ports to UDT.
Track status for a group of ports and find users’ wireless connections
SolarWinds UDT goes beyond typical port scanning. With UDT, you can easily pinpoint what ports specific devices are using. You can also configure UDT to show you the collective usage percentage of all ports in your network for quick and easy capacity and operational checks.
Endpoint-to-endpoint security is key to protecting any sprawling network. UDT’s advanced port scanner helps admins pull up a running log of users’ connection histories by searching for their names. In addition, UDT offers a clear map of all the wireless devices linked to your network for an accurate picture of who and what is interacting with your communication system at any given moment, using operating systems such as Linux, Microsoft Windows, and Mac iOS for desktop and mobile devices.
Get More on Network Port Scanning
Do you find yourself asking…
Network port scanning involves sweeping insight into who and what is connected to your network and through which port. Not participating in this vital cybersecurity feature can easily leave your entire organization vulnerable and susceptible to breach. Leaving ports unmonitored is akin to leaving your front door unlocked and open for any passersby to enter through—you won’t know who stops by and what they do during their visit.
A network port scanner helps identify lists of active hosts and where they’re exchanging information. It can also help organizations locate where firewalls and other security foundations are placed and where they’re lacking to minimize unauthorized access. In port scanning, either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) is used. TCP is often more secure than UDP because it does not proceed until the status of a final communication destination is confirmed. This allows data to arrive where it’s supposed to arrive accurately. On the other hand, UDP disregards destination status and sends a packet of data to any port—even to dead ends.
Port scanning gives administrators information about what services and applications are running, network services fortified with authentication features, what users and devices are connected, and general traffic volumes for each port. Overall, a network port scanner is a lighthouse shining visibility onto its endpoints to watch activity and prohibit entry to rogue actors.
The most common ports are:
- 21 - File Transfer Protocol (FTP)
- 22 - Secure Shell (SSH)
- 23 - Telnet Protocol - Unencrypted Text Communications
- 25 - Simple Mail Transfer Protocol (SMTP)
- 43 - WHOIS Protocol
- 53 - Domain Name System (DNS)
- 67 - Bootstrap Protocol (BOOTP) Server; also used by Dynamic Host Configuration Protocol (DHCP)
- 68 - Bootstrap Protocol (BOOTP) Server; also used by Dynamic Host Configuration Protocol (DHCP)
- 69 - Trivial File Transfer Protocol (TFTP)
- 80 - Hypertext Transfer Protocol (HTTP)
- 110 - Post Office Protocol v3 (POP3)
- 123 - Network Time Protocol (NTP)
- 137 - NetBIOS Name Service
- 138 - NetBIOS Datagram Service
- 139 - NetBIOS Session Service
- 143 - Internet Message Access Protocol (IMAP)
- 161 - Simple Network Management Protocol (SNMP)
- 162 - Simple Network Management Protocol Trap (SNMPTRAP)
- 213 - Internetwork Packet Exchange (IPX)
- 389 - Lightweight Directory Access Protocol (LDAP)
- 443 - Hypertext Transfer Protocol over TLS/SSL (HTTPS)
- 445 - Microsoft-DS (Directory Services) Active Directory
- 502 - Modbus Protocol
- 587 - Simple Mail Transfer Protocol (SMTP)
- 636 - Lightweight Directory Access Protocol over TLS/SSL (LDAPS)
- 989 - FTPS Protocol (data), FTP over TLS/SSL
- 990 - FTPS Protocol (control), FTP over TLS/SSL
- 993 - Internet Message Access Protocol over TLS/SSL (IMAPS)
- 995 - Post Office Protocol 3 over TLS/SSL (POP3S)
- 1720 - H.323 call signaling
- 2082 - CPanel Default
- 2083 - CPanel Default SSL
- 2086 - WebHost Manager Default
- 2087 - WebHost Manager Default SSL
- 2095 - CPanel Default Web Mail
- 2096 - CPanel Default SSL Web Mail
- 2525 - Simple Mail Transfer Protocol (SMTP) Alternate
- 3306 - MySQL Database System
- 3389 - Microsoft Terminal Server (RDP)
Network port scanning involves sweeping insight into who and what is connected to your network and through which port. Not participating in this vital cybersecurity feature can easily leave your entire organization vulnerable and susceptible to breach. Leaving ports unmonitored is akin to leaving your front door unlocked and open for any passersby to enter through—you won’t know who stops by and what they do during their visit.
A network port scanner helps identify lists of active hosts and where they’re exchanging information. It can also help organizations locate where firewalls and other security foundations are placed and where they’re lacking to minimize unauthorized access. In port scanning, either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) is used. TCP is often more secure than UDP because it does not proceed until the status of a final communication destination is confirmed. This allows data to arrive where it’s supposed to arrive accurately. On the other hand, UDP disregards destination status and sends a packet of data to any port—even to dead ends.
Port scanning gives administrators information about what services and applications are running, network services fortified with authentication features, what users and devices are connected, and general traffic volumes for each port. Overall, a network port scanner is a lighthouse shining visibility onto its endpoints to watch activity and prohibit entry to rogue actors.
The most common ports are:
- 21 - File Transfer Protocol (FTP)
- 22 - Secure Shell (SSH)
- 23 - Telnet Protocol - Unencrypted Text Communications
- 25 - Simple Mail Transfer Protocol (SMTP)
- 43 - WHOIS Protocol
- 53 - Domain Name System (DNS)
- 67 - Bootstrap Protocol (BOOTP) Server; also used by Dynamic Host Configuration Protocol (DHCP)
- 68 - Bootstrap Protocol (BOOTP) Server; also used by Dynamic Host Configuration Protocol (DHCP)
- 69 - Trivial File Transfer Protocol (TFTP)
- 80 - Hypertext Transfer Protocol (HTTP)
- 110 - Post Office Protocol v3 (POP3)
- 123 - Network Time Protocol (NTP)
- 137 - NetBIOS Name Service
- 138 - NetBIOS Datagram Service
- 139 - NetBIOS Session Service
- 143 - Internet Message Access Protocol (IMAP)
- 161 - Simple Network Management Protocol (SNMP)
- 162 - Simple Network Management Protocol Trap (SNMPTRAP)
- 213 - Internetwork Packet Exchange (IPX)
- 389 - Lightweight Directory Access Protocol (LDAP)
- 443 - Hypertext Transfer Protocol over TLS/SSL (HTTPS)
- 445 - Microsoft-DS (Directory Services) Active Directory
- 502 - Modbus Protocol
- 587 - Simple Mail Transfer Protocol (SMTP)
- 636 - Lightweight Directory Access Protocol over TLS/SSL (LDAPS)
- 989 - FTPS Protocol (data), FTP over TLS/SSL
- 990 - FTPS Protocol (control), FTP over TLS/SSL
- 993 - Internet Message Access Protocol over TLS/SSL (IMAPS)
- 995 - Post Office Protocol 3 over TLS/SSL (POP3S)
- 1720 - H.323 call signaling
- 2082 - CPanel Default
- 2083 - CPanel Default SSL
- 2086 - WebHost Manager Default
- 2087 - WebHost Manager Default SSL
- 2095 - CPanel Default Web Mail
- 2096 - CPanel Default SSL Web Mail
- 2525 - Simple Mail Transfer Protocol (SMTP) Alternate
- 3306 - MySQL Database System
- 3389 - Microsoft Terminal Server (RDP)
Stay on top of ports and devices with network port scanning
User Device Tracker
Track endpoint devices by IP or MAC address, username, or hostname
Monitor wireless access points and switches for performance and errors
Know how switches and ports are being used, and which switches are nearing capacity
Starts at
