For security reasons, some network ports and IP addresses are blocked. These measures help prevent unauthorized access, protect services from attacks, and reduce the risk of malicious traffic spreading. Below is a list of blocked ports and their purpose.
Blocked Ports
| Port | Protocol | Direction | Description |
| 137 | TCP/UDP | Ingress | NetBIOS Name Service (NBNS), used for naming in Windows networks. |
| 138 | UDP | Ingress | NetBIOS Datagram Service (NBDS), datagram transmission. |
| 139 | TCP | Ingress | NetBIOS Session Service (NBSS), provides session connections. |
| 445 | TCP | Ingress | SMB (Server Message Block) over TCP/IP, file and printer sharing. |
| 1688 | TCP | Ingress | Microsoft Key Management Service (KMS), product activation. |
| 25 | TCP | Egress | SMTP, email sending (unblocked on request). |
| 23 | TCP | Ingress | Telnet, outdated insecure remote access protocol. |
| 1900 | UDP | Ingress | Simple Service Discovery Protocol (SSDP), part of UPnP. |
| 3702 | TCP/UDP | Ingress | Web Services Dynamic Discovery (WS-Discovery), web services discovery. |
| 11211 | UDP | Ingress | Memcached, distributed data caching. |
| 17 | TCP/UDP | Ingress | Quote of the Day (QOTD), outdated string message protocol. |
| 19 | TCP/UDP | Ingress | Character Generator Protocol (CHARGEN), outdated service often used by attackers in DDoS. |
| 53413 | UDP | Ingress | Remote Code Execution (RCE) vulnerability on Netcore/Netis routers via UDP port 53413 (backdoor). |
We also block so-called bogons — IP addresses from private or reserved ranges (including ranges defined in RFC 1918) that should not be used on the internet. This helps prevent internal addresses from leaking into public Internet traffic and protects against IP spoofing attacks.
Blocked RFC 1918 address ranges:
- 10.0.0.0/8: from 10.0.0.0 to 10.255.255.255;
- 172.16.0.0/12: from 172.16.0.0 to 172.31.255.255;
- 192.168.0.0/16: from 192.168.0.0 to 192.168.255.255.