Port 2375 (TCP) is the standard for Docker daemon (unsecured). Port 2375 — Docker daemon REST API without TLS. 2376 — with TLS. Exposed 2375 on the public internet = instant full host compromise: attacker spins up a privileged container, m
Below: what uses this port, security considerations, online check, FAQ.
Docker daemon (unsecured)
Port 2375 — Docker daemon REST API without TLS. 2376 — with TLS. Exposed 2375 on the public internet = instant full host compromise: attacker spins up a privileged container, mounts / and owns root on the host. Shodan finds thousands of such servers.
CRITICAL: never expose 2375 publicly. Known crypto-mining botnets scan 2375 24/7. Use 2376 + TLS + client cert auth, or Unix socket /var/run/docker.sock locally.
Enterno.io Ping + Port checker tests TCP reachability of any port from 3 regions (Moscow / Frankfurt / Virginia).
Ping sends ICMP packets to a host and measures response time. Port scanning checks which TCP ports are open and accepting connections — helping diagnose serviceavailability issues.
Choose packet count (3, 4, 6, 10). Stats: min/avg/max latency and packet loss.
Check 14 key ports: HTTP, HTTPS, SSH, FTP, SMTP, MySQL, PostgreSQL, and more.
Testing from our server — see site availability from outside, not just your local network.
Need constant monitoring? Create a monitor — checks every minute with notifications.
availability diagnosis
TCP port scanning
connection debugging
basic health check
Ping check history, host availability monitoring and downtime alerts.
Sign up freeNo, modern cloud providers (AWS, Google Cloud, Yandex) close all incoming ports by default. You must explicitly allow port 2375 in a Security Group or firewall.
Use <a href="/en/ping">Enterno Ping + Port Checker</a>. Or in shell: <code>nc -vz example.com 2375</code>.
Depends on the service. Docker daemon (unsecured) should never be exposed publicly without authentication + TLS. See <a href="/en/s/research-open-ports-exposure-2026">our 2026 exposure research</a>.