Which port is attacked and how to prevent?

What is important is to allow only those ports that are absolutely necessary and to have a well-configured firewall that can withstand larger attacks.