Port 8883 carries MQTT traffic over TLS. Every time a smart device sends data securely, every time an industrial sensor reports home through an encrypted channel, every time your connected car whispers its location to the cloud without anyone listening in, that conversation flows through port 8883.
This is the port that keeps the Internet of Things private.
What Port 8883 Does
Port 8883 is the secure sibling of port 1883. While port 1883 carries raw MQTT traffic in plaintext, port 8883 wraps every byte in Transport Layer Security (TLS) before it leaves the device. Same protocol, same lightweight publish-subscribe architecture, but now encrypted end-to-end.1
MQTT stands for Message Queuing Telemetry Transport. It is a lightweight, publish-subscribe messaging protocol designed for constrained devices and unreliable networks.2 Think sensors in remote locations, battery-powered gadgets, devices that need to send small amounts of data efficiently. MQTT does this beautifully, with a minimal control message as small as two bytes.3
But MQTT by itself sends everything in cleartext. Your username, your password, your sensor readings, all readable by anyone on the network. Port 8883 exists to fix that. Before any MQTT message is exchanged, client and server perform a TLS handshake, establish encryption keys, and from that moment forward, the conversation is private.4
How MQTT Works
MQTT operates on a publish-subscribe model with a central broker. Devices do not talk directly to each other. Instead, they connect to a broker and either publish messages to topics or subscribe to receive messages from topics.5
Think of the broker as a post office. When a device publishes a message to the topic home/livingroom/temperature, it sends the message to the broker. The broker then delivers copies to every device subscribed to that topic. Publishers and subscribers never need to know about each other. They just need to agree on topic names.
This decoupling is what makes MQTT so powerful for IoT. A temperature sensor does not need to know that three different applications care about its readings. It just publishes. The broker handles the rest.
MQTT also provides three Quality of Service (QoS) levels:6
- QoS 0 ("At most once"): Fire and forget. The message is sent once with no confirmation. Fast but unreliable.
- QoS 1 ("At least once"): The broker acknowledges receipt. If no acknowledgment arrives, the message is resent. Reliable but may produce duplicates.
- QoS 2 ("Exactly once"): A four-way handshake guarantees the message arrives exactly once. Reliable and precise, but slower.
This flexibility lets developers match their reliability needs to their bandwidth constraints. A smart thermostat might use QoS 1 for temperature readings (duplicates are fine) but QoS 2 for commands that turn on the heater (you do not want that command executed twice).
The Story of MQTT
In 1999, Dr. Andy Stanford-Clark of IBM and Arlen Nipper of Arcom (later Eurotech) faced a problem: how do you monitor oil pipelines in remote locations using satellite links that cost a fortune per byte?7
SCADA systems (Supervisory Control and Data Acquisition) needed to collect telemetry data from sensors scattered across pipelines, but the satellite connections were bandwidth-limited and expensive. Every byte counted. Battery life mattered. The devices were constrained in ways modern engineers rarely encounter.
Stanford-Clark and Nipper designed MQTT to be as efficient as possible. Small packet headers. Minimal overhead. A protocol that could run on tiny devices with limited memory and squeeze through narrow bandwidth pipes without wasting a single bit.8
They called it "MQ Telemetry Transport," with the MQ referencing IBM's MQSeries message queuing products. The protocol worked. Oil pipelines stayed monitored. But MQTT remained proprietary for over a decade.
In 2010, the protocol was released royalty-free. In 2011, IBM contributed MQTT client implementations to the Eclipse Foundation's Paho project.9 In 2013, IBM submitted MQTT v3.1 to OASIS for standardization. On October 29, 2014, OASIS released MQTT v3.1.1 as an open standard.10 In 2019, MQTT v5.0 added significant new features.
Today, MQTT is an OASIS standard and an ISO recommendation (ISO/IEC 20922).11
Why Port 8883 Matters
When MQTT was designed for oil pipelines in 1999, security was an afterthought. The networks were private. The satellite links were not on the public Internet. Encryption added overhead that constrained devices could not afford.
The world changed. MQTT became the protocol for the Internet of Things, and suddenly these lightweight messages were traveling over public networks. Port 1883 (unencrypted MQTT) became a liability. Researchers found over 49,000 MQTT servers publicly visible on the Internet due to misconfiguration, with approximately 32,000 of them having no password protection.12
Attackers can use Shodan to find exposed MQTT brokers, eavesdrop on messages, inject malicious data, or send unauthorized commands to connected devices. Without encryption, usernames and passwords fly across the network in plaintext.13
Port 8883 solves this. Registered with IANA specifically for "Secure MQTT," it mandates TLS encryption before any MQTT traffic flows.14 The broker presents a certificate. The client verifies it. They negotiate encryption. Only then does the publish-subscribe dance begin.
Azure IoT Hub takes this seriously: it does not support insecure MQTT connections over port 1883 at all. All device communication must use TLS.15
The Scale of What Port 8883 Carries
By the end of 2025, an estimated 21.1 billion IoT devices will be connected globally, a 14% increase from 2024.16 These are not just novelty gadgets. These are:
Connected Cars: Over 20 million vehicles access EMQX MQTT services worldwide. BMW, Audi, Geely, and Rimac all use MQTT to connect their vehicles to the cloud.17 Your car reports its location, speed, diagnostic data, and receives over-the-air updates, all through MQTT.
Smart Homes: Smart home devices account for 32% of all consumer IoT usage globally. The average US household now uses 21 IoT-connected devices.18 Your thermostat, doorbell, lights, and locks all speak MQTT.
Industrial Systems: The descendants of those 1999 oil pipeline sensors. Factories, power grids, water treatment plants, all using MQTT to collect telemetry and issue commands.
Messaging Apps: Facebook Messenger adopted MQTT in 2011 because it was designed for exactly the constraints mobile phones face, limited bandwidth and limited battery. The protocol that monitored oil pipelines via satellite now delivers billions of chat messages.19
Every major cloud provider supports MQTT: AWS IoT Core, Azure IoT Hub, and Google Cloud Platform all speak the protocol.20 When they speak it securely, they speak it on port 8883.
Security Considerations
Port 8883 with TLS is dramatically more secure than port 1883 without it, but MQTT itself still requires careful configuration:
Authentication: MQTT supports username and password authentication, but these should be combined with TLS, not used instead of it. Client certificates provide stronger authentication.21
Authorization: Just because a client can connect does not mean it should access every topic. Access Control Lists (ACLs) restrict which clients can publish or subscribe to which topics.
Known Vulnerabilities: MQTT implementations have had their share of CVEs. Buffer overflows (CVE-2020-11976), subscription revocation issues (CVE-2021-34434), and memory access vulnerabilities (CVE-2018-8531) have all been discovered and patched.22 Keep your broker software updated.
The Cost of Encryption: TLS is not free. It adds CPU overhead and network latency. For extremely constrained devices, this overhead can be significant, increasing energy consumption by up to 4x compared to unencrypted communication.23 But for any device connecting over a public network, the security is worth the cost.
Never expose port 1883 to the Internet. If you need MQTT over public networks, use port 8883. Period.
Related Ports
| Port | Protocol | Description |
|---|---|---|
| 1883 | MQTT | Unencrypted MQTT traffic. Use only on isolated, trusted networks. |
| 8883 | MQTT over TLS | Encrypted MQTT. The secure default for any Internet-facing deployment. |
| 443 | HTTPS | Some MQTT deployments tunnel through port 443 to traverse firewalls that block non-standard ports. |
| 8080/8081 | MQTT over WebSockets | MQTT carried over WebSocket connections, useful for browser-based clients. |
Frequently Asked Questions
Was this page helpful?