# Pastebin c8JLbKCW https://rabexc.org/posts/docker-networking Even when using "userspace-proxy": false, with netstat -ntlp you can see dockerd listening on the ports you pass with -p. This was extremely confusing to me, but after a bit of research, it turns out it does so only to allocate the port, so host applications will not be able to listen on it - which is a good idea, given that iptables is configured to modify that traffic and get it delivered to the container instead.