Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
185.139.58.9 Scan All TCP Ports 10 4min 4sec (244sec) 579 B GE
tenzor.by Performing a basic port scan 19 18sec 732 B BY
94.20.154.179 Performing a basic port scan 3 10sec 316 B AZ
flipkart.com Performing a basic port scan 2 6sec 310 B IN
kobibacsi.chickenkiller.com Performing a basic port scan 3 5sec 431 B HU
kpezdmc.org.pk Performing a basic port scan 3 6sec 403 B PK
kpezdmc.org.pk Performing a basic port scan 3 6sec 403 B PK
47.104.129.124 Performing a basic port scan 3 10sec 315 B CN
uber.com Performing a basic port scan 2 2sec 307 B US
rightplan40.com Normal Scan 2 4sec 455 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Attacks are Evolving: 3 Ways to Protect Your Business in 2026

Every year, cybercriminals find new ways to steal money and data from businesses. Breaching a ...

SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips

The U.S. Securities and Exchange Commission (SEC) has filed charges against multiple companies ...

Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition

Apple has been fined €98.6 million ($116 million) by Italy's antitrust authority after ...

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same ...

ServiceNow to Acquire Armis for $7.75 Billion in Cash

Rumors of a possible buyout surfaced earlier this month, with the official announcement coming ...

Penetration Testing In The Boardroom

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Dec. ...

Nissan Confirms Impact From Red Hat Data Breach

The personal information of 21,000 customers was stolen after hackers compromised Red Hat’s ...

Feds Seize Password Database Used in Massive Bank Account Takeover Scheme

The cybercriminals attempted to steal $28 million from compromised bank accounts through ...