Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
183.82.33.56 Performing a basic port scan - 26sec 348 B
www.hniu.cn Performing a basic port scan 26 7sec 1042 B CN
138.199.50.137 Performing a basic port scan - 8sec 352 B US
108.162.217.107 Performing a basic port scan - 7sec 302 B US
rightleaders.com Normal Scan 3 14sec 343 B US
riggerspumps.com Normal Scan 2 6sec 458 B NL
voyep.cn Performing a basic port scan 4 2sec 473 B US
rightfx.com Normal Scan 3 5sec 321 B DE
www2.bb.com.br Performing a basic port scan 4 2sec 432 B
104.21.79.104 Performing a basic port scan 4 3sec 351 B

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

Cybersecurity researchers have disclosed details of a new malicious package on the npm ...

Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator

Shannon Miller shares her approach to creating domestic safety and a call to the cyber ...

54 Charged in US Over ATM Attacks Involving ‘Ploutus’ Malware

The suspects are leaders and members of the Venezuelan crime syndicate Tren de Aragua. The ...

A Page From Australia’s Cybersecurity Playbook: Pentesting Our Kids

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Dec. ...

MacSync macOS Malware Distributed via Signed Swift Application

A recent MacSync Stealer version no longer requires users to directly interact with the ...

Gambit Cyber Raises $3.4 Million in Seed Funding

The cybersecurity startup will use the funds to accelerate platform improvements, global ...

⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider ...

Cyber threats last week showed how attackers no longer need big hacks to cause big damage. ...

How to Browse the Web More Sustainably With a Green Browser

As the internet becomes an essential part of daily life, its environmental footprint continues ...