Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
ya.ru Performing a basic port scan 2 5sec 386 B RU
rightpathbookkeeping.com Normal Scan 4 8sec 376 B US
71.81.45.36 Performing a basic port scan - 8sec 372 B US
71.81.45.36 Performing a basic port scan - 8sec 372 B US
riftrecruitment.com Normal Scan 2 6sec 464 B US
192.9.236.75 Performing a basic port scan - 3sec 297 B US
www.whatismyisp.com Performing a basic port scan 4 2sec 494 B US
213.171.203.229 Performing a basic port scan 4 3sec 381 B GB
rightonbbq.com Normal Scan 2 5sec 453 B US
47.239.214.255 Performing a basic port scan 2 1sec 289 B HK

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale

Threat actors have been observed leveraging malicious dropper apps masquerading as legitimate ...

Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence

Threat hunters have discerned new activity associated with an Iranian threat actor known as ...

U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware

The U.S. Department of Justice (DoJ) this week announced the indictment of 54 individuals in ...

Thailand Conference Launches International Initiative to Fight Online Scams

Similar pledges to fight scam networks were made by members of the Association of Southeast ...

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

A suspected Russia-aligned group has been attributed to a phishing campaign that employs ...

In Other News: Docker AI Attack, Google Sues Chinese Cybercriminals, Coupang Hacked by Employee

Other noteworthy stories that might have slipped under the radar: Trump could use private ...

Palo Alto Networks, Google Cloud Strike Multibillion-Dollar AI and Cloud Security Deal

The agreement strengthens technical and commercial ties as Palo Alto migrates workloads and ...

Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware

Cybersecurity researchers have disclosed details of a new campaign that has used cracked ...