Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
188.212.135.54 Performing a basic port scan - 10sec 301 B PL
109.195.202.231 Performing a basic port scan 2 29sec 323 B RU
google.com Performing a basic port scan 2 3sec 440 B US
google.com Performing a basic port scan 2 2sec 476 B US
72.14.201.131 Performing a basic port scan - 39sec 390 B SG
37.120.234.196 Performing a basic port scan - 33sec 338 B AU
68.15.83.234 Performing a basic port scan 1 6sec 311 B US
www.instagram.com Performing a basic port scan 2 2sec 469 B SE
178.64.18.245 Performing a basic port scan - 8sec 298 B RU
50.114.4.222 Performing a basic port scan 1 6sec 273 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

Cybersecurity researchers have warned of malicious images pushed to the official ...

Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens

Cybersecurity researchers have flagged a fresh set of packages that have been compromised by ...

Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

The threat actor known as Harvester has been attributed to a new Linux version of its GoGra ...

After Bluesky, Mastodon Targeted in DDoS Attack

The DDoS attack caused a major outage, but Mastodon mitigated it within a few hours. The post ...

Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says

British businesses need to prepare themselves to defend against cyberattacks because the U.K. ...

Saudi Arabia’s Cybersecurity Startups Guard the Region’s Digital Shift

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. ...

New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention 

Dubbed Lotus Wiper, the malware targets recovery mechanisms, overwrites drives, and ...

World-first NCSC-engineered device secures vulnerable display links

SilentGlass, a plug-and-play device, actively blocks any unexpected or malicious HDMI and ...