Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
rightkitchenandbath.com Normal Scan 1 4sec 303 B US
2.63.150.66 Performing a basic port scan 100 5sec 2891 B UA
31.57.117.1 Performing a basic port scan 3 6sec 347 B IR
kemerovo-rp.online Performing a basic port scan 16 9sec 808 B RU
151.101.2.15 Performing a basic port scan 2 3sec 297 B US
aliciakathleen.com Performing a basic port scan 2 2sec 458 B US
103.164.238.65 Performing a basic port scan 5 2sec 394 B BD
aliciakathleen.com Performing a basic port scan 2 2sec 458 B US
57.144.180.34 Performing a basic port scan 2 2sec 334 B IE
98.211.102.168 Performing a basic port scan - 8sec 378 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Who’s Who In Domain Security: 10 Companies To Watch In 2026

Resource guide for CISOs and MSSPs – Steve Morgan, Editor-in-Chief Sausalito, Calif. – ...

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, ...

Pro-Iranian Hacking Group Claims Credit for Hack of FBI Director Kash Patel’s Personal ...

The group that it was making available for download emails and other documents from Patel’s ...

In Other News: Palo Alto Recruiter Scam, Anti-Deepfake Chip, Google Sets 2029 Quantum Deadline

Other noteworthy stories that might have slipped under the radar: Heritage Bank data breach, ...

Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks

Cybersecurity researchers have disclosed details of a now-patched bug impacting Open VSX's ...

OpenAI Launches Bug Bounty Program for Abuse and Safety Risks

Through the new program, OpenAI will reward reports covering design or implementation issues ...

Security As A Service: 7 Ways Coworking Spaces Can Upgrade Digital Trust In 2026

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. ...

AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion

Threat actors are using adversary-in-the-middle (AitM) phishing pages to seize control of ...