Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
its52.com Performing a basic port scan 4 5sec 359 B IE
91.51.32.2 Performing a basic port scan 1 11sec 349 B DE
82.51.2.2 Performing a basic port scan - 17sec 372 B IT
14.5.2.2 Performing a basic port scan - 16sec 288 B KR
51.12.51.32 Performing a basic port scan - 18sec 294 B SE
82.51.2.2 Performing a basic port scan - 17sec 372 B IT
51.21.5.2 Performing a basic port scan 2 5sec 343 B FR
51.12.51.32 Performing a basic port scan - 18sec 294 B SE
1.1.1.1 Performing a basic port scan 5 1sec 386 B
1.1.1.1 Performing a basic port scan 5 2sec 385 B

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE

Multiple security vulnerabilities have been disclosed in the open-source private branch ...

Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery

Google has also mentioned seeing React2Shell attacks conducted by Iranian threat actors. The ...

Mastercard’s Deputy Chief Security Officer Alissa (Dr Jay) Abdullah, PhD on AI & ...

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Dec. ...

⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More

If you use a smartphone, browse the web, or unzip files on your computer, you are in the ...

A Browser Extension Risk Guide After the ShadyPanda Campaign

In early December 2025, security researchers exposed a cybercrime campaign that had quietly ...

Soverli Raises $2.6 Million for Secure Smartphone OS

The sovereign smartphone OS runs along Android or iOS, allowing users to switch between ...

Atlassian Patches Critical Apache Tika Flaw

Atlassian has released software updates for Bamboo, Bitbucket, Confluence, Crowd, ...

Third DraftKings Hacker Pleads Guilty

Nathan Austad admitted in court to launching a credential stuffing attack against a fantasy ...