Scan Your Host's Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Domain or IP Age Scan method Ports Duration Size
mxmailworks.com 16 sec ago Performing a basic port scan 4 2.3sec 487 B
kzyu-ime.badambiz.com 21 sec ago Normal Scan 2 13.2sec 321 B
kxdftcs01.boyaagame.com 41 sec ago Normal Scan 3 37.12sec 431 B HK
narangpreeti.com 42 sec ago Performing a basic port scan 4 2.01sec 489 B
kyree.ns.cloudflare.com 49 sec ago Normal Scan 5 5sec 563 B US
naportec.com.ec 1 min ago Performing a basic port scan 2 6.88sec 322 B EC
kwejk.pl 1 min ago Normal Scan 2 11.52sec 408 B FR
xn--esance-cva.ch 2 min ago Performing a basic port scan 4 4.91sec 407 B CH
kualo.net 2 min ago Normal Scan 15 8.61sec 677 B US
napisan.it 2 min ago Performing a basic port scan 2 4.76sec 464 B DE

Portscanner Online By the numbers

Total Discovered Targets

21,687,866

Discovered Targets in the Last 24 Hours

9,456

Discovered Ports in the Last 24 Hours

73,329

UP Targets in the Last 24 Hours

7,771

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Useful Links

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Configuration flaw puts ServiceNow Knowledge Base articles at risk

More than 1,000 ServiceNow Knowledge Base articles were found to be misconfigured.

Hackers Deliver Popular Crypto-Miner Through Malicious Email Auto Replies, Researchers Say

Hackers are distributing a popular crypto-miner via malicious email auto-replies, as per ...

UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks

UNC1860 has been observed using victim networks as staging areas for additional operations, ...

FTC investigates video streaming and social media for data collection

A report found that companies collected and could indefinitely retain troves of data, ...

Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials

Law enforcement authorities have announced the takedown of an international criminal network ...

Acronis Backup Plugins Hit by CVE-2024-8767: CVSS 9.9 Severity Alert

Acronis Backup Plugins have been affected by a critical security flaw, CVE-2024-8767 (CVSS ...

Experts Warn of China-Linked APT's Raptor Train IoT Botnet

The attribution of the Raptor Train botnet to a Chinese nation-state actor is based on various ...

Passwordless AND Keyless: The Future of (Privileged) Access Management

In IT environments, some secrets are managed well and some fly under the radar. Here’s a ...