Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
181.20.130.239 Performing a basic port scan 4 8sec 372 B AR
181.20.130.239 Performing a basic port scan 4 6sec 413 B AR
193.46.255.51 Performing a basic port scan 1 3sec 313 B RO
amzon.com Performing a basic port scan 2 2sec 439 B US
45.52.133.194 Performing a basic port scan - 5sec 429 B US
185.219.84.134 Performing a basic port scan 4 1sec 378 B IT
89.45.6.199 Performing a basic port scan 3 2sec 313 B HK
162.251.61.64 Performing a basic port scan 2 2sec 331 B US
75.149.26.30 Performing a basic port scan - 20sec 296 B US
75.149.26.30 Performing a basic port scan - 20sec 296 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

A new software supply chain attack campaign has been observed using sleeper packages as a ...

Hugging Face, ClawHub Abused for Malware Distribution

Threat actors are relying on social engineering to lure users into downloading files ...

FBI Warns of Surge in Hacker-Enabled Cargo Theft

A new alert from the FBI says criminal enterprises are hacking both brokers and carriers to ...

1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

The compromised Lightning and Intercom packages have a combined monthly download count of ...

Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge

With Mythos signaling a new era of near-instant exploitation, Anthropic positions Claude ...

AI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Shrinks to Hours

Industrialized cybercrime delivers attacks with greater scale, speed and success. Defenders ...

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

In yet another software supply chain attack, threat actors have managed to compromise the ...

SonicWall Urges Immediate Patching of Firewall Vulnerabilities

The bugs could be exploited to bypass security controls, access restricted services, and crash ...