Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
scbc.wa.edu.au Performing a basic port scan 2 6sec 434 B SG
fjralyom.com Performing a basic port scan 14 3sec 618 B AU
193.186.4.226 Performing a basic port scan - 8sec 424 B US
193.186.4.226 Performing a basic port scan - 18sec 425 B US
92.113.23.23 Performing a basic port scan 2 3sec 295 B UA
ostad.app Performing a basic port scan 4 2sec 502 B US
94.207.17.94 Performing a basic port scan - 22sec 296 B AE
51.91.139.192 Performing a basic port scan 3 3sec 317 B FR
172.64.151.8 Performing a basic port scan 4 2sec 350 B US
172.64.151.8 Performing a basic port scan 4 1sec 350 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Verizon DBIR 2026: Vulnerability Exploitation Overtakes Credential Theft as Top Breach Vector

Verizon’s 2026 DBIR finds vulnerability exploitation has overtaken credential abuse as the ...

Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps

Cybersecurity researchers have disclosed details of a new ad fraud and malvertising operation ...

Drupal to Patch Highly Critical Vulnerability at Risk of Quick Exploitation

Drupal says attackers may develop an exploit for the vulnerability within hours or days. The ...

Microsoft Disrupts Malware-Signing Service Run by ‘Fox Tempest’ 

 Fox Tempest provides a service that cybercriminals use to distribute ransomware and other ...

DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability

Proof-of-concept (PoC) exploit code has now been released for a recently patched security flaw ...

Legacy Windows Tool MSHTA Fuels Surge in Silent Malware Attacks

Attackers are increasingly abusing Microsoft’s decades-old MSHTA utility to stealthily ...

Unpatched ChromaDB Vulnerability Can Lead to Server Takeover

The security defect can be exploited remotely, without authentication, to execute arbitrary ...

Young Girls Are The Future Of Cybersecurity

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. ...