Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
www.hatimaki.ru Performing a basic port scan 2 2sec 315 B RU
www.uniagustiniana.edu.co Performing a basic port scan 2 4sec 466 B US
129.213.193.76 Performing a basic port scan 1 3sec 278 B US
travelcrs.com Performing a basic port scan 7 2sec 490 B DE
ford.com Performing a basic port scan 2 4sec 436 B US
consolidatednd.com Performing a basic port scan 3 7sec 394 B US
woodyseyewear.com Performing a basic port scan 4 2sec 492 B US
rightfitclub.com Normal Scan 2 6sec 456 B US
bepc.com Performing a basic port scan 2 2sec 309 B US
104.18.27.120 Performing a basic port scan 4 2sec 351 B

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

RSAC 2026 Conference Announcements Summary (Pre-Event)

A summary of the announcements made by vendors in the days leading up to the RSAC 2026 ...

‘CanisterWorm’ Springs Wiper Attack Targeting Iran

A financially motivated data theft and extortion group is attempting to inject itself into the ...

Autonomous SOC: What It Is, Key Benefits and Core Challenges

Six Predictions for the AI-Driven SOC – Christophe Briguet, Senior Director of Product ...

M-Trends 2026: Initial Access Handoff Shrinks From Hours to 22 Seconds

The latest M-Trends report is based on insights from over 500,000 hours of Mandiant incident ...

Chip Services Firm Trio-Tech Says Subsidiary Hit by Ransomware 

The semiconductor company says hackers deployed file-encrypting ransomware on the network of a ...

Aqua’s Trivy Vulnerability Scanner Hit by Supply Chain Attack

Hackers published a malicious scanner release and replaced tags to point to ...

⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More

Another week, another reminder that the internet is still a mess. Systems people thought were ...

35,000 Chief Information Security Officers Employed Globally in 2026

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. ...