Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
wp.pl Performing a basic port scan 2 5sec 340 B PL
24.78.101.62 Performing a basic port scan - 12sec 371 B CA
www.tiktok.com Performing a basic port scan 3 2sec 563 B US
www.tiktok.com Performing a basic port scan 3 5sec 560 B US
riggercons.com Normal Scan 2 4sec 452 B US
right-realty.com Normal Scan 2 5sec 456 B US
193.46.218.241 Performing a basic port scan 2 1sec 295 B US
86.45.85.173 Performing a basic port scan - 18sec 398 B IE
194.183.189.34 Performing a basic port scan - 4sec 368 B UA
75.119.152.53 Performing a basic port scan 18 2sec 739 B DE

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

Google on Wednesday disclosed that it worked with industry partners to disrupt the ...

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic's ...

The Blast Radius Problem: Stolen Credentials are Weaponizing Agentic AI

More than half (56%) of the 400,000 vulnerabilities IBM X-Force tracked in 2025 required no ...

Exploitation of Cisco Catalyst SD-WAN

Agencies strongly encourage immediate investigation of potential compromise of Cisco Catalyst ...

Google Disrupts Chinese Cyberespionage Campaign Targeting Telecoms, Governments

The UNC2814 threat actor has been active since at least 2017, targeting organizations across ...

SolarWinds Patches Four Critical Serv-U Vulnerabilities

The four security defects could be exploited for remote code execution but require ...

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed ...

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage is supposed to make things simpler. In a lot of teams, it does the opposite. When you ...