Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
ib.sjiblbd.com Performing a basic port scan 1 13sec 350 B BD
203.194.118.254 Performing a basic port scan 18 4sec 773 B BD
203.194.118.254 Performing a basic port scan 18 4sec 773 B BD
www.instagram.com Performing a basic port scan 2 2sec 469 B SE
alarko-carrier.com.tr Performing a basic port scan 3 15sec 341 B TR
52.148.192.161 Performing a basic port scan 1 3sec 278 B NL
201.108.73.23 Performing a basic port scan - 24sec 412 B MX
8.8.8.8 Performing a basic port scan 2 2sec 341 B US
100.38.210.227 Performing a basic port scan - 17sec 392 B US
google.com Performing a basic port scan 2 3sec 476 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Hackers Targeted PraisonAI Vulnerability Hours After Disclosure

The first exploitation attempts were observed less than four hours after the authentication ...

Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation

An anonymous cybersecurity researcher who disclosed three Microsoft Defender vulnerabilities ...

High-Severity Vulnerability Patched in VMware Fusion

The patch was announced as Broadcom is attending the Pwn2Own hacking competition in Berlin ...

Researcher Drops YellowKey, GreenPlasma Windows Zero-Days

YellowKey is a BitLocker bypass that requires physical access. GreenPlasma enables elevation ...

New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption

Details have emerged about a new variant of the recent Dirty Frag Linux local privilege ...

18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

Cybersecurity researchers have disclosed multiple security vulnerabilities impacting NGINX ...

Foxconn Confirms North American Factories Hit by Cyberattack

The Nitrogen ransomware group claims to have hacked the company’s systems, stealing 8TB of ...

Microsoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code

Microsoft’s MDASH discovered 16 of the Patch Tuesday vulnerabilities, and Palo Alto used ...