Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
whatismyipaddress.com Performing a basic port scan 4 1sec 489 B
facebook.com Performing a basic port scan 2 1sec 464 B IE
facebook.com Performing a basic port scan 2 2sec 464 B IE
facebook.com Performing a basic port scan 2 2sec 464 B IE
163.70.151.36 Performing a basic port scan 2 4sec 335 B FR
keyfactor.com Performing a basic port scan 4 1sec 433 B US
js.arcgis.com Performing a basic port scan 2 2sec 481 B US
google.com Performing a basic port scan 2 1sec 480 B US
79.78.208.224 Performing a basic port scan - 16sec 376 B GB
104.17.163.123 Performing a basic port scan 4 25sec 353 B

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged government agencies ...

The Collapse of Predictive Security in the Age of Machine-Speed Attacks

With exploitation of vulnerabilities taking just days, preemptive security must be the new ...

Autonomous Offensive Security Firm XBOW Raises $120M at $1B+ Valuation

The company has developed an AI-powered platform that autonomously discovers and validates ...

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has sanctioned ...

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that's ...

Threat Actors Target the Entire Retail Supply Chain

The full supply chain is at risk for cyberattacks.

Cloud Security Startup Native Exits Stealth With $42 Million in Funding

Phil Venables, former CISO of Google Cloud and now a venture partner at Ballistic Ventures, ...

‘DarkSword’ iOS Exploit Kit Used by State-Sponsored Hackers, Spyware Vendors

Targeting six iOS vulnerabilities and leading to full device compromise, the exploit chain is ...