Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
81.95.231.83 Performing a basic port scan 11 5sec 549 B UZ
81.197.177.91 Performing a basic port scan - 34sec 298 B FI
189.217.101.227 Performing a basic port scan - 1sec 399 B MX
189.217.101.227 Performing a basic port scan - 1sec 434 B MX
rigginsmorelandeng.com Normal Scan 2 6min 57sec (417sec) 472 B US
143.20.185.80 Performing a basic port scan 11 2sec 502 B US
ridiptawelfarefoundation.com Normal Scan 4 6sec 514 B
143.20.185.80 Performing a basic port scan 11 1sec 502 B US
103.227.176.14 Performing a basic port scan 18 2sec 711 B SG
103.184.24.209 Performing a basic port scan 3 10sec 319 B BD

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Apple iPhone and iPad Cleared for Classified NATO Use

The devices have been added to the NATO Information Assurance Product Catalogue (NIAPC). The ...

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 ...

Four Risks Boards Cannot Treat as Background Noise

The goal isn’t about preventing every attack but about keeping the business running when ...

UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

A previously undocumented threat activity cluster has been attributed to an ongoing malicious ...

The Cascading Economic Ripple Effects Of Cybercrime

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. ...

ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ ...

Nothing here looks dramatic at first glance. That’s the point. Many of this week’s threats ...

Claude Code Flaws Exposed Developer Devices to Silent Hacking

Anthropic has patched vulnerabilities whose impact was demonstrated by Check Point via ...

Gambit Security Emerges From Stealth With $61 Million in Funding

The seed and Series A investment will enable the startup to accelerate product development and ...