Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
81.8.16.140 Performing a basic port scan - 10sec 295 B TR
88.8.16.140 Performing a basic port scan - 14sec 376 B ES
codewithharry.com Performing a basic port scan 4 2sec 489 B
87.78.56.26 Performing a basic port scan 1 8sec 344 B DE
3.162.58.59 Performing a basic port scan 2 6sec 337 B US
71.88.138.226 Performing a basic port scan - 21sec 376 B US
192.124.249.5 Performing a basic port scan 2 3sec 325 B US
73.140.214.255 Performing a basic port scan 2 7sec 339 B US
biel.dev.br Performing a basic port scan 4 2sec 476 B US
172.253.235.18 Performing a basic port scan - 31sec 300 B JP

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Vulnerabilities Patched in CrowdStrike, Tenable Products

CrowdStrike has fixed a critical LogScale vulnerability, while Tenable addressed a ...

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

Chinese-speaking individuals are the target of a new campaign that uses a trojanized version ...

Bitwarden NPM Package Hit in Supply Chain Attack

Tied to a fresh Checkmarx supply chain attack claimed by TeamPCP, the incident references the ...

Copperhelm Raises $7 Million for Agentic Cloud Security Platform

The Israel-based company, which just emerged from stealth mode, was founded by cloud and ...

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, ...

Anthropic’s Mythos Preview Just Changed The Threat Landscape In Ways The Security ...

The attacker’s blind spot just disappeared –Mayuresh Ektare, Senior Vice President, ...

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware

A previously undocumented threat activity cluster known as UNC6692 has been observed ...

Cloudsmith Raises $72 Million in Series C Funding

The company will use the investment to accelerate product development and grow go-to-market ...