Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
178.249.212.36 Performing a basic port scan 1 6sec 322 B FR
45.205.1.3 Performing a basic port scan 2 1sec 279 B MU
www.facebook.com Performing a basic port scan 2 2sec 469 B SE
149.40.50.118 Performing a basic port scan - 17sec 368 B DE
nkarisha.online Performing a basic port scan 13 3sec 592 B SG
pizzanizza.bg Performing a basic port scan 2 5sec 314 B BG
182.253.238.218 Performing a basic port scan 6 3sec 391 B ID
103.175.154.3 Performing a basic port scan - 39sec 298 B ID
104.21.28.23 Performing a basic port scan 4 2sec 351 B
57.128.223.151 Performing a basic port scan 13 1sec 564 B FR

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Drupal Vulnerability in Hacker Crosshairs Shortly After Disclosure

Drupal is warning users that it has already seen attempts to exploit CVE-2026-9082 and ...

Lawmakers Demand Answers as CISA Tries to Contain Data Leak

Lawmakers in both houses of Congress are demanding answers from the U.S. Cybersecurity & ...

Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware

The Belarus-aligned threat actor known as Ghostwriter (aka UAC-0057 and UNC1151Ukraine's ...

In Other News: Industrial Router Exploitation, CISA KEV Nomination Form, Gas Station Hacking

Other noteworthy stories that might have slipped under the radar: CISA contractor exposes ...

Canadian Man Arrested for Operating Kimwolf Botnet

Jacob Butler, 23, has been arrested in Canada and US authorities are seeking his extradition ...

Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflows

Cybersecurity researchers have disclosed details of a new automated campaign called Megalodon ...

Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspective

1 Introduction This article provides a technical analysis of how many Windows kernel mode ...

‘First VPN’ Cybercrime Service Disrupted, Administrator Arrested

The FBI says First VPN has been used by dozens of ransomware groups for network reconnaissance ...