Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
www.youtube.com Performing a basic port scan 2 2sec 783 B US
195.175.22.146 Performing a basic port scan - 14sec 386 B TR
176.67.80.70 Performing a basic port scan - 12sec 297 B NL
13.222.59.238 Performing a basic port scan 2 5sec 355 B US
webmail.imsantamaria.cl Performing a basic port scan 12 4sec 586 B CL
192.141.168.58 Performing a basic port scan 12 6sec 530 B CL
thecyberbay.com Performing a basic port scan 2 6sec 313 B HK
181.29.136.213 Performing a basic port scan 1 8sec 312 B AR
8.8.8.8 Performing a basic port scan 2 2sec 305 B US
nfsu.ac.in Performing a basic port scan 3 6sec 337 B IN

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Sophisticated Quasar Linux RAT Targets Software Developers

The persistent, evasive implant provides remote access, surveillance, and credential ...

Google's Android Apps Get Public Verification to Stop Supply Chain Attacks

Google has announced expanded Binary Transparency for Android as a way to safeguard the ...

Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs

Cybersecurity researchers have disclosed details of an intrusion that involved the use of a ...

Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack

While trojanized Daemon Tools versions were installed worldwide, a sophisticated backdoor was ...

Oracle Debuts Monthly Critical Security Patch Updates

Containing fixes for critical-severity vulnerabilities, the monthly rollouts will focus on ...

Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

Palo Alto Networks has released an advisory warning that a critical buffer overflow ...

Palo Alto Networks to Patch Zero-Day Exploited to Hack Firewalls

CVE-2026-0300 affects the Captive Portal service of PAN-OS software on PA and VM series ...

Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE

The Apache Software Foundation (ASF) has released security updates to address several security ...