Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
172.64.52.95 Performing a basic port scan 5 3sec 397 B US
grpc.stg.openobd.com Performing a basic port scan 2 6sec 477 B DE
129.154.235.113 Performing a basic port scan 1 7sec 278 B IN
129.154.235.113 Performing a basic port scan 1 6sec 278 B IN
129.154.235.113 Performing a basic port scan 1 6sec 278 B IN
202.131.102.115 Performing a basic port scan 3 7sec 325 B IN
fastlogin.com.tr Performing a basic port scan 2 6sec 389 B TR
m.turkcell.com.tr Performing a basic port scan 3 4sec 340 B TR
rightplantrightplace.com Normal Scan 4 5sec 506 B US
mdyoutube.com Performing a basic port scan 3 13sec 330 B AZ

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Hackers Abuse QEMU for Defense Evasion

The machine emulator has been abused in at least two different campaigns distributing ...

Bluesky Disrupted by Sophisticated DDoS Attack

A pro-Iran hacker group has taken credit for the attack on Bluesky, which appears to have ...

Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

Cybersecurity researchers have discovered a critical "by design" weakness in the Model Context ...

Senate Extends Surveillance Powers Until April 30 After Chaotic Votes in House

The Senate approved a short-term renewal until April 30 of a controversial surveillance ...

Half of the 6 Million Internet-Facing FTP Servers Lack Encryption

The continued use of the half-century-old protocol exposes enterprises and end users to ...

Next.js Creator Vercel Hacked

Vercel confirmed suffering a breach after a hacker claiming to be part of ShinyHunters offered ...

Hackers Fail to Exploit Flaw in Discontinued TP-Link Routers

In-the-wild exploitation has been ongoing for a year, but no successful payload execution has ...

Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems

Cybersecurity researchers have flagged a new malware called ZionSiphon that appears to be ...