Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
ndp-enghien.org Performing a basic port scan 100 7sec 2658 B FR
73.26.116.48 Performing a basic port scan - 5sec 370 B US
tridentnode.com Performing a basic port scan 100 29sec 2901 B US
203.200.147.10 Performing a basic port scan 3 9sec 338 B IN
www.allnighthosting.cloud Performing a basic port scan 16 4sec 699 B US
panel.tridentnode.com Performing a basic port scan 5 5sec 388 B ES
162.250.232.29 Performing a basic port scan 1 1sec 304 B US
rightforest.com Normal Scan 3 10sec 342 B US
15.204.97.154 Performing a basic port scan 6 3sec 427 B US
rightbrainforhire.com Normal Scan 2 8sec 469 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Over 300 Malicious Chrome Extensions Caught Leaking or Stealing User Data

With more than 37 million combined downloads, the extensions expose users to tracking and ...

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

A previously undocumented threat actor has been attributed to attacks targeting Ukrainian ...

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, ...

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new ...

In Other News: Google Looks at AI Abuse, Trump Pauses China Bans, Disney’s $2.7M Fine

Other noteworthy stories that might have slipped under the radar: vulnerabilities at 277 water ...

Navigating the Digital Frontier: Inside the World of Cybercrime Magazine

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. ...

Check Point Announces Trio of Acquisitions Amid Solid 2025 Earnings Beat

Check Point has acquired Israeli cybersecurity companies Cyata, Cyclops, and Rotate. The post ...

Dutch Carrier Odido Discloses Data Breach Impacting 6 Million

Hackers stole personal information such as names, addresses, and phone numbers from a customer ...