Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
rightfotos.com Normal Scan 4 11sec 468 B DE
lititzrx.com Performing a basic port scan 1 2sec 291 B US
riester-versicherung.com Normal Scan 2 14sec 323 B DE
172.67.216.131 Performing a basic port scan 4 2sec 353 B US
98.192.120.45 Performing a basic port scan - 7sec 374 B US
169.254.140.96 Performing a basic port scan - 3sec 349 B
www.uadec.mx Performing a basic port scan 10 3sec 500 B MX
ridgwaylodgeandstarsaloon.com Normal Scan 20 7sec 830 B US
righteeth.com Normal Scan 27 3sec 999 B KR
rightproteins.com Normal Scan 4 5sec 415 B CA

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are ...

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient ...

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the Commission’s AWS environment, including personal ...

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

A China-aligned threat actor has set its sights on European government and diplomatic ...

World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical ...

A snapshot of the state of the cloud in cybersecurity and physical security. 

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web ...

FAL.CON 2026: Secure The AI Revolution

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. ...

TrueConf Zero-Day Exploited in Asian Government Attacks

A Chinese threat actor exploited the video conferencing platform to perform reconnaissance, ...