Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
www.speak-hub.com Performing a basic port scan 3 3sec 339 B TR
winehq.org Performing a basic port scan 4 2sec 505 B
161.35.95.5 Performing a basic port scan 3 2sec 340 B NL
103.63.115.21 Performing a basic port scan 3 6sec 337 B VN
103.63.115.21 Performing a basic port scan 3 7sec 337 B VN
cmkl.ac.th Performing a basic port scan 4 2sec 505 B
muc.edu.ps Performing a basic port scan 2 19sec 313 B PS
muc.edu.ps Performing a basic port scan 2 19sec 313 B PS
174.178.11.253 Performing a basic port scan - 21sec 378 B US
google.com Performing a basic port scan 2 3sec 439 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions

Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) ...

Sandhills Medical Says Ransomware Breach Affects 170,000

It took the healthcare organization nearly one year to publicly disclose a data breach after ...

Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

Google has addressed a maximum severity security flaw in Gemini CLI -- the ...

SAP npm Packages Compromised by “Mini Shai-Hulud” Credential-Stealing Malware

Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign ...

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs

Cybersecurity researchers have discovered malicious code in an npm package after a malicious ...

VanishID: Agentic AI-Powered Cybersecurity Protects C-Suite Executives

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. ...

Fresh LiteLLM Vulnerability Exploited Shortly After Disclosure

The vulnerability allows attackers to read data from a LiteLLM proxy’s database and ...

Hundreds of Internet-Facing VNC Servers Expose ICS/OT

Forescout has identified tens of thousands of exposed RDP and VNC servers that can be mapped ...