Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
vidaxl.net Performing a basic port scan 4 4sec 425 B US
ymnnanded.in Performing a basic port scan 13 4sec 607 B IN
rightkindofstrong.com Normal Scan 1 11sec 299 B CA
facebook.com Performing a basic port scan 2 2sec 464 B IE
91.243.15.94 Performing a basic port scan - 21sec 356 B UA
74.207.236.245 Performing a basic port scan - 1sec 376 B US
37.187.105.211 Performing a basic port scan 8 4sec 447 B FR
rightplace-lo.com Normal Scan 16 6sec 704 B JP
178.66.156.146 Performing a basic port scan 1 7sec 285 B RU
195.202.151.122 Performing a basic port scan 1 6sec 312 B AT

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Jazz Emerges From Stealth With $61M in Funding for AI-Powered DLP

The startup brings AI to data loss prevention to provide visibility into intent, context, and ...

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

Cybersecurity researchers are calling attention to a new campaign where threat actors are ...

KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

Cybersecurity researchers have discovered a new malware called KadNap that's primarily ...

Security Leaders Discuss Trump’s Cyber Strategy for America

Security leaders share approval and critiques of Trump’s Cyber Strategy for America. 

Kai Emerges From Stealth With $125M in Funding for AI Platform Bridging IT and OT Security

The company was created by a Claroty founder and is backed by Evolution Equity Partners, N47, ...

Webinar Today: Securing Fragile OT in an Exposed World

Join the webinar as we examine the current OT threat landscape and move past the "doom and ...

SAP Patches Critical FS-QUO, NetWeaver Vulnerabilities

A code injection bug in FS-QUO and an insecure deserialization flaw in NetWeaver could lead to ...

Thousands Affected by Ericsson Data Breach

The telecommunications equipment and services giant has blamed the incident on a third-party ...