Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
bcma.be Performing a basic port scan 100 2708 B FR
bcma.be Performing a basic port scan 100 2sec 2708 B FR
ridgewatergallery.com Normal Scan 4 6sec 375 B US
rightpay.com Normal Scan 2 6sec 448 B US
63.192.110.203 Performing a basic port scan 2 2sec 297 B US
google.com Performing a basic port scan 2 2sec 475 B US
85.134.9.110 Performing a basic port scan - 6sec 337 B FI
79.119.140.79 Performing a basic port scan 4 7sec 375 B RO
rightonkey.com Normal Scan 2 8sec 445 B US
107.23.48.136 Performing a basic port scan - 2sec 386 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

China’s Cyber Silence is More Worrying Than Russia’s Noise, Chief Cybersecurity ...

NTT’s chief cybersecurity strategist Mihoko Matsubara on the new geopolitics of hacking, the ...

 Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform

Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New ...

How TTP-based Defenses Outperform Traditional IoC Hunting

Behavioral detection allows defenders to recognize activity patterns like privilege ...

Virtual Event Today: CISO Forum 2025 Virtual Summit

From the evolving role of AI to the realities of cloud risk and governance, the CISO Forum ...

Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws

Amazon's threat intelligence team on Wednesday disclosed that it observed an advanced threat ...

Blueprint For Building Or Strengthening A Modern Cyber Threat Intelligence Program

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Nov. ...

Sweet Security Raises $75 Million for Cloud and AI Security

The cybersecurity startup will use the investment to accelerate global expansion and product ...

Google Sues Chinese Cybercriminals Behind ‘Lighthouse’ Phishing Kit

Google is targeting the threat group known as Smishing Triad, which used over 194,000 ...