Scan Your Host's Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Domain or IP Age Scan method Ports Duration Size
redexgroup.com 5 sec ago Normal Scan 1000 2.97sec 25340 B
redexglobal.com 13 sec ago Normal Scan 4 5.64sec 437 B
redexfx.com 28 sec ago Normal Scan 12 4.22sec 655 B
redexfrete.com 29 sec ago Normal Scan 2 12.89sec 366 B
a1.beforeitsnews.com 34 sec ago Scan OS information and Traceroute 4 1min 35.85sec (95.85sec) 2751 B
redexfire.com 35 sec ago Normal Scan 4 19.11sec 465 B
redexercise.com 1 min ago Normal Scan 3 8.2sec 341 B
redexenvios.com 2 min ago Normal Scan 2 12.04sec 468 B
redexecutivesearch.com 2 min ago Normal Scan 4 4.03sec 491 B
redexecutive.com 2 min ago Normal Scan 1 6.82sec 440 B

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Useful Links

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers

Cybersecurity researchers have warned of a new large-scale campaign that exploits security ...

13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks

A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to ...

Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties

A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to ...

HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects

Imagine receiving a penetration test report that leaves you with more questions than answers. ...

CISA report calls on US government to close the software knowledge gap

CISA has released a report on the state of software understanding.

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

Cybersecurity researchers are calling attention to a series of cyber attacks that have ...

CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by ...

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

New research has uncovered security vulnerabilities in multiple tunneling protocols that could ...