Scan Your Host's Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Domain or IP Age Scan method Ports Duration Size
inktile.com Now Normal Scan 2 6.86sec 378 B
china-catering-enschede.nl Now Performing a basic port scan 2 5.51sec 480 B
inktigers.com 5 sec ago Normal Scan 1 5.86sec 293 B
inktiger.com 6 sec ago Normal Scan 1 7.1sec 420 B
inktigerart.com 9 sec ago Normal Scan 3 5.38sec 442 B
inktig.com 11 sec ago Normal Scan 1 6.13sec 290 B
a4760.casalemedia.com 12 sec ago Normal Scan 2 13.1sec 319 B
inktified.com 12 sec ago Normal Scan 3 8.23sec 339 B
inktie.com 25 sec ago Normal Scan 2 5.43sec 470 B
china-box.be 27 sec ago Performing a basic port scan 2 5.57sec 452 B

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Useful Links

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Chinese threat actor exploits credentials from password spray attacks

Microsoft observed malicious activity targeting and stealing credentials from Microsoft ...

Multi-factor authentication to be mandatory on Google Cloud accounts

Google announced mandatory multi-factor authentication (MFA) is coming to Google Cloud ...

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)

⚠️ Imagine this: the very tools you trust to protect you online—your two-factor ...

New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia

In an unusually specific campaign, users searching about the legality of Bengal Cats in ...

The ROI of Security Investments: How Cybersecurity Leaders Prove It

Cyber threats are intensifying, and cybersecurity has become critical to business operations. ...

Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation

Cybersecurity researchers have uncovered nearly two dozen security flaws spanning 15 different ...

HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities

Hewlett Packard Enterprise (HPE) has released security updates to address multiple ...

Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware

Cybersecurity researchers have discovered a new phishing campaign that spreads a new fileless ...