Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
magang.diskominsta.magelangkota.go.id Performing a basic port scan 4 6sec 382 B ID
nexa.fr Performing a basic port scan 4 16sec 363 B US
righteouspractice.com Normal Scan 2 4sec 392 B US
187.191.2.214 Performing a basic port scan 1 304 B MX
92.204.162.165 Performing a basic port scan 22 11sec 850 B FR
crypto-pizza.nl Performing a basic port scan 2 4sec 482 B US
rightmindcoach.com Normal Scan 1 4sec 441 B US
158.173.154.97 Performing a basic port scan 4 2sec 353 B DK
5.28.3.18 Performing a basic port scan 3 4sec 325 B HU
188.114.97.7 Performing a basic port scan 4 5sec 351 B NL

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

Salesforce has warned of an increase in threat actor activity that's aimed at exploiting ...

Cylake Raises $45 Million to Secure Organizations Barred From Cloud

The company, founded by Palo Alto Networks’ Nir Zuk, has developed a platform that focuses ...

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three ...

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

Cybersecurity researchers have discovered a malicious npm package that masquerades as an ...

Cybersecurity M&A Roundup: 42 Deals Announced in February 2026

Significant cybersecurity M&A deals announced by Check Point, Booz Allen, Proofpoint, ...

UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud ...

⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

Another week in cybersecurity. Another week of "you've got to be kidding me." Attackers were ...

Is Cybersecurity the Dark Horse for Venture Investors During the Iran Conflict?

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. ...