Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
pg.projectgold.com.tr Performing a basic port scan 4 2sec 499 B US
155.212.226.85 Performing a basic port scan 3 1sec 325 B US
101.47.6.172 Performing a basic port scan - 6sec 295 B SG
ibtkarre.com Performing a basic port scan 13 2sec 602 B US
82.25.120.224 Performing a basic port scan 5 5sec 371 B GB
38.156.23.50 Performing a basic port scan 3 7sec 345 B DO
codessender.com Performing a basic port scan 4 3sec 487 B US
3.21.146.9 Performing a basic port scan 4 2sec 387 B US
rutracker.org Performing a basic port scan 4 4sec 483 B
www.luxurytreats.com Performing a basic port scan 2 2sec 464 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

A Russian-speaking, financially motivated threat actor has been observed taking advantage of ...

Critical Grandstream Phone Vulnerability Exposes Calls to Interception

The flaw tracked as CVE-2026-2329 can be exploited without authentication for remote code ...

Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature ...

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security ...

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and ...

With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, ...

‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

Most phishing websites are little more than static copies of login pages for popular online ...

The 25 Most Vulnerable Passwords of 2026

Research reveals the most insecure passwords of 2026. 

NIST’s Quantum Breakthrough: Single Photons Produced on a Chip

NIST’s single photon chip will likely make QKD an option for a wider range of ...