Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
170.62.100.196 Performing a basic port scan - 11sec 301 B US
77.85.47.221 Performing a basic port scan - 9sec 354 B BG
fastimages.org Performing a basic port scan 2 4sec 312 B BZ
54.37.137.47 Performing a basic port scan 3 3sec 340 B FR
174.97.224.106 Performing a basic port scan 2 5sec 337 B US
146.168.202.116 Performing a basic port scan - 20sec 388 B US
anssi.cg Performing a basic port scan 12 2sec 554 B CG
77.37.37.68 Performing a basic port scan 5 3sec 370 B DE
www.alistetechnologies.com Performing a basic port scan 2 2sec 782 B US
www.alistetechnologies.com Performing a basic port scan 2 3sec 782 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

A newly disclosed security flaw impacting NGINX Plus and NGINX Open has come under active ...

Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt

Grafana has disclosed that an "unauthorized party" obtained a token that granted them the ...

Canvas hack: is it ever a good idea to pay a ransom, and what happens to the data?

Canvas hack: is it ever a good idea to pay a ransom, and what happens to the data? Businesses are advised against paying – but many are prepared to deal to protect users’ ...

Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

A critical security vulnerability impacting the Funnel Builder plugin for WordPress has ...

PoC Code Published for Critical NGINX Vulnerability

Introduced in 2008, the critical-severity security defect was patched this week in NGINX Plus ...

Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access

The Russian state-sponsored hacking group known as Turla has transformed its ...

In Other News: Big Tech vs Canada Encryption Bill, Cisco’s Free AI Security Spec, Audi ...

Other noteworthy stories that might have slipped under the radar: Nvidia cloud gaming data ...

Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

Cybersecurity researchers have disclosed a set of four security flaws in OpenClaw that could ...