Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
194.87.220.71 Performing a basic port scan 3 1sec 306 B CZ
142.251.98.102 Performing a basic port scan 2 3sec 320 B US
www.meezanbank.com Performing a basic port scan 4 2sec 438 B
www.meezanbank.com Performing a basic port scan 4 2sec 438 B
www.meezanbank.com Performing a basic port scan 4 2sec 438 B
175.139.204.130 Performing a basic port scan - 27sec 302 B MY
67.177.30.184 Performing a basic port scan - 23sec 374 B US
180.76.76.76 Performing a basic port scan 1 11sec 298 B CN
180.76.76.76 Performing a basic port scan 1 9sec 297 B CN
104.21.63.133 Performing a basic port scan 4 2sec 352 B

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Iranian Cyber Group Handala Targets US Troops in Bahrain

US service members received WhatsApp messages claiming they would be targeted with drones and ...

38 Vulnerabilities Found in OpenEMR Medical Software

Some of the vulnerabilities discovered by Aisle can be exploited to access and alter sensitive ...

Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately

cPanel has released security updates to address a security issue impacting various ...

Chrome 147, Firefox 150 Security Updates Rolling Out

The browser refreshes resolve critical and high-severity vulnerabilities that could lead to ...

CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security ...

Critical GitHub Vulnerability Exposed Millions of Repositories

The remote code execution flaw CVE-2026-3854 was found to impact GitHub.com and GitHub ...

LiteLLM CVE-2026-42208 SQL Injection Exploited within 36 Hours of Disclosure

In yet another instance of threat actors quickly jumping on the exploitation bandwagon, a ...

Cyber Insurance Data Gives CISOs New Ammo for Budget Talks

Boards may ignore alerts, but they listen to losses: new data from Resilience links security ...