Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
103.42.198.250 Performing a basic port scan 1 8sec 340 B IN
57.144.180.34 Performing a basic port scan 2 4sec 333 B IE
76.90.17.106 Performing a basic port scan - 26sec 374 B US
172.236.25.254 Performing a basic port scan 1 1sec 308 B US
24.84.72.76 Performing a basic port scan - 27sec 368 B CA
admir-bajric.de Performing a basic port scan 11 2sec 594 B DE
104.21.14.80 Performing a basic port scan 4 2sec 351 B
46.53.254.53 Performing a basic port scan - 9sec 374 B BY
82.65.169.34 Performing a basic port scan - 10sec 359 B FR
5.139.27.100 Performing a basic port scan - 11sec 353 B RU

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently ...

New Bluekit Phishing Kit Features AI Assistant

Still under development, Bluekit provides users with automated domain registration and an AI ...

Trellix Confirms Source Code Breach With Unauthorized Repository Access

Cybersecurity company Trellix has announced that it suffered a breach that enabled ...

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a ...

In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool ...

Other noteworthy stories that might have slipped under the radar: OFAC hits Iranian central ...

Google Adjusts Bug Bounties: Chrome Payouts Drop as Android Rewards Rise Amid AI Surge

The maximum reward for a zero-click Pixel Titan M exploit with persistence has increased to ...

Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

Cybersecurity researchers are warning of two cybercrime groups that are carrying out "rapid, ...

China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists

Cybersecurity researchers have disclosed details of a new China-aligned espionage campaign ...