Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
46.193.4.102 Performing a basic port scan - 15sec 388 B FR
riffport.com Normal Scan 2 5sec 449 B US
76.185.192.19 Performing a basic port scan - 6sec 376 B US
64.226.82.78 Performing a basic port scan 3 4sec 321 B DE
35.206.121.94 Performing a basic port scan 12 2sec 555 B US
85.105.44.222 Performing a basic port scan 7 8sec 455 B TR
africanintelligence.tech Performing a basic port scan 100 1min 39sec (99sec) 2910 B US
ufv.es Performing a basic port scan 2 4sec 388 B DE
rightpathcourses.com Normal Scan 2 8sec 396 B US
185.237.106.136 Performing a basic port scan 5 3sec 382 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control ...

‘Arkanix Stealer’ Malware Disappears Shortly After Debut

Written in C++ and Python, the malware exfiltrates system information, browser data, and ...

VMware Aria Operations Vulnerability Could Allow Remote Code Execution

Broadcom has patched several vulnerabilities in VMware Aria Operations, including ...

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

A Russia-aligned threat actor has been observed targeting a European financial institution as ...

CISO Conversations: Timothy Youngblood; 4x Fortune 500 CISO/CSO

Timothy Youngblood was CISO at Dell, CISO at Kimberley-Clark, VP & CISO at McDonald’s, ...

New ‘Sandworm_Mode’ Supply Chain Attack Hits NPM

The malicious code propagates like a worm, poisons AI assistants, exfiltrates secrets, and ...

GitHub Issues Abused in Copilot Attack Leading to Repository Takeover

Attackers can inject malicious instructions in a GitHub Issue that are automatically processed ...

Taiwan Security Firm Confirms Flaw Flagged by CISA Likely Exploited by Chinese APTs

The vulnerability in TeamT5 ThreatSonar Anti-Ransomware was recently added to CISA’s KEV ...