Scan Your Host's Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Domain or IP Age Scan method Ports Duration Size
redeology.com Now Normal Scan 1 4.53sec 501 B
rede-oliveira.com Now Normal Scan 16 4.04sec 721 B US
redeolhos.com 11 sec ago Normal Scan 1 7.15sec 422 B US
redeolapostosdecombustiveis.com 14 sec ago Normal Scan 4 18.03sec 433 B BR
redeold.com 15 sec ago Normal Scan 2 7.45sec 309 B LT
redeol.com 21 sec ago Normal Scan 1 6.57sec 418 B US
redeolacombustiveis.com 24 sec ago Normal Scan 5 18.52sec 446 B BR
redeolapostos.com 27 sec ago Normal Scan 4 10.83sec 419 B BR
redeola.com 35 sec ago Normal Scan 4 13.38sec 412 B BR
redeok.com 51 sec ago Normal Scan 2 4.83sec 444 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Useful Links

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers

Cybersecurity researchers have warned of a new large-scale campaign that exploits security ...

13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks

A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to ...

Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties

A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to ...

HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects

Imagine receiving a penetration test report that leaves you with more questions than answers. ...

CISA report calls on US government to close the software knowledge gap

CISA has released a report on the state of software understanding.

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

Cybersecurity researchers are calling attention to a series of cyber attacks that have ...

CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by ...

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

New research has uncovered security vulnerabilities in multiple tunneling protocols that could ...