Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
20.42.65.84 Performing a basic port scan 1 5sec 274 B US
196.64.54.249 Performing a basic port scan - 16sec 298 B MA
34.88.210.85 Performing a basic port scan 3 2sec 368 B FI
4.248.100.31 Performing a basic port scan 2 6sec 294 B CA
vk.com Performing a basic port scan 2 2sec 475 B RU
vk.com Performing a basic port scan 2 2sec 475 B RU
149.102.233.241 Performing a basic port scan 2 16sec 342 B BR
204.76.203.206 Performing a basic port scan 4 1min 50sec (110sec) 386 B
59.26.22.53 Performing a basic port scan 5 4sec 374 B KR
ascenttechhub.africa Performing a basic port scan 4 2sec 478 B NL

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access

The Russian state-sponsored hacking group known as Turla has transformed its ...

In Other News: Big Tech vs Canada Encryption Bill, Cisco’s Free AI Security Spec, Audi ...

Other noteworthy stories that might have slipped under the radar: Nvidia cloud gaming data ...

Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence

Cybersecurity researchers have disclosed a set of four security flaws in OpenClaw that could ...

AI-Assisted Cybersecurity Leadership Services For Small And Mid-Sized Businesses (SMBs)

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. ...

Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild

Microsoft has shared mitigations for CVE-2026-42897 until a permanent patch can be released ...

American Lending Center Data Breach Affects 123,000 Individuals

The non-bank lender discovered a ransomware attack nearly one year ago, but only recently ...

What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface

In Your Biggest Security Risk Isn't Malware — It's What You Already Trust, we made a simple ...

TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates

OpenAI has disclosed that two of its employee devices in its corporate environment were ...