Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
newnote.pt Performing a basic port scan 10 4sec 569 B US
188.25.73.234 Performing a basic port scan - 22sec 350 B RO
rivervalleyrecycling.net Performing a basic port scan 6 2sec 459 B CA
ggc.edu Performing a basic port scan 2 2sec 435 B US
200.186.241.158 Performing a basic port scan 3 10sec 379 B BR
rightlang.com Normal Scan 15 13sec 707 B TH
82.153.202.36 Performing a basic port scan 1 7sec 317 B GB
37.106.152.101 Performing a basic port scan 12 2sec 557 B SA
tdiintl.in Performing a basic port scan 15 1sec 627 B US
righteousrenovations.com Normal Scan 4 5sec 454 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses ...

US Healthcare Diagnostic Firm Says 140,000 Affected by Data Breach

The Everest ransomware group has taken credit for a hacker attack on Vikor Scientific, now ...

Long Island Medium Star Theresa Caputo Meets Cybercrime Magazine – Live!

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. ...

Ukrainian Gets 5 Years in US Prison for Aiding North Korean IT Fraud

Oleksandr Didenko sold the stolen identities of US citizens, allowing North Koreans to get ...

⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

Security news rarely moves in a straight line. This week, it feels more like a series of sharp ...

Autonomous AI Agents Provide New Class of Supply Chain Attack

While this campaign targets crypto wallets and steals money, the methodology has far wider ...

How Exposed Endpoints Increase Risk Across LLM Infrastructure

As more organizations run their own Large Language Models (LLMs), they are also deploying more ...

Romanian Hacker Pleads Guilty to Selling Access to US State Network

Catalin Dragomir admitted in a US court to selling access to an Oregon state government ...