Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
181.118.166.211 Performing a basic port scan 2 1sec 323 B CL
8.8.8.8 Performing a basic port scan 2 1sec 343 B US
cvr.ac.in Performing a basic port scan 4 2sec 504 B US
cvr.ac.in Performing a basic port scan 4 5sec 504 B US
thub.com Performing a basic port scan 2 4sec 364 B AU
8.8.8.8 Performing a basic port scan 2 1sec 343 B US
clickker.internationalhotel.com Performing a basic port scan 1 9sec 372 B NL
208.67.222.222 Performing a basic port scan 3 3sec 344 B US
www.instagram.com Performing a basic port scan 2 2sec 473 B IE
80.24.237.136 Performing a basic port scan 1 6sec 329 B ES

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns

A previously undocumented threat cluster dubbed UAT-10362 has been attributed to ...

Apple Intelligence AI Guardrails Bypassed in New Attack

RSAC researchers hacked Apple Intelligence using the Neural Exect method and Unicode ...

Can we Trust AI? No – But Eventually We Must

From hallucinations and bias to model collapse and adversarial abuse, today’s AI is built on ...

Math Problem: Cybercrime Divided By Cybersecurity

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. ...

ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories

Thursday. Another week, another batch of things that probably should've been caught sooner ...

Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

Dozens of such keys can be extracted from apps’ decompiled code to gain access to all Gemini ...

Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities

The bugs could allow attackers to modify protected resources and escalate their privileges to ...

The Hidden Security Risks of Shadow AI in Enterprises

As AI tools become more accessible, employees are adopting them without formal approval ...