Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
51.171.66.68 Performing a basic port scan - 3sec 437 B IE
tz-game.com Performing a basic port scan 4 2sec 510 B
142.251.157.119 Performing a basic port scan 2 2sec 298 B US
rapidapi.com Performing a basic port scan 4 2sec 479 B US
google.com Performing a basic port scan 2 3sec 475 B US
shaadi.com Performing a basic port scan 4 2sec 422 B
111.90.177.26 Performing a basic port scan 3 6sec 340 B KH
capacitacion.minseg.gob.ar Performing a basic port scan 5 3sec 472 B CA
111.90.177.26 Performing a basic port scan 3 10sec 344 B KH
86.108.81.61 Performing a basic port scan - 15sec 344 B JO

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

CISA Admin Leaked AWS GovCloud Keys on Github

Until this past weekend, a contractor for the Cybersecurity & Infrastructure Security ...

INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests

INTERPOL has coordinated a first-of-its-kind cybercrime crackdown across the Middle East and ...

⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More

Monday opens with a trust problem. A mail server flaw is under active use. A network control ...

How to Reduce Phishing Exposure Before It Turns into Business Disruption

What happens when a phishing email looks clean enough to pass through security, but dangerous ...

Millions Impacted Across Several US Healthcare Data Breaches

Several healthcare data breaches impacting hundreds of thousands and even millions were added ...

World Premiere Of “Midnight In The War Room” Documentary At Black Hat Vegas

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – May. ...

‘Claw Chain’ OpenClaw Flaws Allow Sandbox Escape, Backdoor Delivery

Four vulnerabilities in OpenClaw can be chained together to steal credentials, escape the ...

7-Eleven Data Breach Confirmed After ShinyHunters Ransom Demand

The hackers claimed to have stolen more than 600,000 Salesforce records, including personal ...