Scan Your Host's Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Domain or IP Age Scan method Ports Duration Size
esgtest.fda.gov Now Normal Scan 1 6.16sec 394 B
youneedapro.com 11 sec ago Performing a basic port scan 2 1.94sec 456 B
escort.club 27 sec ago Normal Scan 4 5.84sec 480 B
nautilus220.com 32 sec ago Performing a basic port scan 4 2.36sec 437 B
escapehunt.com 45 sec ago Normal Scan 4 6.65sec 517 B
model-technology.com 57 sec ago Performing a basic port scan 3 2.61sec 492 B
esbtwu7td5.kameleoon.eu 1 min ago Normal Scan 4 4.99sec 532 B
profisoft.pl 1 min ago Performing a basic port scan 2 6.14sec 361 B
lineablucoatings.com 2 min ago Performing a basic port scan 2 2.09sec 321 B
es.luxuretv.com 2 min ago Normal Scan 4 4.81sec 597 B

Portscanner Online By the numbers

Total Discovered Targets

21,824,411

Discovered Targets in the Last 24 Hours

10,768

Discovered Ports in the Last 24 Hours

308,989

UP Targets in the Last 24 Hours

8,784

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Useful Links

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Android 14 Adds New Security Features to Block 2G Exploits and Baseband Attacks

Google has revealed the various security guardrails that have been incorporated into its ...

The Secret Weakness Execs Are Overlooking: Non-Human Identities

For years, securing a company’s systems was synonymous with securing its “perimeter.” ...

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking

Linux servers are the target of an ongoing campaign that delivers a stealthy malware dubbed ...

A Single Cloud Compromise Can Feed an Army of AI Sex Bots

Organizations that get relieved of credentials to their cloud environments can quickly find ...

North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks

Threat actors with ties to North Korea have been observed delivering a previously undocumented ...

CISA releases threat response guide for K-12 schools

The CISA has released a new resource to assist K-12 schools establish tailored approaches to ...

10% of IT professionals have zero visibility measures

A report found that 44% of IT security professionals rely on manual logging for service ...

INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa

INTERPOL has announced the arrest of eight individuals in Côte d'Ivoire and Nigeria as part ...