Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
rightonfleek.com Normal Scan 4 7sec 491 B US
megga.tv.br Performing a basic port scan 4 343 B US
52.249.183.36 Performing a basic port scan 2 2sec 296 B US
www.instagram.com Performing a basic port scan 2 4sec 473 B IE
www.loan112.com Performing a basic port scan 2 5sec 392 B IN
www.loan112.com Performing a basic port scan 2 10sec 393 B IN
77.103.81.91 Performing a basic port scan - 20sec 410 B GB
rightchoicearizona.com Normal Scan 2 6sec 469 B US
199.15.215.229 Performing a basic port scan 1 2sec 297 B US
rightouch.com Normal Scan 2 5sec 380 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

A new campaign has leveraged the ClickFix social engineering tactic as a way to distribute a ...

AI SOC: Definition, Components & Architecture

AI-Driven Security and SOC – Christophe Briguet, Senior Director of Product Management ...

Healthcare IT Platform CareCloud Probing Potential Data Breach

The company has disclosed a cybersecurity incident involving one of its electronic health ...

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

LLMs can write complex Rego and Cedar code in seconds, but a single missing condition or ...

⚡ Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

Some weeks are loud. This one was quieter but not in a good way. Long-running operations are ...

3 SOC Process Fixes That Unlock Tier 1 Productivity

What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, ...

Huskeys Emerges From Stealth With $8 Million in Funding

The startup has built an edge security management (ESM) platform, an AI engine atop the entire ...

Vulnerability affecting F5 BIG-IP APM

The NCSC is encouraging UK organisations to mitigate an unauthenticated remote code execution ...