Scan Your Host's Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Domain or IP Age Scan method Ports Duration Size
intelligent-grid-performance.com Now Normal Scan 2 4.48sec 489 B
intelligentgridoperatingsystem.com 14 sec ago Normal Scan 2 5.55sec 492 B US
spm-p1-us-east4.origin.synxis.com 15 sec ago Normal Scan 1000 0.26sec 25301 B US
intelligentgridmanager.com 23 sec ago Normal Scan 2 5.05sec 479 B US
intelligentgridmanagement.com 29 sec ago Normal Scan 2 4.74sec 485 B US
spm-logger-p3-us-central1.origin.synxis.com 35 sec ago Normal Scan 1000 0.28sec 25317 B US
intelligentgrid.com 40 sec ago Normal Scan 3 5.86sec 392 B US
intelligent-grid.com 42 sec ago Normal Scan 1 6.09sec 448 B US
splio.com 48 sec ago Normal Scan 3 3.73sec 381 B FR
intelligentgreenzonemobile.com 50 sec ago Normal Scan 14 7.6sec 658 B DE

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Useful Links

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions

In yet another software supply chain attack, it has come to light that two versions of a ...

Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar

Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised ...

Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals' Data

Cybersecurity researchers have warned of a new scam campaign that leverages fake video ...

Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok

In a historic decision, Romania's constitutional court has annulled the result of the first ...

U.S. Copyright Office states common AI research does not violate DMCA

The U.S. Copyright Office has clarified legal rules for trustworthiness research and red ...

FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine

A Russian programmer accused of donating money to Ukraine had his Android device secretly ...

Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks

Cybersecurity researchers have disclosed multiple security flaws impacting open-source machine ...

Conquering the Complexities of Modern BCDR

The modern business landscape is thrilling yet daunting. Rapidly evolving technology, ...