Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
103.211.28.177 Performing a basic port scan 5 2sec 382 B BD
143.44.192.8 Performing a basic port scan 3 17sec 355 B PH
12.153.198.31 Performing a basic port scan 1 5sec 299 B US
12.153.198.31 Performing a basic port scan 1 5sec 299 B US
www.library.gov.au Performing a basic port scan 2 3sec 418 B US
tekjemarket.com Performing a basic port scan 2 2sec 315 B
13.107.246.40 Performing a basic port scan 2 2sec 296 B US
104.26.14.233 Performing a basic port scan 4 1sec 351 B
141.193.213.21 Performing a basic port scan 4 2sec 352 B US
162.120.186.86 Performing a basic port scan 7 7sec 486 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

Cybersecurity researchers have discovered a new Lua-based malware created years before the ...

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four ...

FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed ...

Pre-Stuxnet Sabotage Malware ‘Fast16’ Linked to US-Iran Cyber Tensions

It targeted high-precision calculation software to tamper with results and packed a ...

In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display ...

Other noteworthy stories that might have slipped under the radar: Supreme Court hacker ...

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space ...

One CISO For 10,000 companies: Cybersecurity On Too Few Shoulders

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. ...

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

From autonomous code generation to decision-making systems that initiate actions without human ...