Scan Your Host's Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Domain or IP Age Scan method Ports Duration Size
photographyxtara.com 7 sec ago Performing a basic port scan 4 2.15sec 487 B US
svc-2-usf.hotyon.com 15 sec ago Scan OS information and Traceroute 2 56.31sec 5898 B US
dev-us.digitalassets.gs.com 22 sec ago Normal Scan 1 4.92sec 460 B US
photographywithemilyandalbert.com 28 sec ago Performing a basic port scan 4 2.38sec 512 B US
lateapexphoto.com 50 sec ago Performing a basic port scan 4 2.09sec 481 B US
simplytaken.net 1 min ago Performing a basic port scan 4 2.02sec 476 B US
photographywerx.com 1 min ago Performing a basic port scan 4 2.02sec 484 B US
dev-diakoneo.cloud.jedox.com 2 min ago Normal Scan 2 12.24sec 328 B DE
72.10.164.178 2 min ago Scan All TCP Ports 290 31.16sec 8198 B CA
photographyunscripted.com 2 min ago Performing a basic port scan 4 2.8sec 497 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Useful Links

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf

The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege ...

FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation

The U.S. Department of Justice (DoJ) has announced arrests and charges against several ...

GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks

A new tax-themed malware campaign targeting insurance and finance sectors has been observed ...

The run-up to my prostate examination | Brief letters

The run-up to my prostate examination | Brief letters At the doctor’s | Phone safety | Passwords | Heinz advertLucy Mangan, writing about her ...

60% of organizations manually gather employee data

According to a recent Envoy report, shifting workplace dynamics such as hybrid work policies ...

More than one-third of tech professionals report AI skills shortage

New research has found a skills gap in AI security skills. 

How Hybrid Password Attacks Work and How to Defend Against Them

Threat actors constantly change tactics to bypass cybersecurity measures, developing ...

CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that it has ...