Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
tzproject.com Performing a basic port scan 4 2sec 480 B
learnaboutsecurity.com Performing a basic port scan 4 4sec 500 B US
138.201.30.33 Performing a basic port scan 18 3sec 721 B DE
tz-game.com Performing a basic port scan 4 4sec 510 B
89.31.121.111 Performing a basic port scan 2 8sec 324 B RS
rigbyfootball.com Normal Scan 4 4sec 442 B
numschool-web.ru Performing a basic port scan 13 3sec 590 B RU
rightanglemanagement.com Normal Scan 2 5sec 475 B US
righteam.com Normal Scan 3 7sec 336 B US
www.icuc.com Performing a basic port scan 4 2sec 479 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

Cybersecurity researchers are calling attention to a new campaign that's leveraging ...

In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco ...

Other noteworthy stories that might have slipped under the radar: Pentagon orders accelerated ...

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, ...

True Hacking Story: From Teen Computer Whiz To Crypto Godfather

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Dec. ...

Gladinet CentreStack Flaw Exploited to Hack Organizations

Threat actors have hacked at least nine organizations by exploiting the recently patched ...

Fieldtex Data Breach Impacts 238,000

The Akira ransomware group took credit for the Fieldtex Products hack in November, claiming to ...

Recent GeoServer Vulnerability Exploited in Attacks

Because user input is not sufficiently sanitized, attackers could exploit the flaw to define ...

MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities

XSS remains the top software weakness, followed by SQL injection and CSRF. Buffer overflow ...