Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
riffme.com Normal Scan 2 5sec 519 B US
109.228.56.59 Performing a basic port scan 6 3sec 383 B GB
37.194.8.48 Performing a basic port scan - 22sec 354 B RU
37.194.8.48 Performing a basic port scan 1 2min 40sec (160sec) 303 B RU
37.194.8.48 Performing a basic port scan - 22sec 354 B RU
85.159.27.203 Performing a basic port scan 2 5sec 309 B KZ
rightchaindell.com Normal Scan 6 5sec 559 B US
fjpsua.dyndns.org Performing a basic port scan 2 4sec 384 B ES
aegns-fe.vercel.app Performing a basic port scan 2 6sec 389 B US
94.224.60.52 Performing a basic port scan - 21sec 362 B BE

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

Threat actors have been observed weaponizing n8n, a popular artificial intelligence ...

Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

In what was Sweden’s first public mention of the attack, the country’s minister for civil ...

McGraw Hill Data Breach Caused by Salesforce Misconfiguration

McGraw Hill announced a data breach connected to a Salesforce misconfiguration.

Exploited Vulnerability Exposes Nginx Servers to Hacking

Hackers are exploiting CVE-2026-33032, a critical remote takeover vulnerability in the Nginx ...

Capsule Security Emerges From Stealth With $7 Million in Funding

The Israeli startup aims to secure AI agents at runtime, continuously monitoring their ...

‘By Design’ Flaw in MCP Could Enable Widespread AI Supply Chain Attacks

Researchers warn that a flaw in Anthropic’s Model Context Protocol allows unsanitized ...

100 Chrome Extensions Steal User Data, Create Backdoor

Published through five accounts, the extensions appear part of a coordinated campaign based on ...

CISO Conversations: Ross McKerchar, CISO at Sophos

Sophos’ Ross McKerchar discusses leadership at scale, retaining talent, defending against ...