Scan Your Host's Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Domain or IP Age Scan method Ports Duration Size
filesstaticpulzo.s3.us-west-2.amazonaws.com 8 sec ago Normal Scan 3 4.55sec 591 B
resortiacommunities.com 19 sec ago Performing a basic port scan 14 0.5sec 628 B
files.vecteezy.com 24 sec ago Normal Scan 2 4.79sec 484 B
wflow.co.uk 30 sec ago Performing a basic port scan 13 2.96sec 626 B FR
files.mcgrawhill.api.onereach.ai 46 sec ago Normal Scan 2 4.56sec 515 B US
resolte.com 51 sec ago Performing a basic port scan 4 1.97sec 479 B
files.letasoft.com 1 min ago Normal Scan 11 4.32sec 632 B US
resm.eu 1 min ago Performing a basic port scan 4 2.22sec 471 B
files.axshare.com 1 min ago Normal Scan 2 5.98sec 485 B US
vaideeni.ro 1 min ago Performing a basic port scan 12 5.45sec 522 B RO

Portscanner Online By the numbers

Total Discovered Targets

21,685,892

Discovered Targets in the Last 24 Hours

9,456

Discovered Ports in the Last 24 Hours

77,045

UP Targets in the Last 24 Hours

7,867

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Useful Links

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Configuration flaw puts ServiceNow Knowledge Base articles at risk

More than 1,000 ServiceNow Knowledge Base articles were found to be misconfigured.

Hackers Deliver Popular Crypto-Miner Through Malicious Email Auto Replies, Researchers Say

Hackers are distributing a popular crypto-miner via malicious email auto-replies, as per ...

UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks

UNC1860 has been observed using victim networks as staging areas for additional operations, ...

FTC investigates video streaming and social media for data collection

A report found that companies collected and could indefinitely retain troves of data, ...

Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials

Law enforcement authorities have announced the takedown of an international criminal network ...

Acronis Backup Plugins Hit by CVE-2024-8767: CVSS 9.9 Severity Alert

Acronis Backup Plugins have been affected by a critical security flaw, CVE-2024-8767 (CVSS ...

Experts Warn of China-Linked APT's Raptor Train IoT Botnet

The attribution of the Raptor Train botnet to a Chinese nation-state actor is based on various ...

Passwordless AND Keyless: The Future of (Privileged) Access Management

In IT environments, some secrets are managed well and some fly under the radar. Here’s a ...