Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
amail.az Performing a basic port scan 9 5sec 449 B AZ
rightcounselor.com Normal Scan 2 5sec 391 B US
142.251.163.26 Performing a basic port scan 1 4sec 333 B US
181.30.1.45 Performing a basic port scan 1 5sec 306 B AR
google.com Performing a basic port scan 2 2sec 476 B US
google.com Performing a basic port scan 2 2sec 476 B US
google.com Performing a basic port scan 2 2sec 475 B US
google.com Performing a basic port scan 2 2sec 475 B US
google.com Performing a basic port scan 2 2sec 475 B US
sso.von-poll.com Performing a basic port scan 2 5sec 773 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Lema AI Emerges From Stealth With $24 Million to Tackle Third-Party Risk 

The funding was raised over Series A and seed funding rounds for its supply chain security ...

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

The Cyber Security Agency (CSA) of Singapore on Monday revealed that the China-nexus cyber ...

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat ...

Ransomware Groups May Pivot Back to Encryption as Data Theft Tactics Falter

As only data exfiltration for extortion no longer delivers ROI, ransomware gangs may ...

Outtake Raises $40 Million to Bolster Digital Trust Against AI-Driven Threats

The Series B funding round brings the cybersecurity startup’s total raised to $60 ...

TV Show “Scam Interceptors”: The Intersection Of Ethical Hacking And Investigative ...

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. ...

Cybersecurity M&A Roundup: 34 Deals Announced in January 2026

Significant cybersecurity M&A deals announced by CrowdStrike, Infoblox, JumpCloud, ...

⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

Cyber threats are no longer coming from just malware or exploits. They’re showing up inside ...