Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
185.169.3.26 Performing a basic port scan - 30sec 296 B DE
lms.scholl-gymnasium.de Performing a basic port scan 15 5sec 679 B DE
142.250.170.144 Performing a basic port scan - 4sec 337 B US
94.114.200.103 Performing a basic port scan 1 6sec 326 B DE
google.de Performing a basic port scan 2 3sec 474 B US
tecuruapan.edu.mx Performing a basic port scan 18 5sec 768 B GB
x.com Performing a basic port scan 4 3sec 359 B US
162.120.187.80 Performing a basic port scan 1 12sec 337 B US
1.1.1.1 Performing a basic port scan 5 2sec 386 B
1.1.1.1 Performing a basic port scan 5 3sec 386 B

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA

Most phishing websites are little more than static copies of login pages for popular online ...

The 25 Most Vulnerable Passwords of 2026

Research reveals the most insecure passwords of 2026. 

NIST’s Quantum Breakthrough: Single Photons Produced on a Chip

NIST’s single photon chip will likely make QKD an option for a wider range of ...

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

Threat actors have been observed exploiting a recently disclosed critical security flaw ...

In Other News: Ransomware Shuts US Clinics, ICS Vulnerability Surge, European Parliament ...

Other noteworthy stories that might have slipped under the radar: Axonius lays off employees, ...

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

In yet another software supply chain attack, the open-source, artificial intelligence ...

Cybercrime Magazine Releases Its First YouTube Short, More On The Way

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. ...

BeyondTrust Vulnerability Exploited in Ransomware Attacks

CISA has updated its KEV entry for CVE-2026-1731 to alert organizations of exploitation in ...