Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
rightlifepartner.com Normal Scan 11 9sec 589 B IN
rightinthemidst.com Normal Scan 12 5sec 615 B US
62.183.18.1 Performing a basic port scan 1 7sec 310 B RU
google.com Performing a basic port scan 2 9sec 478 B US
riejurider.com Normal Scan 11 2sec 606 B US
172.67.178.15 Performing a basic port scan 4 3sec 351 B US
ridinthumb.com Normal Scan 3 16sec 386 B DK
193.189.100.203 Performing a basic port scan 7 3sec 442 B SE
134.199.205.198 Performing a basic port scan 3 2sec 316 B US
rightitude.com Normal Scan 2 5sec 389 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using ...

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the ...

How to Eliminate the Technical Debt of Insecure AI-Assisted Software Development

Developers must view AI as a collaborator to be closely monitored, rather than an autonomous ...

Betashares Global Cybersecurity ETF (ASX: HACK): A Diversified Bet On The Sector

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. ...

ApolloMD Data Breach Impacts 626,000 Individuals

The company says hackers stole the personal information of patients of affiliated physicians ...

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

Threat activity this week shows one consistent signal — attackers are leaning harder on what ...

Microsoft to Enable ‘Windows Baseline Security’ With New Runtime Integrity Safeguards

Windows will have runtime safeguards enabled by default, ensuring that only properly signed ...

Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

Threat actors from Russia, China, North Korea and Iran have been observed launching ...