Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
108.138.217.116 Performing a basic port scan 2 5sec 345 B US
203.133.248.108 Performing a basic port scan 8 2sec 485 B JP
ford.com Performing a basic port scan 2 4sec 435 B US
instagram.com Performing a basic port scan 2 2sec 465 B IE
conservativedailypost.com Performing a basic port scan 4 2sec 505 B
anchornet.ca Performing a basic port scan 4 6sec 434 B US
40.117.224.221 Performing a basic port scan 2 5sec 299 B US
dermaglowcle.com rDNS record 2 7sec 457 B US
moe.gov.et Performing a basic port scan 2 6sec 308 B ET
99.235.248.66 Performing a basic port scan - 10sec 391 B CA

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Tycoon 2FA Phishing Platform Dismantled in Global Takedown

The phishing-as-a-service platform was used to send fraudulent emails to over 500,000 ...

New LexisNexis Data Breach Confirmed After Hackers Leak Files

The hackers claim to have stolen 2GB of files, including 400,000 personal information ...

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following ...

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

What to expect as the conflict between the United States and Iran unfolds. 

Zurich Acquires Beazley in $11 Billion Deal to Lead Cyberinsurance

The deal awaits final shareholder and regulatory approvals and is expected to be completed in ...

Hacker Conversations: Inti De Ceukelaire, Raging Against the Machine Creatively

A Belgian national, De Ceukelaire’ did not set out to be a hacker. Like many hackers he was ...

Examining North Korea’s Cybercrime Economy

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. ...

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) ...