Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
77.222.40.251 Performing a basic port scan 5 5sec 365 B RU
righteousjourney.com Normal Scan 2 5sec 465 B US
wegmans.com Performing a basic port scan 2 2sec 310 B US
95.167.11.182 Performing a basic port scan 8 13sec 432 B RU
rightpricepainters.com Normal Scan 2 6sec 471 B US
5.135.151.51 Performing a basic port scan 3 1sec 336 B FR
216.150.1.193 Performing a basic port scan 2 2sec 298 B CA
47.93.120.169 Performing a basic port scan 4 4sec 351 B CN
104.26.15.248 Performing a basic port scan 4 1sec 351 B
172.67.158.195 Performing a basic port scan 4 2sec 353 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that ...

Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates

A new Android backdoor that's embedded deep into the device firmware can silently harvest data ...

VulnCheck Raises $25 Million in Series B Funding to Scale Vulnerability Intelligence

The latest funding round was led by Sorenson Capital and brings the total investment to $45 ...

Hackers Offer to Sell Millions of Eurail User Records

Eurail has confirmed that the stolen data is up for sale, but it’s still trying to determine ...

Cyber Insights 2026: The Ongoing Fight to Secure Industrial Control Systems

As nation-state actors, ransomware groups, and aging infrastructure collide, organizations ...

API Threats Grow in Scale as AI Expands the Blast Radius

New research shows attackers increasingly abusing APIs at machine speed as AI-driven systems ...

Ransom Man: A Shocking Data Breach At A Psychotherapy Service. Jenny Kleeman Investigates.

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Feb. ...

Man Linked to Phobos Ransomware Arrested in Poland

Polish police said they found evidence of cybercrime on the 47-year-old suspect’s ...