Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
216.25.124.1 Performing a basic port scan 3 2sec 347 B US
www.amazon.in Performing a basic port scan 2 2sec 720 B US
104.18.34.137 Performing a basic port scan 4 1sec 351 B
csc5.online Performing a basic port scan 2 2sec 447 B US
www.creativeitinstitute.com Performing a basic port scan 14 1sec 572 B IN
facebook.com Performing a basic port scan 2 2sec 464 B IE
150.241.92.215 Performing a basic port scan 2 1sec 295 B ES
77.221.159.149 Performing a basic port scan 5 7sec 397 B RU
certifiedhacker.com Performing a basic port scan 15 3sec 644 B US
ais.co.th Performing a basic port scan 4 3sec 362 B

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Claude Code, Gemini CLI, GitHub Copilot Agents Vulnerable to Prompt Injection via Comments

A researcher has disclosed the details of the AI attack method he has named ‘Comment and ...

UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a ...

Stellar Cyber Unveils New Agentic AI Capabilities for the Human-Augmented Autonomous SOC

New automation and AI-driven triage capabilities dramatically reduce alert noise and ...

n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

Threat actors have been observed weaponizing n8n, a popular artificial intelligence ...

Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

In what was Sweden’s first public mention of the attack, the country’s minister for civil ...

McGraw Hill Data Breach Caused by Salesforce Misconfiguration

McGraw Hill announced a data breach connected to a Salesforce misconfiguration.

Exploited Vulnerability Exposes Nginx Servers to Hacking

Hackers are exploiting CVE-2026-33032, a critical remote takeover vulnerability in the Nginx ...

Capsule Security Emerges From Stealth With $7 Million in Funding

The Israeli startup aims to secure AI agents at runtime, continuously monitoring their ...