Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
polymagnet.amtc.ru Performing a basic port scan 6 7sec 466 B RU
179.43.146.226 Performing a basic port scan 2 2sec 322 B CH
osintframework.com Performing a basic port scan 4 2sec 493 B US
8.8.8.8 Performing a basic port scan 2 2sec 343 B US
34.107.221.82 Performing a basic port scan 2 2sec 338 B US
193.32.249.132 Performing a basic port scan - 18sec 300 B NL
8.8.8.8 Performing a basic port scan 2 1sec 343 B US
8.8.8.8 Performing a basic port scan 2 1sec 343 B US
89.125.66.187 Performing a basic port scan 3 8sec 352 B IE
righteousclaimsolutions.com Normal Scan 2 5sec 481 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

White House Seeks to Slash CISA Funding by $707 Million

The Trump administration says the FY2027 budget refocuses CISA on its core mission: protecting ...

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

A China-based threat actor known for deploying Medusa ransomware has been linked to the ...

Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack

The high-end casino and hotel operator has likely paid a ransom to avoid a data leak. The post ...

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source ...

Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations

An Iran-nexus threat actor is suspected to be behind a password-spraying campaign ...

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

Threat actors likely associated with the Democratic People's Republic of Korea (DPRK) ...

Google DeepMind Researchers Map Web Attacks Against AI Agents

Malicious web content can be used to manipulate, deceive, and exploit autonomous AI agents ...