Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
righteouskingdomclothing.com Normal Scan 2 9sec 481 B US
sistema.amtsalta.gob.ar Performing a basic port scan 9 9sec 571 B AR
rightpricehonda.com Normal Scan 1 5sec 443 B US
50.203.251.1 Performing a basic port scan 1 264 B US
www.instagram.com Performing a basic port scan 2 2sec 473 B IE
102.213.48.202 Performing a basic port scan 2 1sec 296 B KE
103.211.203.70 Performing a basic port scan 14 7sec 569 B
riftporn.com Normal Scan 2 6sec 523 B US
right-of-the-dot.com Normal Scan 2 6sec 464 B US
212.164.11.184 Performing a basic port scan - 31sec 300 B RU

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Poland Faced a Surge in Cyberattacks in 2025, Including a Major Assault on the Energy Sector

The attacks included a destructive infiltration of Poland's energy system in December and was ...

Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR

A large-scale malvertising campaign active since January 2026 has been observed targeting ...

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

An ongoing phishing campaign is targeting French-speaking corporate environments with fake ...

RSAC 2026 Conference Announcements Summary (Day 1)

A summary of the announcements made by vendors on the first day of the RSAC 2026 ...

Extortion Group Claims It Hacked AstraZeneca

The Lapsus$ hackers allegedly compromised internal code repositories, credentials, and ...

Chrome 146 Update Patches High-Severity Vulnerabilities

The software refresh fixes eight memory safety bugs affecting seven Chrome components. The ...

The Global CISO Landscape: A Leadership Gap Too Large To Ignore

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. ...

Webinar Today: Putting CIS Controls and Benchmarks into Practice

Learn how the CIS Critical Security Controls and the CIS Benchmarks can be used together to ...