Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
qoiuebffdrhf.com Performing a basic port scan 4 4sec 488 B
memory-scanner.cc Performing a basic port scan 4 1sec 358 B RU
www.callbomberz.in Performing a basic port scan 4 2sec 491 B US
rigbyrealestate.com Normal Scan 2 5sec 462 B US
38.62.92.91 Performing a basic port scan 3 10sec 353 B US
142.251.163.26 Performing a basic port scan 1 4sec 333 B US
209.242.179.101 Performing a basic port scan 2 14sec 303 B US
209.242.179.101 Performing a basic port scan 2 15sec 303 B US
92.205.170.232 Performing a basic port scan 14 2sec 606 B DE
tinyurl.com Performing a basic port scan 4 2sec 471 B

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

The Kimwolf Botnet is Stalking Your Local Network

The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide ...

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia

The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks ...

Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks

Ryan Goldberg and Kevin Martin have admitted being affiliates of the BlackCat/Alphv ransomware ...

The ROI Problem in Attack Surface Management

Attack Surface Management (ASM) tools promise reduced risk. What they usually deliver is more ...

RondoDox Botnet Exploiting React2Shell Vulnerability

In December, the botnet’s operators focused on weaponizing the flaw to compromise vulnerable ...

Covenant Health Data Breach Impacts 478,000 Individuals

The Qilin ransomware group hacked the healthcare organization and stole data from its systems ...

Adobe ColdFusion Servers Targeted in Coordinated Campaign

GreyNoise has observed thousands of requests targeting a dozen vulnerabilities in Adobe ...

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

Cybersecurity researchers have disclosed details of a phishing campaign that involves the ...