Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
162.213.255.16 Performing a basic port scan 12 4sec 531 B US
iometering.co.za Performing a basic port scan 11 9sec 548 B ZA
www.kimiafarma.co.id Performing a basic port scan 9 6sec 549 B ID
aliciakennedy.news Performing a basic port scan 4 3sec 372 B
right-movers.com Normal Scan 2 7sec 457 B US
62.204.45.182 Performing a basic port scan 1 10sec 285 B NL
37.140.217.190 Performing a basic port scan 2 3sec 297 B PL
rifecar.com Normal Scan 16 667 B US
maintenance-informatique-et-reseaux.com Performing a basic port scan 2 1sec 477 B FR
82.15.86.240 Performing a basic port scan - 20sec 410 B GB

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

Cybersecurity researchers have disclosed details of a new banking malware targeting Brazilian ...

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

Cybersecurity researchers have disclosed details of a suspected artificial intelligence ...

Apple Updates Legacy iOS Versions to Patch Coruna Exploits

The company has released iOS and iPadOS versions 16.7.15 and 15.8.7 to patch the ...

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs

Phishing has quietly turned into one of the hardest enterprise threats to expose early. ...

Meta Launches New Protection Tools as It Helps Disrupt Scam Centers

The social media giant has disabled more than 150,000 accounts powering scam centers in ...

ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack ...

Another Thursday, another pile of weird security stuff that somehow happened in just seven ...

Backstory Of East Coast Hang Out (ECHO), The First Social Network Launched In 1989

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Mar. ...

Ally WordPress Plugin Flaw Exposes Over 200,000 Websites to Attacks

The issue allows attackers to inject SQL queries and extract sensitive information from the ...