Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
18.97.36.52 Performing a basic port scan 1 2sec 317 B US
nutri-vee-flow.base44.app Performing a basic port scan 4 5sec 452 B US
217.118.181.150 Performing a basic port scan - 20sec 364 B RU
rightfaxreseller.com Normal Scan 2 9sec 465 B US
cablingwizards.com Performing a basic port scan 4 2sec 493 B
95.91.144.212 Performing a basic port scan - 18sec 382 B DE
rielajapan.com Normal Scan 6 11sec 552 B US
216.198.79.65 Performing a basic port scan 2 2sec 298 B US
212.6.168.31 Performing a basic port scan 3 6sec 344 B DE
109.133.196.120 Performing a basic port scan - 25sec 388 B BE

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

Cybersecurity researchers have warned of an active malicious campaign that's targeting the ...

Government Can’t Win the Cyber War Without the Private Sector

Securing national resilience now depends on faster, deeper partnerships with the private ...

What Are Security Experts Saying About OpenAI’s GPT-5.4-Cyber?

OpenAI has launched GPT-5.4-Cyber, a model optimized for defensive cybersecurity usage. 

OpenAI Widens Access to Cybersecurity Model After Anthropic’s Mythos Reveal

GPT‑5.4‑Cyber is a model fine-tuned for defenders, lowering boundaries for legitimate ...

ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 ...

You know that feeling when you open your feed on a Thursday morning and it's just... a lot? ...

Data Breach at Tennessee Hospital Affects 337,000

Cookeville Regional Medical Center was targeted last year by the Rhysida ransomware group, ...

Artemis Emerges From Stealth With $70 Million in Funding

The startup is leveraging AI to prevent AI-powered attacks across applications, users, ...

[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment

In 2024, compromised service accounts and forgotten API keys were behind 68% of cloud ...