Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
45.235.98.120 Performing a basic port scan 4 5sec 357 B AR
62.176.113.202 Performing a basic port scan - 12sec 356 B BG
62.176.113.202 Performing a basic port scan - 12sec 356 B BG
gombuless.com Performing a basic port scan 6 410 B AZ
apicheck.qalxanvpn.com Performing a basic port scan 3 1sec 333 B AZ
www.vu.edu.pk Performing a basic port scan 17 5sec 727 B PK
instagram.com Performing a basic port scan 2 2sec 461 B SE
217.160.0.92 Performing a basic port scan 2 2sec 368 B DE
188.212.135.54 Performing a basic port scan - 10sec 301 B PL
109.195.202.231 Performing a basic port scan 2 29sec 323 B RU

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

Chinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude Mythos

360 Digital Security Group claims to have uncovered 1,000 vulnerabilities using AI, including ...

Keeper Security: The Identity Security Platform For Humans, Machines, And AI Agents

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Apr. ...

[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed

Imagine a world where hackers don't sleep, don't take breaks, and find weak spots in your ...

Executive Summary: Defending against China-nexus covert networks of compromised devices

Organisations should map and baseline their edge device traffic, especially VPN and remote ...

International cyber agencies share fresh advice to defend against China-linked covert networks

New advisory highlights how to defend against attacker tactics believed to be used by ...

Defending against China-nexus covert networks of compromised devices

Explaining the widespread shift in tactics, techniques and procedures (TTPs) towards networks ...

NCSC: Leave passwords in the past - passkeys are the future

Passkeys are the more secure and user-friendly login method and should be the default ...

Rilian Raises $17.5 Million for AI-Native Security Orchestration

The company will hire new talent and expand operations across the US and other allied ...