Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
rightlineenv.com Normal Scan 2 7sec 457 B US
champtest1.com Performing a basic port scan 4 3sec 485 B
islamicex.com Performing a basic port scan 4 1sec 514 B US
188.130.206.90 Performing a basic port scan 4 1sec 340 B ES
88.19.251.245 Performing a basic port scan 1 5sec 315 B ES
173.254.28.237 Performing a basic port scan 15 593 B US
153.19.161.243 Performing a basic port scan 3 11sec 321 B PL
45.32.246.153 Performing a basic port scan 1 7sec 309 B AU
x.com Performing a basic port scan 4 2sec 361 B
14.177.65.11 Performing a basic port scan - 2sec 332 B VN

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

A high-severity security flaw in the TrueConf client video conferencing software has been ...

Censys Raises $70 Million for Internet Intelligence Platform

The latest funding round brings the total venture capital investment in Censys to $149 ...

The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust

Data integrity shouldn’t be seen only through the prism of a technical concern but also as a ...

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Report shows how industrialized credential theft underpins ransomware, SaaS breaches, and ...

Venom Stealer Raises Stakes With Continuous Credential Harvesting

Licensed malware with built-in persistence and automation enables attackers to continuously ...

TeamPCP Moves From OSS to AWS Environments

After validating stolen credentials using TruffleHog, the hacking group started AWS services ...

CrewAI Vulnerabilities Expose Devices to Hacking

Attackers can exploit the bugs through prompt injection, chaining them together to escape the ...

Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts

Cybersecurity researchers have disclosed a security "blind spot" in Google Cloud's Vertex AI ...