Scan and Detect Open Ports Online
  • Identify Open Ports
  • Detect Unusual Ports
  • Check Running Services
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method:

Recent scan history

Target Method Ports Duration Size
demo.testfire.net Performing a basic port scan 4 2sec 375 B US
171.60.208.6 Performing a basic port scan - 26sec 396 B IN
demo.testfire.net Performing a basic port scan 4 2sec 375 B US
142.251.47.110 Performing a basic port scan 2 6sec 360 B US
www.youtube.com Performing a basic port scan 2 2sec 666 B US
213.226.125.203 Performing a basic port scan 1 1sec 266 B RU
ridgewoodgreer.com Normal Scan 4 4sec 470 B US
ssccmangalore.co.in Performing a basic port scan 14 3sec 658 B SG
rightsciences.com Normal Scan 4 6sec 468 B US
demo.testfire.net Performing a basic port scan 4 2sec 375 B US

Port Scanner Online

Why portscanner.online?

Experience seamless access from any device—be it your mobile, desktop, or tablet—to effortlessly scan target information and check open ports.

Discover the simplicity of our process:

 1. Enter the target host name and await the results.
 2. Our powerful background tools initiate and swiftly check for scan results.

Unlock the power of Portscanner Online:

Effortlessly check open ports, top ports, and gather valuable soft information within your target host.

Explore Our Projects

  • Online Nikto scanner (nikto.online)
  • Online SQL injection tool (sqlmap.online)
  • Online Wordpress Security Scanner (wpscan.online)
  • Reliable Web & WordPress Hosting (localjost.com)
  • Catalog of World Data Centers (datacentercatalog.com)
  • Static application security testing for Android APK files (sast.online)
  • PENTESTON Stay secure (penteston.com)
  • Simulate DDoS Attack Online (ddosattack.online)

Latest Cybersecurity News and Articles

Explore recent news and articles on cyber security, updates on malware attacks, and related topics.

CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added eight new ...

SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

A critical security vulnerability has been disclosed in SGLang that, if successfully ...

Vercel Breach Originated from an Employee’s AI Tool

This breach occurred due to a third-party AI tool. 

Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking

Forescout researchers discovered 20 new vulnerabilities in Lantronix and Silex products and ...

58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code

A recent report by Cloudsmith found that 31% of organizations using AI-generated code spend 10 ...

⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More

Monday’s recap shows the same pattern in different places. A third-party tool becomes a way ...

British Scattered Spider Hacker Pleads Guilty in the US

Tyler Buchanan admitted in court to hacking into various companies, defrauding them, and ...