Port Scanner

Free online port scanner tool for network security testing and diagnostics. Scan common ports, well-known ports, or custom port ranges. Check open, closed, and filtered ports for any host. Perfect for network administrators and security professionals.

Enter a domain name or IP address to scan. Only scan hosts you own or have permission to test.

Port Scanner - Online Network Port Scanning Tool

A powerful port scanner tool for network security testing and diagnostics. Scan common ports, well-known services, or custom port ranges to identify open, closed, and filtered ports on any host. Essential for network administrators, security professionals, and penetration testers.

What is a Port Scanner?

A port scanner is a security tool that probes a server or host for open ports. It helps identify:

- Which network services are running
- Potential security vulnerabilities
- Firewall configurations
- Network connectivity issues

Port scanning is essential for:
- Network security auditing
- Penetration testing
- System administration
- Troubleshooting network issues

Port scanners work by sending packets to specific ports and analyzing the responses to determine if ports are open, closed, or filtered.

How to use this Port Scanner?

Using the Port Scanner:

1. Enter Target:
- Enter hostname (e.g., example.com)
- Or IP address (e.g., 192.168.1.1)

2. Choose Scan Mode:
- Common Ports: Scans 22 most common ports (HTTP, HTTPS, SSH, FTP, etc.)
- Well-Known Ports: Scans important well-known service ports
- Custom Ports: Specify your own ports (e.g., 80,443 or 1-1000)

3. Start Scan:
- Click 'Start Scan'
- Watch real-time progress
- Review results showing open/closed/filtered ports

4. Interpret Results:
- Open: Service is accessible
- Closed: Port is closed
- Filtered: Port may be behind firewall

IMPORTANT: Only scan hosts you own or have explicit permission to test. Unauthorized port scanning may be illegal.

What do Open, Closed, and Filtered ports mean?

Port Status Meanings:

OPEN:
- A service is actively listening on this port
- The port accepts connections
- Examples: Web server on port 80, SSH on port 22
- Security implication: Potential entry point

CLOSED:
- No service is listening on this port
- The port actively refuses connections
- The host is reachable but service is not running
- Security implication: Generally safe

FILTERED:
- Cannot determine if port is open or closed
- Usually blocked by firewall
- Packets are dropped without response
- Security implication: Good firewall practice

Note: Due to browser security restrictions, this tool may have limited accuracy compared to native tools like Nmap. Results should be verified with dedicated security tools.

What are Common Ports?

Common ports are frequently used network service ports:

Web Services:
- 80: HTTP (Websites)
- 443: HTTPS (Secure websites)
- 8080: HTTP Proxy/Alternative
- 8443: HTTPS Alternative

Email:
- 25: SMTP (Sending mail)
- 110: POP3 (Receiving mail)
- 143: IMAP (Mail access)
- 587: SMTP Submission
- 993: IMAPS (Secure IMAP)
- 995: POP3S (Secure POP3)

File Transfer:
- 20, 21: FTP (File transfer)
- 22: SSH/SFTP (Secure file transfer)

Databases:
- 3306: MySQL
- 5432: PostgreSQL
- 27017: MongoDB
- 6379: Redis

Remote Access:
- 22: SSH (Secure shell)
- 23: Telnet (Insecure - avoid)
- 3389: RDP (Remote Desktop)
- 5900: VNC (Remote desktop)

Other:
- 53: DNS (Domain name system)

These ports are commonly targeted by attackers, so they should be secured and monitored.

Is Port Scanning Legal?

Legal Considerations:

LEGAL USE:
- Scanning your own systems and networks
- Authorized security testing with written permission
- Testing systems you administer
- Penetration testing with proper authorization
- Security research on your infrastructure

ILLEGAL USE:
- Scanning systems without permission
- Unauthorized network reconnaissance
- Attempting to find vulnerabilities to exploit
- Commercial scanning without consent

Best Practices:
1. Always get written authorization
2. Only scan systems you own or have permission to test
3. Follow responsible disclosure practices
4. Document your authorization
5. Comply with local laws and regulations

Unauthorized port scanning can be considered:
- Computer intrusion
- Unauthorized access attempt
- Network trespassing

Penalties may include fines and imprisonment. Always ensure you have proper authorization before scanning any network or system.

Browser vs Native Port Scanners

Limitations of Browser-Based Port Scanners:

Browser Limitations:
- CORS (Cross-Origin Resource Sharing) restrictions
- Cannot directly open TCP connections
- Limited to HTTP/HTTPS protocols
- Slower than native tools
- Less accurate results
- Cannot perform stealth scans
- Limited port range (avoid overwhelming browser)

Advantages:
- No installation required
- Cross-platform compatibility
- Quick basic checks
- User-friendly interface
- Good for initial reconnaissance

Native Tools (Nmap, etc.):
- Direct TCP/UDP connection control
- Advanced scan techniques (SYN, ACK, etc.)
- Stealth scanning capabilities
- OS detection
- Service version detection
- Script scanning (NSE)
- Much faster
- More accurate

Recommendation:
Use this browser tool for:
- Quick checks
- Basic diagnostics
- Learning about ports
- Initial reconnaissance

Use native tools (Nmap, Masscan) for:
- Professional security testing
- Comprehensive network audits
- Penetration testing
- Production security scanning

Key Features

  • Scan common ports (22 most used)
  • Scan well-known service ports
  • Custom port ranges and lists
  • Real-time scan progress
  • Identify open, closed, and filtered ports
  • Service name identification
  • Port statistics and summary
  • Support for domains and IP addresses
  • IPv4 support
  • Stop scan anytime
  • Fast sequential scanning
  • No installation required
  • Free to use
  • Mobile-friendly design
  • Dark mode support

⚠️ Important Legal Disclaimer

This port scanner is provided for DEFENSIVE SECURITY purposes only:

✓ AUTHORIZED USE:
- Testing your own systems
- Security auditing with written permission
- Authorized penetration testing
- Network troubleshooting on your infrastructure

✗ UNAUTHORIZED USE IS ILLEGAL:
- Scanning systems without permission
- Attempting unauthorized access
- Network reconnaissance without consent

By using this tool, you agree that:
1. You will only scan systems you own or have explicit written permission to test
2. You understand that unauthorized port scanning may violate laws including the Computer Fraud and Abuse Act (CFAA) in the US and similar laws worldwide
3. You are solely responsible for ensuring your use complies with all applicable laws
4. The tool provider is not liable for any misuse of this tool

Always obtain proper authorization before scanning any network or system. Unauthorized scanning may result in legal consequences including fines and imprisonment.