Online Port Scanner

Check if specific ports are open on any host. Free, fast, and secure.

What is Port Scanning?

Port scanning is a technique used to identify open ports and services available on a networked host. Every device connected to the internet communicates through numbered portsโ€”there are 65,535 available TCP ports on each host. A port scanner sends requests to these ports and analyzes the responses to determine whether a port is open (accepting connections), closed (reachable but not listening), or filtered (blocked by a firewall).

Network administrators and security professionals use port scanning to audit their own systems, verify firewall rules, and discover unintended services that might pose security risks. Our online port scanner makes this easyโ€”just enter a host and select the ports you want to check.

Common Ports and Their Services

Port Service Description
21FTPFile Transfer Protocol โ€” used for transferring files between systems
22SSHSecure Shell โ€” encrypted remote access and command execution
25SMTPSimple Mail Transfer Protocol โ€” sending email between servers
53DNSDomain Name System โ€” resolves domain names to IP addresses
80HTTPHypertext Transfer Protocol โ€” standard web traffic
110POP3Post Office Protocol v3 โ€” retrieving email from a server
143IMAPInternet Message Access Protocol โ€” managing email on a server
443HTTPSHTTP Secure โ€” encrypted web traffic via TLS/SSL
3306MySQLMySQL database server connections
3389RDPRemote Desktop Protocol โ€” Windows remote desktop access
5432PostgreSQLPostgreSQL database server connections
8080HTTP-AltAlternative HTTP port โ€” often used for proxies and development

Why Check Open Ports?

๐Ÿ”’

Security Auditing

Identify unexpected open ports that could be exploited by attackers. Regularly scanning your own servers helps you maintain a strong security posture and verify that only intended services are exposed.

๐Ÿ› ๏ธ

Troubleshooting Connectivity

When a service isn't responding, a port scan quickly tells you whether the port is open, closed, or filteredโ€”helping you pinpoint whether the issue is with the application, firewall, or network.

๐Ÿ”ฅ

Firewall Verification

After configuring firewall rules, use a port scan to confirm they are working as expected. Ensure blocked ports are truly closed and permitted ports are accessible from the outside.

๐Ÿ“Š

Network Inventory

Discover what services are running across your infrastructure. Port scanning helps you build an accurate inventory of active services and detect unauthorized applications.