Port Scan

Scan open ports (limited)

Input

• Maximum 10 ports per scan

• Maximum 1 scan per 15 seconds

• Private IP addresses are blocked

• Suspicious activity is monitored

Rapidly scan a host for open TCP ports. Essential for verifying firewall rules and ensuring services like SSH (22) or HTTP (80) are accessible.

Terminal

Console ready. Execute a command to see output...

About Port Scan

Knock on the door

Port Scanning is the art of testing which "doors" (ports) are open on a server. An open port means a service is listening and potentially vulnerable or accessible.

Common Ports

  • 21 (FTP): File Transfer (Insecure).
  • 22 (SSH): Secure Shell access.
  • 80/443 (HTTP/HTTPS): Web Servers.
  • 3306 (MySQL): Database access (Should usually be closed to the public!).

⚠️ Danger Zone

Running port scans on servers you do not own is often considered a hostile act.

  • ISP Bans: Many ISPs and cloud providers (AWS, DigitalOcean) detect active scanning and will null-route your IP instantly.
  • Legal Action: In some jurisdictions, unauthorized scanning is classified as a cyber-attack precursor.
  • Honeypots: You might hit a "trap" server designed to flag your IP in global blocklists, ruining your reputation across the web.

How to use Port Scan

  1. Enter the target
    Domain or IPv4. We resolve the domain to an IP once and scan that IP.
  2. List the ports
    Comma-separated, max 10 entries. Examples: 22, 80, 443 for a typical web host, or 3306, 5432, 6379 for common databases.
  3. Run the scan
    Hit Scan Ports. Each port comes back as OPEN, closed, or filtered, with a service-name guess based on the port number.
  4. Follow up on OPEN ports
    For 80 or 443 use HTTP Headers to inspect the web service. For 443 also try SSL Checker to validate the TLS configuration.

Frequently Asked Questions

Three common cases: verifying a firewall rule (is 22 actually closed from outside?), confirming a self-hosted service is reachable from the public internet, or sanity-checking that a deployment exposed exactly what you intended. Scanning servers you don't own is a different conversation, see the next question.