Network
Port Scan
Scan open ports (limited)
Input
Terminal
Console ready. Execute a command to see output...
About Port Scan
Knock on the door
Port Scanning is the art of testing which "doors" (ports) are open on a server. An open port means a service is listening and potentially vulnerable or accessible.
Common Ports
- 21 (FTP): File Transfer (Insecure).
- 22 (SSH): Secure Shell access.
- 80/443 (HTTP/HTTPS): Web Servers.
- 3306 (MySQL): Database access (Should usually be closed to the public!).
⚠️ Danger Zone
Running port scans on servers you do not own is often considered a hostile act.
- ISP Bans: Many ISPs and cloud providers (AWS, DigitalOcean) detect active scanning and will null-route your IP instantly.
- Legal Action: In some jurisdictions, unauthorized scanning is classified as a cyber-attack precursor.
- Honeypots: You might hit a "trap" server designed to flag your IP in global blocklists, ruining your reputation across the web.
How to use Port Scan
- Enter the targetDomain or IPv4. We resolve the domain to an IP once and scan that IP.
- List the portsComma-separated, max 10 entries. Examples:
22, 80, 443for a typical web host, or3306, 5432, 6379for common databases. - Run the scanHit Scan Ports. Each port comes back as OPEN, closed, or filtered, with a service-name guess based on the port number.
- Follow up on OPEN portsFor 80 or 443 use HTTP Headers to inspect the web service. For 443 also try SSL Checker to validate the TLS configuration.
Frequently Asked Questions
- Three common cases: verifying a firewall rule (is 22 actually closed from outside?), confirming a self-hosted service is reachable from the public internet, or sanity-checking that a deployment exposed exactly what you intended. Scanning servers you don't own is a different conversation, see the next question.