Scan servers and IP addresses for open TCP ports
A port scanner probes a server or host for open TCP ports. Each port corresponds to a specific service - for example, port 80 is used for HTTP web traffic, and port 22 is used for SSH.
Only scan servers and systems you own or have explicit permission to scan. Unauthorized port scanning may violate computer crime laws in your jurisdiction.
A port scan checks which network ports on a server are open, closed, or filtered. Open ports accept connections and run services (like port 80 for HTTP or 443 for HTTPS). This helps identify available services and potential security vulnerabilities.
Scanning your own servers and networks is legal and a standard security practice. Scanning others' systems without permission may violate computer fraud laws in many jurisdictions. Always ensure you have authorization before scanning any system you don't own.
The most commonly checked ports are: 80 (HTTP), 443 (HTTPS), 22 (SSH), 21 (FTP), 25 (SMTP), 3306 (MySQL), 3389 (RDP), and 8080 (HTTP alternate). Our tool scans the most important ports by default.
A filtered port means a firewall or security device is blocking the probe, so the scanner cannot determine if the port is open or closed. This is generally a good security practice as it hides services from unauthorized scanners.
More Tools