Check which ports are open on a server. Scans 40 common ports including HTTP, HTTPS, SSH, SMTP, FTP, databases (MySQL, Postgres, MongoDB, Redis, Elasticsearch), RDP, Docker API, and more. Flags risky open ports that shouldn't be publicly accessible. Add up to 10 custom ports to extend the scan.
We check the 20 most common ports that reveal how a server is configured and whether risky services are exposed.
File transfer — should not be public
Secure shell access
Email sending
Domain name resolution
Web traffic (unencrypted)
Web traffic (encrypted)
Email submission
Database — never expose publicly
Database — never expose publicly
Remote desktop — major attack target
Cache — often misconfigured open
Database — frequent breach source
Web servers should have HTTP (80) and HTTPS (443) open. This is normal. If only 80 is open without 443, there's no HTTPS — that's a problem.
If the server handles email, SMTP ports should be open. If they're not a mail server and these are open, it might be an open relay.
Database and cache ports should NEVER be publicly accessible. If these are open, anyone on the internet can attempt to connect to your database.
Remote Desktop Protocol is the #1 target for ransomware attacks. If this is open, you're exposed to brute-force attacks. Use a VPN instead.
The checks 350+ things across email, DNS, SSL, performance, SEO, accessibility, privacy, and mobile.
Run