Authorized use only. Only scan IP addresses and domains you own or have explicit written permission to test. Unauthorized port scanning may violate computer crime laws and hosting provider terms of service.
Must be your own IP address or an authorized target
Common ports
Single port
Custom range
Select ports to scan (or scan all):
Maximum range: 200 ports per scan
Scanning… 0 / 0
0 Open 0 Closed 0 Filtered
PortServiceStatusResponse

What is a common port scan used for in penetration testing?

In authorized penetration testing engagements, port scanning is the reconnaissance phase — identifying all exposed services before testing each for vulnerabilities. A clean port scan with only expected ports open indicates a well-hardened server.

How do I close an open port I didn't intend to expose?

Stop the application listening on that port (or configure it to listen only on localhost/127.0.0.1), then verify your firewall blocks that port from external access. Re-run the port scan to confirm closure.

Can firewalls hide open ports from port scanners?

Yes. Firewalls configured to silently drop (rather than reject) probe packets cause ports to appear as “filtered” — giving no information about whether a service is actually running behind them. This is a security best practice for sensitive services.