Free Open Ports Scan (Non-Intrusive)
Run a passive, non-intrusive scan for commonly exposed ports and services.
Identify external exposure and reduce attack surface.
- Common port scan
- Non-intrusive
- Service banner hints
"Barrion's security scanning has helped us implement best security practices efficiently, saving us countless hours."
Sarah Chen
Head of Security
"We identified and fixed critical vulnerabilities before our platform launch, saving us from potential data breaches."
Marcus Anderson
CTO
"Barrion gives us peace of mind, knowing we're notified of any security issues. Exactly what our team needed."
Oskar Nilsson
Tech Lead
Scan in three simple steps
Fast, safe, non-intrusive checks with actionable results.
Start scan
Enter your URL, and click the start scan button to begin.
Scan runs
Barrion performs passive, read-only security checks with minimal site impact.
Take Action
Fix issues with step-by-step guidance and enable monitoring for continuous protection.
What this scan checks
- Web services (80, 443, 8080, 8443)
- SSH and remote access (22, 3389, 5900)
- Database services (3306, 5432, 1433, 6379, 1521, 27017, 27018, 5984)
- Email services (25, 110, 143, 993, 995)
- File sharing (21, 22, 2049)
- Modern services (Docker, WinRM, and 30+ critical ports)
- 4-tier risk categorization (Critical, High, Medium, Low)
- Dynamic scoring with risk-based point deduction
- Port-specific security recommendations
- Attack surface mapping with risk prioritization
- External accessibility testing from external perspective
- Comprehensive attack surface mapping
- Service exposure analysis with security recommendations
- Parallel scanning with proper timeouts for efficiency
Security Risks of Open Ports
- Increases potential entry points for attackers
- Exposes services that may have vulnerabilities
- Provides reconnaissance information to attackers
- Enables service-specific attack techniques
- Default credentials and weak authentication
- Outdated software versions with known exploits
- Misconfigured services and unnecessary features
- Unencrypted data transmission and storage
- Violates security best practices and standards
- May breach compliance requirements (PCI DSS, HIPAA)
- Increases audit findings and remediation costs
- Demonstrates poor security posture to stakeholders
How to reduce exposure
- Address Critical and High-risk ports first
- Follow port-specific security recommendations
- Use risk categorization to prioritize fixes
- Implement dynamic scoring to track improvements
- Implement firewall rules to block unnecessary ports
- Use network segmentation and VLAN isolation
- Configure load balancers and reverse proxies
- Implement IP whitelisting and access controls
- Disable unused services and unnecessary features
- Update software to latest secure versions
- Configure strong authentication and access controls
- Implement encryption for data in transit and at rest
Tool-specific questions
Is this port scan intrusive or harmful?
Why do some ports appear open intermittently?
Which ports are most commonly targeted by attackers?
What's the difference between open and filtered ports?
How often should I scan for open ports?
What should I do if I find unexpected open ports?
Can I use this scan for compliance auditing?
What's the best way to secure database ports?
How does the risk categorization system work?
Why Choose Barrion?
Real-Time Results
Instant security analysis with detailed reports, giving you an immediate security overview
Comprehensive Checks
Multiple best-practice security checks in a single scan, for broad coverage
Actionable and Effective
Clear recommendations for fixes, helping you improve your security quickly and effectively
Other Tools
Complete Security Scan
Complete website security analysis with comprehensive vulnerability detection
- Full security assessment
- Detailed security report
- Actionable recommendations
- Risk severity scoring
Security Headers Test
Check your website's HTTP security headers configuration
- Content Security Policy
- X-Frame-Options
- X-Content-Type-Options
- Permissions Policy
- Referrer Policy
- And more...
TLS/SSL Security Checker
Validate your SSL/TLS configuration and certificate setup
- HTTPS verification
- HSTS check
- TLS version check
- Cipher suite analysis
- Mixed content detection
Content Security Policy (CSP) Checker
Analyze your CSP for unsafe directives and strengthen your policy with best practices.
- CSP directives analysis
- Detect unsafe-inline/eval
- Nonce/Hash guidance
CORS Policy Checker
Validate Access-Control headers, credentials safety, and simulate preflight requests.
- ACAO configuration
- Preflight simulation
- Credentials safety
Cookie Security Checker
Audit HttpOnly, Secure, SameSite and Partitioned cookie attributes for safety.
- HttpOnly & Secure flags
- SameSite settings
- Partitioned cookies