Port scan

Port scanning monitoring

Open ports you didn't know about are how breaches happen. Redis exposed without authentication. MongoDB accessible from the internet. A forgotten SSH port on a development server.

Most teams discover exposed ports through security incidents, not monitoring. We scan your servers hourly and alert you immediately when reality doesn't match your expectations.

Start monitoring

10 day free trial
No credit card required

Port scan list
01

The nightmare scenarios we prevent

Exposed services, breached data, compliance failures

Team A exposes Redis or MongoDB without authentication - Team B assumed it was internal only. By the time anyone notices, attackers have already extracted your data. These services have no authentication by default, and a single misconfigured firewall rule exposes everything.

Forgotten SSH access on temporary servers left running for months. That "quick test server" from six months ago is still accessible, with weak credentials, running outdated software. It's an open door into your infrastructure.

Database ports open after firewall misconfiguration or cloud migration. A single change to your security groups accidentally exposes MySQL, PostgreSQL, or Redis to the entire internet. Without monitoring, you won't know until it's too late.

We check your servers hourly for unexpected open ports. Define which ports should be open and which must stay closed - we'll notify you the moment something changes.

Common exposed services
Redis (6379) - No auth by default
MongoDB (27017) - Often misconfigured
MySQL (3306) - Database exposed
RDP (3389) - Remote desktop access
Firewall config
02

Stop finding out from attackers

Continuous monitoring beats occasional audits

Manual port scans require remembering to run them. Most teams only think about port security during quarterly reviews, penetration tests, or after an incident. By then, exposed services may have been accessible for weeks or months.

Annual penetration tests miss changes in between. Infrastructure changes constantly - new servers, updated firewall rules, cloud migrations. A yearly pentest catches vulnerabilities at a single point in time, not the 364 other days.

We check every hour from multiple locations. Issues caught in hours, not months. No infrastructure to maintain, no commands to remember, no schedules to manage. Just continuous visibility into your attack surface.

When an unexpected port opens or an expected service goes down, you'll know immediately - not when a security researcher or attacker tells you.

Shield Oh Dear
03

Define your security baseline

Tell us what's expected, we'll alert on deviations

Specify which ports SHOULD be open. For a web server, that's typically port 80 (HTTP) and 443 (HTTPS). For an email server, add 25, 587, and 993. We automatically detect your web ports and start monitoring them.

Specify which ports MUST be closed. Database ports (MySQL 3306, PostgreSQL 5432, MongoDB 27017), cache servers (Redis 6379, Memcached 11211), and remote access (SSH 22, RDP 3389) should typically not be accessible from the public internet.

Smart defaults for common scenarios. We know which ports are security-sensitive and suggest them for monitoring. Start with our recommendations, then customize based on your specific infrastructure needs.

Per-server configuration. A web server has different requirements than a database server or a jump box. Configure each server's expected state independently.

04

Choose how we let you know

when a port state changes unexpectedly

Receive our notifications on your preferred platform. Via email, SMS, Slack, Discord, Opsgenie, Microsoft Teams, Pushover, webhooks,… we can notify you wherever your team is active.

Take notifications to the next level: only notify who needs notifying by assigning responsibilities to different team members.

Certification
05

Compliance made continuous

Meet PCI-DSS, SOC 2, ISO 27001 requirements

PCI-DSS Requirement 11.3.2 requires regular external vulnerability scans. Port scanning is a fundamental part of vulnerability assessment. Continuous monitoring exceeds the quarterly minimum requirement.

SOC 2 requires continuous security monitoring and evidence of vulnerability management. Automated port scanning with alerting provides audit trail evidence that your organization actively monitors for security gaps.

ISO 27001 requires organizations to implement vulnerability management processes. Port monitoring demonstrates proactive identification of potential security weaknesses.

Audit-ready evidence. Our monitoring logs and alerts provide documentation for compliance audits, showing consistent security monitoring across your infrastructure.

Port scanning target audience
06

Who needs port scanning?

Anyone running servers they can't afford to expose

DevOps teams managing cloud infrastructure where security groups, firewall rules, and network configurations change frequently. One misconfiguration can expose entire clusters.

Security teams maintaining compliance who need continuous evidence of vulnerability monitoring for audits and certifications.

Agencies managing client servers who are responsible for client infrastructure security. Your reputation depends on keeping client systems secure.

Companies after security incidents who need to ensure vulnerabilities don't reappear. After a breach, continuous monitoring catches regression.

Anyone with databases, cache servers, or remote access that should never be accessible from the public internet. One exposed Redis instance can compromise everything.

Stop worrying, start monitoring

Start a no-strings-attached 10-day free trial. You're all set in less than a minute.
(No credit card needed.)

Not convinced yet? Need help?
Get in touch via [email protected].

How it works

Lightweight, continuous, from known IP addresses

1

Lightweight TCP connection checks

We attempt to establish TCP connections to your specified ports. No full vulnerability scan or service fingerprinting - just clean, fast detection of whether a port accepts connections.

2

Hourly checks from known IP addresses

Our scanning IPs are published at /used-ips. You can identify our requests in logs and firewall rules. No need to whitelist us - we check what the public internet can see.

3

Two-failure threshold prevents false alarms

Network glitches happen. We only alert after two consecutive failures, reducing noise while still catching real issues quickly.

4

IPv4 and IPv6, domains and IP addresses

Monitor your infrastructure however you address it. We support both IP versions and can resolve domains to check all associated addresses.

Really into the nitty gritty details?

Want to get into the nitty gritty details of our monitoring?
Have a look at our documentation.

Wait, there's even more

ssl shield

Continuous certificate monitoring

SSL certificates are essential in website security. We check all your certificate expiration dates & alert any change we detect.

Explore continuous certificate monitoring

Performance monitoring

We provide highly detailed performance monitoring and insights. We'll notify you as soon as we detect your website is getting slow.

Explore performance monitoring

Fast and insightful notifications

Get notified instantly as soon as we detect an issue or an important change. Enable any channel you use, you're in full control.

Explore fast and insightful notifications

Scheduled task monitoring

Your cron jobs (Linux) and scheduled tasks (Windows) are the heart of your data processing. We can monitor every single one of them.

Explore scheduled task monitoring
Broken links detection interface base view Broken links detection interface showing error details Broken links detection interface showing additional errors

Broken page & mixed content

We crawl and index your entire website, just like Google. As soon as we detect a broken link on your site we will let you know.

Explore broken page & mixed content
dns dropwdown

DNS record monitoring

Receive a notification whenever your DNS records are modified - intentionally or maliciously - so you can act and verify faster.

Explore dns record monitoring
DISK SPACE
api
screen
arrow 1 arrow 2
arrow 3 arrow 4
REQUEST QUEUE
server

Application health monitoring

A lot can go wrong inside your app and server. Disk space may fill up, or the database may go down. We'll notify you when something is off.

Explore application health monitoring
takeaway.com
takeaway.com logo
Today
No incidents on this day

Beautiful public status pages

In times of crisis, a public status page allows you to communicate to your clients. We'll host your status page so it's always available.

Explore beautiful public status pages
Monitor
Performance
Uptime
Certificate
laravel.com logolaravel.com
272ms
Up
Ok
ign.com logoign.com
272ms
Up
Ok
takeaway.com logotakeaway.com
272ms
Up
Ok

Website uptime monitoring

When your website goes down we'll let you know instantly. Now you can act before your or your client's brand reputation takes a hit.

Explore website uptime monitoring
⚠️ Domain expired / transfer allowed
takeaway.com

Domain monitoring

We can check how long your domain is still registered. If your renewal date is close, we'll notify you. This will avoid you losing your domain.

Explore domain monitoring
Lighthouse

Lighthouse SEO monitoring

We track the speed & performance of your website over time. If we detect your website is suddenly slower, we'll let you know.

Explore lighthouse seo monitoring
Sitemap

Sitemap monitoring

Elevate your SEO strategy and optimize your site. We analyse your sitemap health and check every URL for broken links.

Explore sitemap monitoring

Describe what you want to monitor

AI monitoring

Use AI to verify anything you want on your websites and services with Oh Dear's AI monitoring feature.

Explore ai monitoring
Sitemap

DNS blocklist monitoring

DNS blocklist monitoring helps you stay off spam and ad-block lists. Get notified when your DNS is blocked by a blacklist.

Explore dns blocklist monitoring
mobile preview

Start monitoring instantly

Start a no-strings-attached 10-day free trial. You're all set in less than a minute.
(No credit card needed.)

Not convinced yet? Need help?
Get in touch via [email protected].