VersasLibrary
Nmap-lite
Target (host or IP)
Protocol
http
https
Port / range (optional — leave empty for common ports scan)
Timeout per port (ms)
Concurrency
Start Scan
Stop
Result: browser attempts WebSocket → Image → Fetch. See limitations below.
Port
Method
Status
Info
Limitations Note
Browsers cannot create raw TCP/UDP connections — only via WebSocket, HTTP, or Image requests.
Non-HTTP ports (e.g., SSH, FTP) usually won't be detected because they don't respond to HTTP requests.
"Open" result means the host responded, but it doesn't guarantee a service is running — it could be CORS or a redirect.
For accurate scanning, use the real Nmap in your terminal. This tool is only for lightweight exploration.
If the port field is empty, the system automatically scans common ports:
21,22,23,25,53,80,110,143,443,993,995,3306,5432,8080,8443
.