Port scanning becomes dangerous when combined with vulnerabilities. An open port running an outdated or misconfigured service creates an opportunity for exploitation. Attackers may use automated tools to scan for specific ports associated with known vulnerabilities. Once found, they can launch targeted attacks to gain access or disrupt services. This chain of events often begins with simple scanning.