Scan report for "server1.39slxu3bw.ru"

Fast Scan (nmap -F server1.39slxu3bw.ru)
Starting Nmap 7.80 ( https://nmap.org ) at 2023-05-26 13:33 EDT
Nmap scan report for server1.39slxu3bw.ru (63.251.106.25)
Host is up (0.036s latency).
Not shown: 74 closed ports
PORT     STATE SERVICE
21/tcp   open  ftp
80/tcp   open  http
88/tcp   open  kerberos-sec
111/tcp  open  rpcbind
389/tcp  open  ldap
443/tcp  open  https
444/tcp  open  snpp
445/tcp  open  microsoft-ds
554/tcp  open  rtsp
1025/tcp open  NFS-or-IIS
1433/tcp open  ms-sql-s
3000/tcp open  ppp
3128/tcp open  squid-http
3306/tcp open  mysql
5000/tcp open  upnp
5060/tcp open  sip
5900/tcp open  vnc
6001/tcp open  X11:1
7070/tcp open  realserver
8000/tcp open  http-alt
8008/tcp open  http
8080/tcp open  http-proxy
8081/tcp open  blackice-icecap
8443/tcp open  https-alt
8888/tcp open  sun-answerbook
9999/tcp open  abyss

Nmap done: 1 IP address (1 host up) scanned in 1.40 seconds
Color Scheme
Target
Scan type
Fast Scan
Nmap Command
nmap -F server1.39slxu3bw.ru
Scan date
26 May 2023 13:33
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)