Escanear informe para "146.247.52.1-255"

Escaneo rápido (nmap -F 146.247.52.1-255 -oX <filespec>)
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE nmaprun>
<?xml-stylesheet href="file:///usr/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
<!-- Nmap 7.80 scan initiated Fri Jun 28 02:02:06 2024 as: nmap -F -oX  146.247.52.1-255 -->
<nmaprun scanner="nmap" args="nmap -F -oX  146.247.52.1-255" start="1719554526" startstr="Fri Jun 28 02:02:06 2024" version="7.80" xmloutputversion="1.04">
<scaninfo type="syn" protocol="tcp" numservices="100" services="7,9,13,21-23,25-26,37,53,79-81,88,106,110-111,113,119,135,139,143-144,179,199,389,427,443-445,465,513-515,543-544,548,554,587,631,646,873,990,993,995,1025-1029,1110,1433,1720,1723,1755,1900,2000-2001,2049,2121,2717,3000,3128,3306,3389,3986,4899,5000,5009,5051,5060,5101,5190,5357,5432,5631,5666,5800,5900,6000-6001,6646,7070,8000,8008-8009,8080-8081,8443,8888,9100,9999-10000,32768,49152-49157"/>
<verbose level="0"/>
<debugging level="0"/>
<host starttime="1719554558" endtime="1719554568"><status state="up" reason="echo-reply" reason_ttl="46"/>
<address addr="146.247.52.1" addrtype="ipv4"/>
<hostnames>
</hostnames>
<ports><extraports state="closed" count="93">
<extrareasons reason="resets" count="93"/>
</extraports>
<port protocol="tcp" portid="22"><state state="open" reason="syn-ack" reason_ttl="46"/><service name="ssh" method="table" conf="3"/></port>
<port protocol="tcp" portid="23"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="telnet" method="table" conf="3"/></port>
<port protocol="tcp" portid="80"><state state="filtered" reason="port-unreach" reason_ttl="46"/><service name="http" method="table" conf="3"/></port>
<port protocol="tcp" portid="135"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="msrpc" method="table" conf="3"/></port>
<port protocol="tcp" portid="139"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="netbios-ssn" method="table" conf="3"/></port>
<port protocol="tcp" portid="443"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="https" method="table" conf="3"/></port>
<port protocol="tcp" portid="445"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="microsoft-ds" method="table" conf="3"/></port>
</ports>
<times srtt="117348" rttvar="1426" to="123052"/>
</host>
<runstats><finished time="1719554568" timestr="Fri Jun 28 02:02:48 2024" elapsed="42.58" summary="Nmap done at Fri Jun 28 02:02:48 2024; 255 IP addresses (1 host up) scanned in 42.58 seconds" exit="success"/><hosts up="1" down="254" total="255"/>
</runstats>
</nmaprun>
Esquema de color
Objetivo
146.247.52.1-255
Tipo de scaneado
Escaneo rápido
Comando Nmap
nmap -F 146.247.52.1-255 -oX <filespec>
Fecha de escaneo
28 Jun 2024 02:01
API - Scan ID
Copiar resultado de escaneo
Descargar resultado
Eliminar resultado de escaneo
$
Escaneos totales
Ingrese el nombre de dominio o la dirección IP y seleccione el método de escaneo. Una vez finalizado el escaneo, obtienes el resultado del escaneo Nmap para tu objetivo.
Algunos firewalls bloquean los escaneos de Nmap. Para obtener verdaderos resultados positivos, agregue las direcciones IP nmap.online (91.214.64.186-91.214.64.187) a la lista blanca
Opciones de escaneo: [scan_type] de [scan_block] con un [scan_output]. Cambiar opciones
Visibilidad:
Tipo de scaneado:

Opciones

Escanear forma:
Producción:
Calendario escaneo:
Calendario escaneo (GMT-4)