Escanear informe para "146.247.52.1-255"

Escaneo rápido (nmap -F 146.247.52.1-255 -oX <filespec>)
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE nmaprun>
<?xml-stylesheet href="file:///usr/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
<!-- Nmap 7.80 scan initiated Wed Aug 21 02:01:39 2024 as: nmap -F -oX  146.247.52.1-255 -->
<nmaprun scanner="nmap" args="nmap -F -oX  146.247.52.1-255" start="1724220099" startstr="Wed Aug 21 02:01:39 2024" version="7.80" xmloutputversion="1.04">
<scaninfo type="syn" protocol="tcp" numservices="100" services="7,9,13,21-23,25-26,37,53,79-81,88,106,110-111,113,119,135,139,143-144,179,199,389,427,443-445,465,513-515,543-544,548,554,587,631,646,873,990,993,995,1025-1029,1110,1433,1720,1723,1755,1900,2000-2001,2049,2121,2717,3000,3128,3306,3389,3986,4899,5000,5009,5051,5060,5101,5190,5357,5432,5631,5666,5800,5900,6000-6001,6646,7070,8000,8008-8009,8080-8081,8443,8888,9100,9999-10000,32768,49152-49157"/>
<verbose level="0"/>
<debugging level="0"/>
<host starttime="1724220228" endtime="1724220234"><status state="up" reason="echo-reply" reason_ttl="47"/>
<address addr="146.247.52.1" addrtype="ipv4"/>
<hostnames>
</hostnames>
<ports><extraports state="closed" count="93">
<extrareasons reason="resets" count="93"/>
</extraports>
<port protocol="tcp" portid="22"><state state="open" reason="syn-ack" reason_ttl="47"/><service name="ssh" method="table" conf="3"/></port>
<port protocol="tcp" portid="23"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="telnet" method="table" conf="3"/></port>
<port protocol="tcp" portid="80"><state state="filtered" reason="port-unreach" reason_ttl="47"/><service name="http" method="table" conf="3"/></port>
<port protocol="tcp" portid="135"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="msrpc" method="table" conf="3"/></port>
<port protocol="tcp" portid="139"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="netbios-ssn" method="table" conf="3"/></port>
<port protocol="tcp" portid="443"><state state="filtered" reason="port-unreach" reason_ttl="47"/><service name="https" method="table" conf="3"/></port>
<port protocol="tcp" portid="445"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="microsoft-ds" method="table" conf="3"/></port>
</ports>
<times srtt="114722" rttvar="1456" to="120546"/>
</host>
<runstats><finished time="1724220234" timestr="Wed Aug 21 02:03:54 2024" elapsed="135.60" summary="Nmap done at Wed Aug 21 02:03:54 2024; 255 IP addresses (1 host up) scanned in 135.60 seconds" exit="success"/><hosts up="1" down="254" total="255"/>
</runstats>
</nmaprun>
Esquema de color
Objetivo
146.247.52.1-255
Tipo de scaneado
Escaneo rápido
Comando Nmap
nmap -F 146.247.52.1-255 -oX <filespec>
Fecha de escaneo
21 Aug 2024 02:01
API - Scan ID
Copiar resultado de escaneo
Descargar resultado
Eliminar resultado de escaneo
$
Escaneos totales
Ingrese el nombre de dominio o la dirección IP y seleccione el método de escaneo. Una vez finalizado el escaneo, obtienes el resultado del escaneo Nmap para tu objetivo.
Algunos firewalls bloquean los escaneos de Nmap. Para obtener verdaderos resultados positivos, agregue las direcciones IP nmap.online (91.214.64.186-91.214.64.187) a la lista blanca
Opciones de escaneo: [scan_type] de [scan_block] con un [scan_output]. Cambiar opciones
Visibilidad:
Tipo de scaneado:

Opciones

Escanear forma:
Producción:
Calendario escaneo:
Calendario escaneo (GMT-4)