Escanear informe para "146.247.52.1-255"

Escaneo rápido (nmap -F 146.247.52.1-255 -oX <filespec>)
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE nmaprun>
<?xml-stylesheet href="file:///usr/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
<!-- Nmap 7.80 scan initiated Thu Jul 18 02:01:33 2024 as: nmap -F -oX  146.247.52.1-255 -->
<nmaprun scanner="nmap" args="nmap -F -oX  146.247.52.1-255" start="1721282493" startstr="Thu Jul 18 02:01:33 2024" version="7.80" xmloutputversion="1.04">
<scaninfo type="syn" protocol="tcp" numservices="100" services="7,9,13,21-23,25-26,37,53,79-81,88,106,110-111,113,119,135,139,143-144,179,199,389,427,443-445,465,513-515,543-544,548,554,587,631,646,873,990,993,995,1025-1029,1110,1433,1720,1723,1755,1900,2000-2001,2049,2121,2717,3000,3128,3306,3389,3986,4899,5000,5009,5051,5060,5101,5190,5357,5432,5631,5666,5800,5900,6000-6001,6646,7070,8000,8008-8009,8080-8081,8443,8888,9100,9999-10000,32768,49152-49157"/>
<verbose level="0"/>
<debugging level="0"/>
<host starttime="1721282557" endtime="1721282566"><status state="up" reason="echo-reply" reason_ttl="51"/>
<address addr="146.247.52.1" addrtype="ipv4"/>
<hostnames>
</hostnames>
<ports><extraports state="closed" count="93">
<extrareasons reason="resets" count="93"/>
</extraports>
<port protocol="tcp" portid="22"><state state="open" reason="syn-ack" reason_ttl="51"/><service name="ssh" method="table" conf="3"/></port>
<port protocol="tcp" portid="23"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="telnet" method="table" conf="3"/></port>
<port protocol="tcp" portid="80"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="http" method="table" conf="3"/></port>
<port protocol="tcp" portid="135"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="msrpc" method="table" conf="3"/></port>
<port protocol="tcp" portid="139"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="netbios-ssn" method="table" conf="3"/></port>
<port protocol="tcp" portid="443"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="https" method="table" conf="3"/></port>
<port protocol="tcp" portid="445"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="microsoft-ds" method="table" conf="3"/></port>
</ports>
<times srtt="112287" rttvar="661" to="114931"/>
</host>
<runstats><finished time="1721282566" timestr="Thu Jul 18 02:02:46 2024" elapsed="72.70" summary="Nmap done at Thu Jul 18 02:02:46 2024; 255 IP addresses (1 host up) scanned in 72.70 seconds" exit="success"/><hosts up="1" down="254" total="255"/>
</runstats>
</nmaprun>
Esquema de color
Objetivo
146.247.52.1-255
Tipo de scaneado
Escaneo rápido
Comando Nmap
nmap -F 146.247.52.1-255 -oX <filespec>
Fecha de escaneo
18 Jul 2024 02:01
API - Scan ID
Copiar resultado de escaneo
Descargar resultado
Eliminar resultado de escaneo
$
Escaneos totales
Ingrese el nombre de dominio o la dirección IP y seleccione el método de escaneo. Una vez finalizado el escaneo, obtienes el resultado del escaneo Nmap para tu objetivo.
Algunos firewalls bloquean los escaneos de Nmap. Para obtener verdaderos resultados positivos, agregue las direcciones IP nmap.online (91.214.64.186-91.214.64.187) a la lista blanca
Opciones de escaneo: [scan_type] de [scan_block] con un [scan_output]. Cambiar opciones
Visibilidad:
Tipo de scaneado:

Opciones

Escanear forma:
Producción:
Calendario escaneo:
Calendario escaneo (GMT-4)