Scan report for "84.249.120.228"

OS Detection (nmap -O 84.249.120.228)
Starting Nmap 7.80 ( https://nmap.org ) at 2024-04-25 11:34 EDT
Nmap scan report for cable-jkl-54f978-228.dhcp.inet.fi (84.249.120.228)
Host is up (0.16s latency).
Not shown: 984 filtered ports
PORT      STATE  SERVICE
22/tcp    open   ssh
80/tcp    open   http
139/tcp   closed netbios-ssn
443/tcp   open   https
445/tcp   closed microsoft-ds
3389/tcp  closed ms-wbt-server
5431/tcp  closed park-agent
5900/tcp  closed vnc
5902/tcp  closed vnc-2
6881/tcp  closed bittorrent-tracker
6901/tcp  closed jetstream
6969/tcp  closed acmsoda
7000/tcp  closed afs3-fileserver
8080/tcp  closed http-proxy
45100/tcp closed unknown
49152/tcp closed unknown
Device type: VoIP adapter|general purpose
Running: Cisco embedded, Linux 2.6.X
OS CPE: cpe:/h:cisco:unified_call_manager cpe:/o:linux:linux_kernel:2.6.26
OS details: Cisco Unified Communications Manager VoIP adapter, Linux 2.6.26 (PCLinuxOS)

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.19 seconds
Color Scheme
Target
Scan type
OS Detection
Nmap Command
nmap -O 84.249.120.228
Scan date
25 Apr 2024 11:34
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)