Scan report for "81.27.106.1-255"

Fast Scan (nmap -F 81.27.106.1-255 -oX <filespec>)
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE nmaprun>
<?xml-stylesheet href="file:///usr/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
<!-- Nmap 7.80 scan initiated Sat Nov 30 02:01:33 2024 as: nmap -F -oX  81.27.106.1-255 -->
<nmaprun scanner="nmap" args="nmap -F -oX  81.27.106.1-255" start="1732950093" startstr="Sat Nov 30 02:01:33 2024" version="7.80" xmloutputversion="1.04">
<scaninfo type="syn" protocol="tcp" numservices="100" services="7,9,13,21-23,25-26,37,53,79-81,88,106,110-111,113,119,135,139,143-144,179,199,389,427,443-445,465,513-515,543-544,548,554,587,631,646,873,990,993,995,1025-1029,1110,1433,1720,1723,1755,1900,2000-2001,2049,2121,2717,3000,3128,3306,3389,3986,4899,5000,5009,5051,5060,5101,5190,5357,5432,5631,5666,5800,5900,6000-6001,6646,7070,8000,8008-8009,8080-8081,8443,8888,9100,9999-10000,32768,49152-49157"/>
<verbose level="0"/>
<debugging level="0"/>
<host starttime="1732950112" endtime="1732950123"><status state="up" reason="echo-reply" reason_ttl="50"/>
<address addr="81.27.106.1" addrtype="ipv4"/>
<hostnames>
<hostname name="1-106-27-81.inetc.net" type="PTR"/>
</hostnames>
<ports><extraports state="filtered" count="99">
<extrareasons reason="no-responses" count="99"/>
</extraports>
<port protocol="tcp" portid="8080"><state state="closed" reason="reset" reason_ttl="50"/><service name="http-proxy" method="table" conf="3"/></port>
</ports>
<times srtt="118890" rttvar="67228" to="387802"/>
</host>
<host starttime="1732950112" endtime="1732950121"><status state="up" reason="echo-reply" reason_ttl="113"/>
<address addr="81.27.106.12" addrtype="ipv4"/>
<hostnames>
<hostname name="inetc840.inetc.net" type="PTR"/>
</hostnames>
<ports><extraports state="closed" count="93">
<extrareasons reason="resets" count="93"/>
</extraports>
<port protocol="tcp" portid="23"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="telnet" method="table" conf="3"/></port>
<port protocol="tcp" portid="80"><state state="open" reason="syn-ack" reason_ttl="113"/><service name="http" method="table" conf="3"/></port>
<port protocol="tcp" portid="111"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="rpcbind" method="table" conf="3"/></port>
<port protocol="tcp" portid="135"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="msrpc" method="table" conf="3"/></port>
<port protocol="tcp" portid="139"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="netbios-ssn" method="table" conf="3"/></port>
<port protocol="tcp" portid="443"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="https" method="table" conf="3"/></port>
<port protocol="tcp" portid="445"><state state="filtered" reason="no-response" reason_ttl="0"/><service name="microsoft-ds" method="table" conf="3"/></port>
</ports>
<times srtt="121862" rttvar="1459" to="127698"/>
</host>
<host starttime="1732950113" endtime="1732950121"><status state="up" reason="echo-reply" reason_ttl="113"/>
<address addr="81.27.106.86" addrtype="ipv4"/>
<hostnames>
<hostname name="inetc930.inetc.net" type="PTR"/>
</hostnames>
<ports><extraports state="filtered" count="92">
<extrareasons reason="no-responses" count="92"/>
</extraports>
<port protocol="tcp" portid="1723"><state state="open" reason="syn-ack" reason_ttl="113"/><service name="pptp" method="table" conf="3"/></port>
<port protocol="tcp" portid="8080"><state state="closed" reason="reset" reason_ttl="50"/><service name="http-proxy" method="table" conf="3"/></port>
<port protocol="tcp" portid="8081"><state state="open" reason="syn-ack" reason_ttl="113"/><service name="blackice-icecap" method="table" conf="3"/></port>
<port protocol="tcp" portid="49152"><state state="open" reason="syn-ack" reason_ttl="113"/><service name="unknown" method="table" conf="3"/></port>
<port protocol="tcp" portid="49153"><state state="open" reason="syn-ack" reason_ttl="113"/><service name="unknown" method="table" conf="3"/></port>
<port protocol="tcp" portid="49154"><state state="open" reason="syn-ack" reason_ttl="113"/><service name="unknown" method="table" conf="3"/></port>
<port protocol="tcp" portid="49155"><state state="open" reason="syn-ack" reason_ttl="113"/><service name="unknown" method="table" conf="3"/></port>
<port protocol="tcp" portid="49157"><state state="open" reason="syn-ack" reason_ttl="113"/><service name="unknown" method="table" conf="3"/></port>
</ports>
<times srtt="120990" rttvar="4281" to="138114"/>
</host>
<host starttime="1732950112" endtime="1732950123"><status state="up" reason="echo-reply" reason_ttl="50"/>
<address addr="81.27.106.251" addrtype="ipv4"/>
<hostnames>
<hostname name="gw-106-a.dp1.as24851.net" type="PTR"/>
</hostnames>
<ports><extraports state="filtered" count="98">
<extrareasons reason="no-responses" count="98"/>
</extraports>
<port protocol="tcp" portid="53"><state state="open" reason="syn-ack" reason_ttl="50"/><service name="domain" method="table" conf="3"/></port>
<port protocol="tcp" portid="8080"><state state="closed" reason="reset" reason_ttl="50"/><service name="http-proxy" method="table" conf="3"/></port>
</ports>
<times srtt="121609" rttvar="39753" to="280621"/>
</host>
<runstats><finished time="1732950123" timestr="Sat Nov 30 02:02:03 2024" elapsed="30.29" summary="Nmap done at Sat Nov 30 02:02:03 2024; 255 IP addresses (4 hosts up) scanned in 30.29 seconds" exit="success"/><hosts up="4" down="251" total="255"/>
</runstats>
</nmaprun>
Color Scheme
Target
81.27.106.1-255
Scan type
Fast Scan
Nmap Command
nmap -F 81.27.106.1-255 -oX <filespec>
Scan date
30 Nov 2024 02:01
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)