Scan report for "kenobi.hackingarena.com"

Fast Scan (nmap -F kenobi.hackingarena.com)
Starting Nmap 7.80 ( https://nmap.org ) at 2024-09-06 09:01 EDT
Nmap scan report for kenobi.hackingarena.com (158.39.48.133)
Host is up (0.14s latency).
Not shown: 84 closed ports
PORT     STATE    SERVICE
22/tcp   open     ssh
23/tcp   filtered telnet
25/tcp   filtered smtp
53/tcp   filtered domain
111/tcp  filtered rpcbind
139/tcp  filtered netbios-ssn
445/tcp  filtered microsoft-ds
1433/tcp filtered ms-sql-s
2049/tcp filtered nfs
3128/tcp filtered squid-http
3306/tcp filtered mysql
3389/tcp filtered ms-wbt-server
5432/tcp filtered postgresql
5900/tcp filtered vnc
8080/tcp filtered http-proxy
8443/tcp filtered https-alt

Nmap done: 1 IP address (1 host up) scanned in 2.85 seconds
Color Scheme
Target
Scan type
Fast Scan
Nmap Command
nmap -F kenobi.hackingarena.com
Scan date
06 Sep 2024 09:01
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)