Scan report for "163.171.206.21"

Fast Scan (nmap -F 163.171.206.21)
Starting Nmap 7.80 ( https://nmap.org ) at 2024-06-11 22:25 EDT
Nmap scan report for 163.171.206.21
Host is up (0.26s latency).
Not shown: 71 closed ports
PORT      STATE SERVICE
80/tcp    open  http
81/tcp    open  hosts2-ns
88/tcp    open  kerberos-sec
443/tcp   open  https
444/tcp   open  snpp
1028/tcp  open  unknown
1029/tcp  open  ms-lsa
1433/tcp  open  ms-sql-s
1723/tcp  open  pptp
2000/tcp  open  cisco-sccp
2001/tcp  open  dc
3000/tcp  open  ppp
4899/tcp  open  radmin
5000/tcp  open  upnp
5009/tcp  open  airport-admin
5101/tcp  open  admdog
6000/tcp  open  X11
6001/tcp  open  X11:1
7070/tcp  open  realserver
8000/tcp  open  http-alt
8008/tcp  open  http
8009/tcp  open  ajp13
8080/tcp  open  http-proxy
8081/tcp  open  blackice-icecap
8443/tcp  open  https-alt
8888/tcp  open  sun-answerbook
9100/tcp  open  jetdirect
9999/tcp  open  abyss
10000/tcp open  snet-sensor-mgmt

Nmap done: 1 IP address (1 host up) scanned in 9.91 seconds
Color Scheme
Target
Scan type
Fast Scan
Nmap Command
nmap -F 163.171.206.21
Scan date
11 Jun 2024 22:24
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)