Scan report for ""

Fast Scan (nmap -F -oX <filespec>)
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE nmaprun>
<?xml-stylesheet href="file:///usr/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
<!-- Nmap 7.80 scan initiated Thu Apr  4 02:01:33 2024 as: nmap -F -oX -->
<nmaprun scanner="nmap" args="nmap -F -oX" start="1712210493" startstr="Thu Apr  4 02:01:33 2024" version="7.80" xmloutputversion="1.04">
<scaninfo type="syn" protocol="tcp" numservices="100" services="7,9,13,21-23,25-26,37,53,79-81,88,106,110-111,113,119,135,139,143-144,179,199,389,427,443-445,465,513-515,543-544,548,554,587,631,646,873,990,993,995,1025-1029,1110,1433,1720,1723,1755,1900,2000-2001,2049,2121,2717,3000,3128,3306,3389,3986,4899,5000,5009,5051,5060,5101,5190,5357,5432,5631,5666,5800,5900,6000-6001,6646,7070,8000,8008-8009,8080-8081,8443,8888,9100,9999-10000,32768,49152-49157"/>
<verbose level="0"/>
<debugging level="0"/>
<runstats><finished time="1712210698" timestr="Thu Apr  4 02:04:58 2024" elapsed="205.23" summary="Nmap done at Thu Apr  4 02:04:58 2024; 255 IP addresses (0 hosts up) scanned in 205.23 seconds" exit="success"/><hosts up="0" down="255" total="255"/>
Color Scheme
Scan type
Fast Scan
Nmap Command
nmap -F -oX <filespec>
Scan date
04 Apr 2024 02:01
API - Scan ID
Copy scan report
Download report
Remove scan result
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add IP addresses ( to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Scan type:


Scan block:
Schedule scan:
Schedule scan (GMT-4)