Scan report for "orf.at"

OS Detection (nmap -O orf.at)
Starting Nmap 7.80 ( https://nmap.org ) at 2023-01-22 12:04 UTC
Nmap scan report for orf.at (194.232.104.142)
Host is up (0.12s latency).
Other addresses for orf.at (not scanned): 194.232.104.3 194.232.104.140 194.232.104.141 194.232.104.4 194.232.104.149 194.232.104.139 194.232.104.150 2a01:468:1000:9::4 2a01:468:1000:9::3 2a01:468:1000:9::139 2a01:468:1000:9::140 2a01:468:1000:9::149 2a01:468:1000:9::150 2a01:468:1000:9::141 2a01:468:1000:9::142
rDNS record for 194.232.104.142: www.orf.at
Not shown: 996 filtered ports
PORT     STATE  SERVICE
80/tcp   open   http
113/tcp  closed ident
443/tcp  open   https
8081/tcp closed blackice-icecap
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.16 - 4.6

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 10.37 seconds
Color Scheme
Target
Scan type
OS Detection
Nmap Command
nmap -O orf.at
Scan date
22 Jan 2023 07:04
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)