Scan report for "14.234.92.34.bc.googleusercontent.com"

Port scan (nmap -sV -p 21,22,25,80,110,143,443,445 14.234.92.34.bc.googleusercontent.com)
Starting Nmap 7.80 ( https://nmap.org ) at 2024-04-24 01:58 EDT
Nmap scan report for 14.234.92.34.bc.googleusercontent.com (34.92.234.14)
Host is up (0.18s latency).

PORT    STATE    SERVICE      VERSION
21/tcp  filtered ftp
22/tcp  open     ssh          OpenSSH 8.9p1 Ubuntu 3ubuntu0.6 (Ubuntu Linux; protocol 2.0)
25/tcp  filtered smtp
80/tcp  open     http         nginx 1.18.0 (Ubuntu)
110/tcp filtered pop3
143/tcp filtered imap
443/tcp closed   https
445/tcp filtered microsoft-ds
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 10.79 seconds
Color Scheme
Target
Scan type
Port scan
Nmap Command
nmap -sV -p 21,22,25,80,110,143,443,445 14.234.92.34.bc.googleusercontent.com
Scan date
24 Apr 2024 01:58
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)