Scan report for "8.8.8.8"

Ping Scan (nmap -sP -dd 8.8.8.8)
Starting Nmap 7.80 ( https://nmap.org ) at 2023-04-27 07:03 EDT
Fetchfile found /usr/bin/../share/nmap/nmap.xsl
The max # of sockets we are using is: 0
--------------- Timing report ---------------
  hostgroups: min 1, max 100000
  rtt-timeouts: init 1000, min 100, max 10000
  max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
  parallelism: min 0, max 0
  max-retries: 10, host-timeout: 0
  min-rate: 0, max-rate: 0
---------------------------------------------
Fetchfile found /usr/bin/../share/nmap/nmap-payloads
Initiating Ping Scan at 07:03
Scanning 8.8.8.8 [4 ports]
Packet capture filter (device eth0): dst host 207.231.109.106 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 8.8.8.8)))
We got a ping packet back from 8.8.8.8: id = 37665 seq = 0 checksum = 27870
ultrascan_host_probe_update called for machine 8.8.8.8 state UNKNOWN -> HOST_UP (trynum 0 time: 737)
Changing ping technique for 8.8.8.8 to icmp type 8 code 0
Changing global ping host to 8.8.8.8.
Completed Ping Scan at 07:03, 0.02s elapsed (1 total hosts)
Overall sending rates: 215.42 packets / s, 8186.13 bytes / s.
mass_rdns: Using DNS server 8.8.8.8
mass_rdns: Using DNS server 8.8.4.4
Initiating Parallel DNS resolution of 1 host. at 07:03
mass_rdns: 0.00s 0/1 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1]
Completed Parallel DNS resolution of 1 host. at 07:03, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 2, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Nmap scan report for dns.google (8.8.8.8)
Host is up, received echo-reply ttl 58 (0.00066s latency).
Final times for host: srtt: 661 rttvar: 5000  to: 100000
Read from /usr/bin/../share/nmap: nmap-payloads.
Nmap done: 1 IP address (1 host up) scanned in 0.07 seconds
           Raw packets sent: 4 (152B) | Rcvd: 1 (28B)
Color Scheme
Target
8.8.8.8
Scan type
Ping Scan
Nmap Command
nmap -sP -dd 8.8.8.8
Scan date
27 Apr 2023 07:03
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)