Scan report for "203.219.13.195"

Fast Scan (nmap -F 203.219.13.195)
Starting Nmap 7.80 ( https://nmap.org ) at 2024-06-11 21:04 EDT
Nmap scan report for 203-219-13-195.tpgi.com.au (203.219.13.195)
Host is up (0.20s latency).
Not shown: 78 closed ports
PORT     STATE    SERVICE
7/tcp    filtered echo
9/tcp    filtered discard
13/tcp   filtered daytime
25/tcp   open     smtp
37/tcp   filtered time
79/tcp   filtered finger
80/tcp   open     http
81/tcp   open     hosts2-ns
88/tcp   filtered kerberos-sec
135/tcp  open     msrpc
139/tcp  open     netbios-ssn
443/tcp  open     https
444/tcp  open     snpp
445/tcp  open     microsoft-ds
515/tcp  filtered printer
544/tcp  filtered kshell
587/tcp  open     submission
646/tcp  filtered ldp
1433/tcp filtered ms-sql-s
2000/tcp open     cisco-sccp
3389/tcp open     ms-wbt-server
5060/tcp open     sip

Nmap done: 1 IP address (1 host up) scanned in 2.37 seconds
Color Scheme
Target
Scan type
Fast Scan
Nmap Command
nmap -F 203.219.13.195
Scan date
11 Jun 2024 21:03
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)