Scan report for "174.136.29.143"

Fast Scan (nmap -F 174.136.29.143)
Starting Nmap 7.80 ( https://nmap.org ) at 2023-03-19 13:03 EDT
Nmap scan report for vps.ramavps.com (174.136.29.143)
Host is up (0.0021s latency).
Not shown: 77 filtered ports
PORT      STATE  SERVICE
21/tcp    open   ftp
22/tcp    closed ssh
25/tcp    open   smtp
26/tcp    open   rsftp
53/tcp    open   domain
80/tcp    open   http
110/tcp   open   pop3
143/tcp   open   imap
443/tcp   open   https
465/tcp   open   smtps
587/tcp   open   submission
993/tcp   open   imaps
995/tcp   open   pop3s
3000/tcp  closed ppp
3306/tcp  open   mysql
8080/tcp  closed http-proxy
8443/tcp  closed https-alt
49152/tcp closed unknown
49153/tcp closed unknown
49154/tcp closed unknown
49155/tcp closed unknown
49156/tcp closed unknown
49157/tcp closed unknown

Nmap done: 1 IP address (1 host up) scanned in 1.80 seconds
Color Scheme
Target
Scan type
Fast Scan
Nmap Command
nmap -F 174.136.29.143
Scan date
19 Mar 2023 13:03
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)