Scan report for ""

Fast Scan (nmap -F
Starting Nmap 7.80 ( ) at 2023-01-25 00:10 EST
Nmap scan report for (
Host is up (0.00085s latency).
Not shown: 49 filtered ports
21/tcp    open  ftp
25/tcp    open  smtp
37/tcp    open  time
53/tcp    open  domain
80/tcp    open  http
81/tcp    open  hosts2-ns
88/tcp    open  kerberos-sec
119/tcp   open  nntp
389/tcp   open  ldap
443/tcp   open  https
444/tcp   open  snpp
445/tcp   open  microsoft-ds
465/tcp   open  smtps
543/tcp   open  klogin
554/tcp   open  rtsp
587/tcp   open  submission
631/tcp   open  ipp
990/tcp   open  ftps
993/tcp   open  imaps
995/tcp   open  pop3s
1025/tcp  open  NFS-or-IIS
1028/tcp  open  unknown
1029/tcp  open  ms-lsa
1433/tcp  open  ms-sql-s
1720/tcp  open  h323q931
2000/tcp  open  cisco-sccp
2001/tcp  open  dc
2049/tcp  open  nfs
2121/tcp  open  ccproxy-ftp
3000/tcp  open  ppp
3306/tcp  open  mysql
3389/tcp  open  ms-wbt-server
5000/tcp  open  upnp
5009/tcp  open  airport-admin
5051/tcp  open  ida-agent
5060/tcp  open  sip
5800/tcp  open  vnc-http
5900/tcp  open  vnc
6000/tcp  open  X11
6001/tcp  open  X11:1
7070/tcp  open  realserver
8000/tcp  open  http-alt
8008/tcp  open  http
8009/tcp  open  ajp13
8080/tcp  open  http-proxy
8081/tcp  open  blackice-icecap
8443/tcp  open  https-alt
8888/tcp  open  sun-answerbook
9100/tcp  open  jetdirect
9999/tcp  open  abyss
10000/tcp open  snet-sensor-mgmt

Nmap done: 1 IP address (1 host up) scanned in 1.59 seconds
Color Scheme
Scan type
Fast Scan
Nmap Command
nmap -F
Scan date
25 Jan 2023 00:10
API - Scan ID
Copy scan report
Download report
Remove scan result
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add IP addresses ( to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Scan type:


Scan block:
Schedule scan:
Schedule scan (GMT-4)