Scan report for "200.122.243.145"

Fast Scan (nmap -F 200.122.243.145)
Starting Nmap 7.80 ( https://nmap.org ) at 2024-06-11 15:59 EDT
Warning: 200.122.243.145 giving up on port because retransmission cap hit (10).
Nmap scan report for static-dedicado-200-122-243-145.une.net.co (200.122.243.145)
Host is up (0.081s latency).
Not shown: 80 closed ports
PORT      STATE    SERVICE
9/tcp     filtered discard
22/tcp    filtered ssh
26/tcp    filtered rsftp
79/tcp    filtered finger
587/tcp   filtered submission
990/tcp   filtered ftps
1028/tcp  filtered unknown
1755/tcp  filtered wms
2717/tcp  filtered pn-requester
3986/tcp  filtered mapper-ws_ethd
5009/tcp  filtered airport-admin
5060/tcp  filtered sip
5190/tcp  filtered aol
8000/tcp  filtered http-alt
8009/tcp  filtered ajp13
8081/tcp  filtered blackice-icecap
8443/tcp  filtered https-alt
49153/tcp filtered unknown
49154/tcp filtered unknown
49155/tcp filtered unknown

Nmap done: 1 IP address (1 host up) scanned in 234.01 seconds
Color Scheme
Target
Scan type
Fast Scan
Nmap Command
nmap -F 200.122.243.145
Scan date
11 Jun 2024 15:59
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)