Summary Pre-Scan Script Output () Address Hostname Ports Host Script Output Traceroute Post-Scan Script Output Nmap Scan Report - Scanned at Scan Summary | Pre-Scan Script Output | () | Post-Scan Script Output   Scan Summary Nmap was initiated at with these arguments:   Verbosity: ; Debug level   back to top   / / () Address - () Misc Metrics Metric Value Ping Results from System Uptime seconds (last reboot: ) Network Distance hops TCP Sequence Prediction Difficulty= () IP ID Sequence Geneation   Back to top   Hostnames () Ports The ports scanned but not shown below are in state: ports replied with:   Port State Service Reason Product Version Extra Info   from             from         from         from       Remote Operating System Detection Unable to identify operating system. • Used port: / () • OS match: (%)   Cannot determine exact operating system. Fingerprint provided below. If you know what OS is running on it, see https://nmap.org/submit/ Operating System fingerprint Operating System fingerprint Pre-Scan Script Output   Script Name Output   Back to top   Post-Scan Script Output   Script Name Output     Back to top     Host-Scan Script Output   Script Name Output   back to top   Smurf Responses responses counted Traceroute Information Traceroute data generated using port / Traceroute data generated using ICMP Hop RTT IP Host --