Summary
Pre-Scan Script Output
()
Address
Hostname
Ports
Host Script Output
Traceroute
Post-Scan Script Output
Nmap Scan Report - Scanned at
Scan Summary
|
Pre-Scan Script Output
|
()
|
Post-Scan Script Output
Scan Summary
Nmap was initiated at with these arguments:
Verbosity: ; Debug level
back to top
/
/
()
Address
•
-
()
Misc Metrics
Metric
Value
Ping Results
from
System Uptime
seconds (last reboot: )
Network Distance
hops
TCP Sequence Prediction
Difficulty= ()
IP ID Sequence Geneation
Back to top
Hostnames
• ()
Ports
The ports scanned but not shown below are in state:
• ports replied with:
Port
State
Service
Reason
Product
Version
Extra Info
from
from
from
from
Remote Operating System Detection
Unable to identify operating system.
• Used port: / ()
• OS match: (%)
Cannot determine exact operating system. Fingerprint provided below.
If you know what OS is running on it, see https://nmap.org/submit/
Operating System fingerprint
Operating System fingerprint
Pre-Scan Script Output
Script Name
Output
Back to top
Post-Scan Script Output
Script Name
Output
Back to top
Host-Scan Script Output
Script Name
Output
back to top
Smurf Responses
responses counted
Traceroute Information
Traceroute data generated using port /
Traceroute data generated using ICMP
Hop
RTT
IP
Host
--