Scan report for "nsk35.ru"

Membership level: Free member
Summary

Ports

16

Duration

5.41sec

Date

2024-11-17

IP

31.31.196.244

Report
Performing a basic port scan (nmap -F nsk35.ru)
Nmap scan report for nsk35.ru (31.31.196.244)
Host is up (0.17s latency).
rDNS record for 31.31.196.244: server182.hosting.reg.ru
Not shown: 84 closed tcp ports (reset)
PORT     STATE    SERVICE
21/tcp   open     ftp
22/tcp   open     ssh
25/tcp   open     smtp
53/tcp   open     domain
80/tcp   open     http
110/tcp  open     pop3
111/tcp  open     rpcbind
143/tcp  open     imap
443/tcp  open     https
465/tcp  open     smtps
587/tcp  open     submission
993/tcp  open     imaps
995/tcp  open     pop3s
3306/tcp open     mysql
8080/tcp filtered http-proxy
8081/tcp filtered blackice-icecap

Nmap done: 1 IP address (1 host up) scanned in 5.41 seconds
Color Scheme
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Detailed report
Target
Target IP
31.31.196.244
Host status
UP
Target Country
Target IP location is Russian Federation
Russian Federation
Free scan
Free scan
Scan method
Performing a basic port scan
Scan status
Identified 16 ports
Run command
nmap -F nsk35.ru
Scan date
17 Nov 2024 04:50
API - Scan ID
Scan duration
5.41sec
Download report
Remove scan result
$
Scan more
Pricing

PROFESSIONAL


  • 10 000 scans/day
  • Daily API Calls - 100 000 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0.75$7.50/month
Billed Annually @ $9.00$90.00 90% discount
Get Professional

REGISTERED


  • 5 scans/day
  • Daily API Calls - 20 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0/lifetime
 
Register
Scan host
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: