Scan report for "inoxlan.com"

Membership level: Free member
Summary

Ports

20

Duration

8.33sec

Date

2024-11-17

IP

82.223.103.231

Report
Normal Scan (nmap inoxlan.com)
Nmap scan report for inoxlan.com (82.223.103.231)
Host is up (0.16s latency).
rDNS record for 82.223.103.231: codeplesk.com
Not shown: 980 filtered tcp ports (no-response)
PORT     STATE  SERVICE
20/tcp   closed ftp-data
21/tcp   open   ftp
22/tcp   open   ssh
23/tcp   closed telnet
24/tcp   closed priv-mail
25/tcp   open   smtp
26/tcp   open   rsftp
30/tcp   closed unknown
53/tcp   open   domain
80/tcp   open   http
110/tcp  open   pop3
143/tcp  open   imap
443/tcp  open   https
465/tcp  open   smtps
587/tcp  open   submission
993/tcp  open   imaps
995/tcp  open   pop3s
1433/tcp closed ms-sql-s
8080/tcp closed http-proxy
8443/tcp open   https-alt

Nmap done: 1 IP address (1 host up) scanned in 8.33 seconds
Color Scheme
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Detailed report
Target
Target IP
82.223.103.231
Host status
UP
Target Country
Target IP location is Spain
Spain
Free scan
Free scan
Scan method
Normal Scan
Scan status
Identified 20 ports
Run command
nmap inoxlan.com
Scan date
17 Nov 2024 04:49
API - Scan ID
Scan duration
8.33sec
Download report
Remove scan result
$
Scan more
Pricing

PROFESSIONAL


  • 10 000 scans/day
  • Daily API Calls - 100 000 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0.75$7.50/month
Billed Annually @ $9.00$90.00 90% discount
Get Professional

REGISTERED


  • 5 scans/day
  • Daily API Calls - 20 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0/lifetime
 
Register
Scan host
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: