0.9c generated with nmap.xsl - version by Benjamin Erb - http://www.benjamin-erb.de/nmap_xsl.php Nmap Scan Report - Scanned at <xsl:value-of select="$start" />

Nmap Scan Report - Scanned at


Scan Summary

Nmap was initiated at with these arguments:

Verbosity: ; Debug level


/ (online)

/ javascript:toggle('hostblock_'); host_down (click to expand) (offline)

hostblock_ unhidden hidden


  • - ()

javascript:toggle('metrics_'); Misc Metrics (click to expand) metrics_ hidden
Metric Value
Ping Results from
System Uptime seconds (last reboot: )
Network Distance hops
TCP Sequence Prediction Difficulty= ()
IP ID Sequence Generation


  • ()
  • Ports

    The ports scanned but not shown below are in state:

    • ports replied with:

    porttable_ 1 Port State javascript:togglePorts('porttable_','closed'); (toggle closed [] javascript:togglePorts('porttable_','filtered'); | filtered []) Service Reason Product Version Extra info
      from         from         from      

    Remote Operating System Detection

    Unable to identify operating system.

    • Used port: / ()
    • OS match: (%)
    • Cannot determine exact operating system. Fingerprint provided below.
    • If you know what OS is running on it, see https://nmap.org/submit/
    Operating System fingerprint
    • OS identified but the fingerprint was requested at scan time. javascript:toggle('osblock_'); (click to expand)
    osblock_ hidden
    Operating System fingerprint

    Pre-Scan Script Output

    Script Name Output

    Post-Scan Script Putput

    Script Name Output

    Host Script Output

    Script Name Output

    Smurf Responses

    • responses counted
    javascript:toggle('trace_'); Traceroute Information (click to expand) trace_ hidden
    • Traceroute data generated using port /
    Hop Rtt IP Host