--- begin ---------------------------------------------------------- 2019-02-13 14:11:02 # Nmap 7.01 scan initiated Wed Feb 13 14:11:02 2019 as: nmap -A -oN 172.30.14.254.txt --append_output 172.30.14.254 Nmap scan report for 172.30.14.254 Host is up (0.0048s latency). All 1000 scanned ports on 172.30.14.254 are filtered Too many fingerprints match this host to give specific OS details Network Distance: 2 hops TRACEROUTE (using proto 1/icmp) HOP RTT ADDRESS 1 0.55 ms 172.20.0.1 2 6.91 ms 172.30.14.254 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Wed Feb 13 14:11:27 2019 -- 1 IP address (1 host up) scanned in 24.83 seconds # Nmap 7.01 scan initiated Wed Feb 13 14:11:27 2019 as: nmap -vv -sS -p 1-1048 -oN 172.30.14.254.txt --append_output 172.30.14.254 Nmap scan report for 172.30.14.254 Host is up, received echo-reply ttl 62 (0.0072s latency). All 1048 scanned ports on 172.30.14.254 are filtered because of 1048 no-responses Read data files from: /usr/bin/../share/nmap # Nmap done at Wed Feb 13 14:11:49 2019 -- 1 IP address (1 host up) scanned in 22.29 seconds # Nmap 7.01 scan initiated Wed Feb 13 14:11:49 2019 as: nmap -vv -sU -P0 -p 1-1048 -oN 172.30.14.254.txt --append_output 172.30.14.254 Nmap scan report for 172.30.14.254 Host is up, received user-set. All 1048 scanned ports on 172.30.14.254 are open|filtered because of 1048 no-responses Read data files from: /usr/bin/../share/nmap # Nmap done at Wed Feb 13 14:15:21 2019 -- 1 IP address (1 host up) scanned in 211.54 seconds 2019-02-13 14:15:21 --- end ------------------------------------------------------------