# Nmap 7.92 scan initiated Sat Dec 11 16:08:53 2021 as: nmap -p- --open -vvv -sS --min-rate 5000 -n -Pn -sCV -oN targeted.txt 10.10.10.213 Nmap scan report for 10.10.10.213 Host is up, received user-set (0.041s latency). Scanned at 2021-12-11 16:08:53 CET for 37s Not shown: 65533 filtered tcp ports (no-response) Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE REASON VERSION 80/tcp open http syn-ack ttl 127 Microsoft IIS httpd 10.0 | http-methods: | Supported Methods: OPTIONS TRACE GET HEAD POST |_ Potentially risky methods: TRACE |_http-title: Gigantic Hosting | Home |_http-server-header: Microsoft-IIS/10.0 135/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sat Dec 11 16:09:30 2021 -- 1 IP address (1 host up) scanned in 37.14 seconds