Test parameters: Test date: 24-Nov-2016, 17:49:23 - Host 200.198.34.66 - Ports 1-6000 - Ping host True - Detect OS False - Detect svc version False - Traceroute False
Test result:
Starting Nmap 6.00 ( http://nmap.org ) at 2016-11-24 17:49 EET
Initiating Ping Scan at 17:49 Scanning 200.198.34.66 [4 ports] Completed Ping Scan at 17:49, 0.79s elapsed (1 total hosts) Initiating SYN Stealth Scan at 17:49 Scanning webmail.policiamilitar.mg.gov.br (200.198.34.66) [6000 ports] Discovered open port 443/tcp on 200.198.34.66 Discovered open port 993/tcp on 200.198.34.66 Discovered open port 25/tcp on 200.198.34.66 Discovered open port 110/tcp on 200.198.34.66 Discovered open port 587/tcp on 200.198.34.66 Discovered open port 80/tcp on 200.198.34.66 Discovered open port 995/tcp on 200.198.34.66 SYN Stealth Scan Timing: About 39.61% done; ETC: 17:50 (0:00:47 remaining) Discovered open port 465/tcp on 200.198.34.66 Discovered open port 5222/tcp on 200.198.34.66 Completed SYN Stealth Scan at 17:50, 72.05s elapsed (6000 total ports)
[+] Nmap scan report for webmail.policiamilitar.mg.gov.br (200.198.34.66)
Host is up (0.22s latency).
Not shown: 5984 filtered ports
PORT STATE SERVICE
21/tcp closed ftp
25/tcp open smtp 53/tcp closed domain 80/tcp open http 110/tcp open pop3 143/tcp closed imap 443/tcp open https 465/tcp open smtps 587/tcp open submission 993/tcp open imaps 995/tcp open pop3s 3258/tcp closed unknown 3259/tcp closed unknown 3260/tcp closed iscsi 3261/tcp closed winshadow 5222/tcp open xmpp-client
Nmap done: 1 IP address (1 host up) scanned in 74.74 seconds
Raw packets sent: 3456 (151.876KB) | Rcvd: 86 (4.164KB)