Example:
01:23:58 AM! viral : !port mirc.com
01:23:58 AM! > /dns: mirc.com resolved to mirc.com (50.28.52.187)
01:23:58 AM! e 50.28.52.187 465 (SMTPS (Simple Mail Transfer Protocol over SSL))
01:23:59 AM! e 50.28.52.187 80 (HTTP)
01:23:59 AM! e 50.28.52.187 443 (HTTPS (HTTP over SSL/TLS))
01:23:59 AM! e 50.28.52.187 110 (POP3 (Post Office Protocol 3))
01:23:59 AM! e 50.28.52.187 993 (IMAPS (Internet Message Access Protocol over SSL))
01:23:59 AM! e 50.28.52.187 995 (POP3S (Post Office Protocol 3 over SSL))
01:23:59 AM! e 50.28.52.187 143 (IMAP (Internet Message Access Protocol))
01:23:59 AM! e 50.28.52.187 22 (SSH) [Secure Shell]
It will be possible for the output to give the information in a single line, and a range from 1 to 99999 can be used, that would be up to one's discretion if the machine jams, and another option already predefined or by default. Or there is one more option if you want a port scan to be performed when entering a nickname, and except for certain nicknames or hosts.
Example:
1. * Notice Bot : Scan ports - Open = 22, 80, 6667, 6697
2. * Notice Bot : Scan ports - Nick: shakira; IP: 190.0.0.0; Open = 22, 6667
3. * Notice Bot : Scan ports - IP: 190.40.0.0.0; Open = 11, 80, 222, 1337, 4567