Example:

01:23:58 AM! viral : !port mirc.com
01:23:58 AM! > /dns: mirc.com resolved to mirc.com (50.28.52.187)
01:23:58 AM! e 50.28.52.187  465 (SMTPS (Simple Mail Transfer Protocol over SSL))
01:23:59 AM! e 50.28.52.187  80 (HTTP)
01:23:59 AM! e 50.28.52.187  443 (HTTPS (HTTP over SSL/TLS))
01:23:59 AM! e 50.28.52.187  110 (POP3 (Post Office Protocol 3))
01:23:59 AM! e 50.28.52.187  993 (IMAPS (Internet Message Access Protocol over SSL))
01:23:59 AM! e 50.28.52.187  995 (POP3S (Post Office Protocol 3 over SSL))
01:23:59 AM! e 50.28.52.187  143 (IMAP (Internet Message Access Protocol))
01:23:59 AM! e 50.28.52.187  22 (SSH) [Secure Shell]

It will be possible for the output to give the information in a single line, and a range from 1 to 99999 can be used, that would be up to one's discretion if the machine jams, and another option already predefined or by default. Or there is one more option if you want a port scan to be performed when entering a nickname, and except for certain nicknames or hosts.

Example:

1. * Notice Bot : Scan ports - Open = 22, 80, 6667, 6697

2. * Notice Bot : Scan ports - Nick: shakira; IP: 190.0.0.0; Open = 22, 6667

3. * Notice Bot : Scan ports - IP: 190.40.0.0.0; Open = 11, 80, 222, 1337, 4567