msf > db_nmap --min-hostgroup 96 -T4 -A -v -n 51.36.45.10
[*] Nmap: Starting Nmap 6.40 ( http://nmap.org ) at 2016-05-01 17:15 �������� - ������� ������
[*] Nmap: NSE: Loaded 110 scripts for scanning.
[*] Nmap: NSE: Script Pre-scanning.
[*] Nmap: Initiating Ping Scan at 17:16
[*] Nmap: Scanning 51.36.45.10 [4 ports]
[*] Nmap: Completed Ping Scan at 17:16, 4.92s elapsed (1 total hosts)
[*] Nmap: Nmap scan report for 51.36.45.10 [host down]
[*] Nmap: NSE: Script Post-scanning.
[*] Nmap: Read data files from: C:metasploitappspro....
map
[*] Nmap: Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
[*] Nmap: Nmap done: 1 IP address (0 hosts up) scanned in 39.63 seconds
[*] Nmap: Raw packets sent: 8 (304B) | Rcvd: 0 (0B)