*/11 * * * * TRUE nmap -sP 192.168.178.0/24 | grep Nmap | sed 's/[()]//g' | sort -k 6 -n | awk 'NR>1 {print "<tr><td class=\"getprocessswap1\">"$6"</td><td>&ensp;&ensp;&ensp;"$5"</td></tr>"}' log test result controll-own.0.FUTRO.DevicesIP FALSE <table> result <t/able>