*/11 * * * *
TRUE
nmap -sP 192.168.178.0/24 | grep Nmap | sed 's/[()]//g' | sort -k 6 -n | awk 'NR>1 {print "<tr><td class=\"getprocessswap1\">"$6"</td><td>   "$5"</td></tr>"}'
log
test
result
controll-own.0.FUTRO.DevicesIP
FALSE
<table>
result
<t/able>