Kali is a very capable pen testing OS but it doesn't just 'find and exploit' things by itself.

Only port 80 (http) or 443 (https) need to be open for a web server to show you web pages all other 65533 ports could be closed and it wouldn't matter..

A default nmap scan (which incidently is a SYN scan) only checks the most common 1000 ports anyway, and depending on what type of nmap scan you use, you can get very different results back from the same IP's

Your using a * wildcard for the last octet of your IP addresses in your scannng, that's a large and 'very noisy' scan, and a quick whois lookup would have given you more info;

inetnum: 188.114.96.0 - 188.114.99.255
netname: CLOUDFLARENET-EU

so 96, 97, 98 and 99 subnets are ALL part of Cloudflare IP allocation

https://www.freecodecamp.org/news/wh...l-of-all-time/