Here is a OpenSSL DROWN vulnerability scanner sample report:
The DROWN vulnerability scanner tests a range of IP addresses (or just a single host) for the DROWN vulnerability in OpenSSL.
|Target host(s)||This specifies the target that will be tested for DROWN. It can be in the form of an IP range (ex. 100.101.102.1-254), a single IP or a hostname. Maximum 255 hosts can be scanned at a time. When a single IP/hostname is scanned, the tool will provide additional details such as the cipher suites supported by the vulnerable server.|
|Target service||This is the service that will be scanned for DROWN vulnerability. The supported protocols are: HTTPS (default), SMTPS, IMAPS, POP3S and FTPS.|