# Nmap 7.60 scan initiated Thu Jan 14 00:58:37 2021 as: nmap --privileged -oA /data/scans/natlas.eeb09accdd4dc44983f875aeadc64f0c/nmap.eeb09accdd4dc44983f875aeadc64f0c --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 128.199.150.161 Nmap scan report for 128.199.150.161 Host is up (0.27s latency). Not shown: 1002 closed ports, 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | ssh-auth-methods: | Supported authentication methods: | publickey | gssapi-keyex | gssapi-with-mic |_ password | ssh-hostkey: | 2048 7f:75:fe:7d:96:1c:34:1a:a4:6d:a4:de:1c:bc:c1:73 (RSA) | 256 6a:2a:d4:c5:f3:10:2e:73:3e:c0:7a:90:b6:06:55:8f (ECDSA) |_ 256 ee:78:49:fd:9a:17:dc:15:52:90:3d:6e:6e:6d:d5:8f (EdDSA) 80/tcp open http nginx 1.12.2 |_http-server-header: nginx/1.12.2 |_http-title: Did not follow redirect to https://mavenrepo.compathnion.com/ 111/tcp open rpcbind 2-4 (RPC #100000) | rpcinfo: | program version port/proto service | 100000 2,3,4 111/tcp rpcbind |_ 100000 2,3,4 111/udp rpcbind 443/tcp open ssl/http nginx 1.12.2 | http-methods: |_ Potentially risky methods: PUT DELETE |_http-server-header: nginx/1.12.2 |_http-title: Site doesn't have a title (text/html). | ssl-cert: Subject: commonName=compathnion.com/organizationName=Compathnion Technology Limited/stateOrProvinceName=Hong Kong/countryName=HK | Subject Alternative Name: DNS:compathnion.com, DNS:gitpub.compathnion.com, DNS:hkl-dev.compathnion.com, DNS:hkl.compathnion.com, DNS:k11.compathnion.com, DNS:mavenrepo.compathnion.com, DNS:melcomacau.compathnion.com, DNS:moko.compathnion.com, DNS:musea.compathnion.com, DNS:nova.compathnion.com, DNS:www.compathnion.com, DNS:yoho.compathnion.com | Not valid before: 2020-06-23T00:00:00 |_Not valid after: 2022-06-15T23:59:59 |_ssl-date: TLS randomness does not represent time | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A | tls-nextprotoneg: |_ http/1.1 8045/tcp open unknown | fingerprint-strings: | DNSStatusRequest: | HTTP/2 client preface string missing or corrupt. Hex dump for received bytes: 000c000010000000000000000000 | DNSVersionBindReq: | HTTP/2 client preface string missing or corrupt. Hex dump for received bytes: 001e0006010000010000000000000776657273696f6e0462 | GenericLines: | HTTP/2 client preface string missing or corrupt. Hex dump for received bytes: 0d0a0d0a | GetRequest: | Unexpected HTTP/1.x request: GET / | HTTPOptions: | Unexpected HTTP/1.x request: OPTIONS / | RPCCheck: | HTTP/2 client preface string missing or corrupt. Hex dump for received bytes: 8000002872fe1d130000000000000002000186a00001977c | RTSPRequest: |_ HTTP/2 client preface string missing or corrupt. Hex dump for received bytes: 4f5054494f4e53202f20525453502f312e300d0a0d0a 8081/tcp open http Samsung AllShare httpd | http-methods: |_ Potentially risky methods: PUT DELETE |_http-title: Site doesn't have a title (text/html). 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port8045-TCP:V=7.60%I=7%D=1/14%Time=5FFF9748%P=x86_64-pc-linux-gnu%r(NU SF:LL,28,"\0\0\x12\x04\0\0\0\0\0\0\x03\x7f\xff\xff\xff\0\x04\0\x10\0\0\0\x SF:06\0\0\x20\0\0\0\x04\x08\0\0\0\0\0\0\x0f\0\x01")%r(GenericLines,8F,"\0\ SF:0\x12\x04\0\0\0\0\0\0\x03\x7f\xff\xff\xff\0\x04\0\x10\0\0\0\x06\0\0\x20 SF:\0\0\0\x04\x08\0\0\0\0\0\0\x0f\0\x01\0\0\^\x07\0\0\0\0\0\0\0\0\0\0\0\0\ SF:x01HTTP/2\x20client\x20preface\x20string\x20missing\x20or\x20corrupt\.\ SF:x20Hex\x20dump\x20for\x20received\x20bytes:\x200d0a0d0a")%r(GetRequest, SF:5C,"\0\0\x12\x04\0\0\0\0\0\0\x03\x7f\xff\xff\xff\0\x04\0\x10\0\0\0\x06\ SF:0\0\x20\0\0\0\x04\x08\0\0\0\0\0\0\x0f\0\x01\0\0\+\x07\0\0\0\0\0\0\0\0\0 SF:\0\0\0\x01Unexpected\x20HTTP/1\.x\x20request:\x20GET\x20/\x20")%r(HTTPO SF:ptions,60,"\0\0\x12\x04\0\0\0\0\0\0\x03\x7f\xff\xff\xff\0\x04\0\x10\0\0 SF:\0\x06\0\0\x20\0\0\0\x04\x08\0\0\0\0\0\0\x0f\0\x01\0\0/\x07\0\0\0\0\0\0 SF:\0\0\0\0\0\0\x01Unexpected\x20HTTP/1\.x\x20request:\x20OPTIONS\x20/\x20 SF:")%r(RTSPRequest,B3,"\0\0\x12\x04\0\0\0\0\0\0\x03\x7f\xff\xff\xff\0\x04 SF:\0\x10\0\0\0\x06\0\0\x20\0\0\0\x04\x08\0\0\0\0\0\0\x0f\0\x01\0\0\x82\x0 SF:7\0\0\0\0\0\0\0\0\0\0\0\0\x01HTTP/2\x20client\x20preface\x20string\x20m SF:issing\x20or\x20corrupt\.\x20Hex\x20dump\x20for\x20received\x20bytes:\x SF:204f5054494f4e53202f20525453502f312e300d0a0d0a")%r(RPCCheck,B7,"\0\0\x1 SF:2\x04\0\0\0\0\0\0\x03\x7f\xff\xff\xff\0\x04\0\x10\0\0\0\x06\0\0\x20\0\0 SF:\0\x04\x08\0\0\0\0\0\0\x0f\0\x01\0\0\x86\x07\0\0\0\0\0\0\0\0\0\0\0\0\x0 SF:1HTTP/2\x20client\x20preface\x20string\x20missing\x20or\x20corrupt\.\x2 SF:0Hex\x20dump\x20for\x20received\x20bytes:\x208000002872fe1d130000000000 SF:000002000186a00001977c")%r(DNSVersionBindReq,B7,"\0\0\x12\x04\0\0\0\0\0 SF:\0\x03\x7f\xff\xff\xff\0\x04\0\x10\0\0\0\x06\0\0\x20\0\0\0\x04\x08\0\0\ SF:0\0\0\0\x0f\0\x01\0\0\x86\x07\0\0\0\0\0\0\0\0\0\0\0\0\x01HTTP/2\x20clie SF:nt\x20preface\x20string\x20missing\x20or\x20corrupt\.\x20Hex\x20dump\x2 SF:0for\x20received\x20bytes:\x20001e0006010000010000000000000776657273696 SF:f6e0462")%r(DNSStatusRequest,A3,"\0\0\x12\x04\0\0\0\0\0\0\x03\x7f\xff\x SF:ff\xff\0\x04\0\x10\0\0\0\x06\0\0\x20\0\0\0\x04\x08\0\0\0\0\0\0\x0f\0\x0 SF:1\0\0r\x07\0\0\0\0\0\0\0\0\0\0\0\0\x01HTTP/2\x20client\x20preface\x20st SF:ring\x20missing\x20or\x20corrupt\.\x20Hex\x20dump\x20for\x20received\x2 SF:0bytes:\x20000c000010000000000000000000"); Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.10 - 4.8 Network Distance: 19 hops Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 00:59:37 2021 -- 1 IP address (1 host up) scanned in 60.63 seconds