# Nmap 7.60 scan initiated Thu Jan 14 16:55:55 2021 as: nmap --privileged -oA /data/scans/natlas.9a049c47490000f6b1026bdacdd53bd9/nmap.9a049c47490000f6b1026bdacdd53bd9 --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 134.122.21.143 Nmap scan report for 134.122.21.143 Host is up (0.0074s latency). Not shown: 1008 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.1 (protocol 2.0) | ssh-auth-methods: | Supported authentication methods: |_ publickey | ssh-hostkey: | 3072 72:67:27:aa:18:94:1b:ff:8b:4a:26:bc:a8:47:10:75 (RSA) | 256 87:eb:53:9b:bb:6c:99:47:0d:27:a9:eb:44:6b:76:45 (ECDSA) |_ 256 9d:9d:f1:2f:44:37:57:77:17:b1:dc:93:c3:75:cf:a0 (EdDSA) Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 16:56:04 2021 -- 1 IP address (1 host up) scanned in 9.90 seconds