# Nmap 7.60 scan initiated Thu Jan 14 16:53:42 2021 as: nmap --privileged -oA /data/scans/natlas.29dc90ebbe91705090f9eed73c33f343/nmap.29dc90ebbe91705090f9eed73c33f343 --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 139.59.190.24 Nmap scan report for 139.59.190.24 Host is up (0.090s latency). Not shown: 1006 closed ports, 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-auth-methods: | Supported authentication methods: | publickey |_ password | ssh-hostkey: | 2048 f7:d0:66:ab:4f:e8:9c:43:ed:e4:cb:02:7c:5c:4c:83 (RSA) | 256 57:1a:02:5d:d4:3b:cc:e0:2a:b2:76:36:d8:36:ee:d7 (ECDSA) |_ 256 85:4e:29:d5:3f:8c:b2:a1:6d:4a:02:92:15:e1:95:15 (EdDSA) 80/tcp open http Apache httpd 2.4.29 ((Ubuntu)) |_http-server-header: Apache/2.4.29 (Ubuntu) |_http-title: Site doesn't have a title (text/html). Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.10 - 4.8 Network Distance: 15 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 16:53:56 2021 -- 1 IP address (1 host up) scanned in 14.29 seconds