# Nmap 7.60 scan initiated Thu Jan 14 16:52:13 2021 as: nmap --privileged -oA /data/scans/natlas.2daf700eb6e3906bf66e56cb257361ad/nmap.2daf700eb6e3906bf66e56cb257361ad --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 159.203.86.167 Nmap scan report for 159.203.86.167 Host is up (0.0077s latency). Not shown: 1003 closed ports, 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0) | ssh-auth-methods: | Supported authentication methods: |_ publickey | ssh-hostkey: | 2048 48:70:f9:52:58:7e:30:05:1a:e6:ff:ca:63:80:40:18 (RSA) | 256 42:c5:aa:92:d5:97:09:54:43:0c:01:4a:64:d4:4b:a5 (ECDSA) |_ 256 ff:66:68:4d:ed:32:9f:7c:07:46:31:c5:49:70:7d:a0 (EdDSA) 80/tcp open http Apache httpd 2.4.7 ((Ubuntu)) | http-robots.txt: 47 disallowed entries (15 shown) | /404/ /app/ /manage/ /cgi-bin/ /downloader/ /includes/ | /js/ /lib/ /magento/ /pkginfo/ /report/ /skin/ /stats/ /var/ |_/catalog/product_compare/ |_http-server-header: Apache/2.4.7 (Ubuntu) |_http-title: Did not follow redirect to https://www.njsprayfoaminsulation.com/ 443/tcp open ssl/http Apache httpd 2.4.7 ((Ubuntu)) | http-robots.txt: 47 disallowed entries (15 shown) | /404/ /app/ /manage/ /cgi-bin/ /downloader/ /includes/ | /js/ /lib/ /magento/ /pkginfo/ /report/ /skin/ /stats/ /var/ |_/catalog/product_compare/ |_http-server-header: Apache/2.4.7 (Ubuntu) |_http-title: Did not follow redirect to https://www.njsprayfoaminsulation.com/ | ssl-cert: Subject: commonName=www.njsprayfoaminsulation.com | Subject Alternative Name: DNS:www.njsprayfoaminsulation.com, DNS:njsprayfoaminsulation.com | Not valid before: 2020-04-21T11:48:29 |_Not valid after: 2022-06-20T13:42:13 |_ssl-date: TLS randomness does not represent time | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A 2376/tcp open ssl/dockerd? | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A 3306/tcp open mysql MySQL 5.5.62 | mysql-info: | Protocol: 10 | Version: 5.5.62 | Thread ID: 194087 | Capabilities flags: 63487 | Some Capabilities: DontAllowDatabaseTableColumn, Speaks41ProtocolNew, LongColumnFlag, SupportsLoadDataLocal, SupportsCompression, IgnoreSpaceBeforeParenthesis, FoundRows, Support41Auth, Speaks41ProtocolOld, SupportsTransactions, LongPassword, ConnectWithDatabase, ODBCClient, IgnoreSigpipes, InteractiveClient, SupportsAuthPlugins, SupportsMultipleResults, SupportsMultipleStatments | Status: Autocommit | Salt: BeWevC)AL9wn@70+))0W |_ Auth Plugin Name: 79 Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.10 - 4.8 Network Distance: 13 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 16:53:37 2021 -- 1 IP address (1 host up) scanned in 84.24 seconds