# Nmap 7.60 scan initiated Thu Jan 14 01:00:04 2021 as: nmap --privileged -oA /data/scans/natlas.a9ed33765987cd98cf56a40e0e341461/nmap.a9ed33765987cd98cf56a40e0e341461 --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 159.65.120.204 Nmap scan report for 159.65.120.204 Host is up (0.10s latency). Not shown: 1007 closed ports, 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0) | ssh-auth-methods: | Supported authentication methods: |_ publickey Aggressive OS guesses: Linux 2.6.32 - 3.13 (96%), Linux 2.6.22 - 2.6.36 (94%), Linux 3.10 (94%), Linux 3.10 - 4.8 (94%), Linux 2.6.32 (94%), Linux 3.2 - 4.8 (94%), Linux 2.6.32 - 3.10 (93%), HP P2000 G3 NAS device (93%), Linux 2.6.18 (93%), Linux 3.16 - 4.6 (93%) No exact OS matches for host (test conditions non-ideal). Network Distance: 15 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 01:00:15 2021 -- 1 IP address (1 host up) scanned in 11.72 seconds