# Nmap 7.60 scan initiated Thu Jan 14 16:56:37 2021 as: nmap --privileged -oA /data/scans/natlas.57370cd6f351c56d75dc075bd996fadd/nmap.57370cd6f351c56d75dc075bd996fadd --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 165.22.214.107 Nmap scan report for deerandbear.coffee (165.22.214.107) Host is up (0.20s latency). Not shown: 1004 closed ports, 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-auth-methods: | Supported authentication methods: |_ publickey | ssh-hostkey: | 2048 cd:99:3f:1c:74:5a:3c:b6:a8:ba:2c:58:cf:3a:b3:7c (RSA) | 256 d4:ba:bc:57:3d:98:eb:30:13:48:a1:09:83:0e:8e:ad (ECDSA) |_ 256 77:da:08:61:fc:f0:18:52:01:d1:ff:58:95:62:aa:91 (EdDSA) 80/tcp open http nginx 1.14.0 (Ubuntu) |_http-server-header: nginx/1.14.0 (Ubuntu) |_http-title: Did not follow redirect to https://deerandbear.coffee/ 443/tcp open ssl/http nginx |_http-generator: WordPress 5.5.1 | http-git: | 165.22.214.107:443/.git/ | Git repository found! | .gitignore matched patterns 'bug' | Repository description: Unnamed repository; edit this file 'description' to name the... | Last commit message: catchup | Remotes: | git@bitbucket.org:shawnhart/deer-and-bear.git |_ Project type: node.js application (guessed from .gitignore) |_http-server-header: nginx |_http-title: Home - the Deer & the Bear | ssl-cert: Subject: commonName=deerandbear.coffee | Subject Alternative Name: DNS:deerandbear.coffee, DNS:www.deerandbear.coffee | Not valid before: 2019-10-11T20:28:35 |_Not valid after: 2020-01-09T20:28:35 |_ssl-date: TLS randomness does not represent time | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A | tls-nextprotoneg: |_ http/1.1 3306/tcp open mysql MySQL (unauthorized) Aggressive OS guesses: Linux 2.6.32 - 3.13 (93%), Ubiquiti AirMax NanoStation WAP (Linux 2.6.32) (93%), Linux 2.6.22 - 2.6.36 (91%), Linux 3.10 - 4.8 (91%), Linux 3.10 (91%), Linux 2.6.32 (90%), Linux 3.2 - 4.8 (90%), Linux 2.6.32 - 3.10 (90%), Linux 2.6.18 (90%), Linux 3.16 - 4.6 (90%) No exact OS matches for host (test conditions non-ideal). Network Distance: 14 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 16:57:40 2021 -- 1 IP address (1 host up) scanned in 63.47 seconds