# Nmap 7.60 scan initiated Thu Jan 14 01:00:26 2021 as: nmap --privileged -oA /data/scans/natlas.62c57d675a78d690efabb034c483894c/nmap.62c57d675a78d690efabb034c483894c --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 165.227.5.117 Nmap scan report for 165.227.5.117 Host is up (0.066s latency). Not shown: 1006 filtered ports, 1 closed port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open tcpwrapped |_ssh-auth-methods: ERROR: Script execution failed (use -d to debug) 80/tcp open http Apache httpd 2.4.18 | http-auth: | HTTP/1.1 401 Unauthorized\x0D |_ Basic realm=Restricted Files |_http-server-header: Apache/2.4.18 (Ubuntu) |_http-title: 401 Unauthorized Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.10 - 4.8 Service Info: Host: 127.0.1.1 Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 01:00:49 2021 -- 1 IP address (1 host up) scanned in 22.53 seconds