# Nmap 7.60 scan initiated Thu Jan 14 16:56:33 2021 as: nmap --privileged -oA /data/scans/natlas.e5543b4b6492294aacb21f7f29596502/nmap.e5543b4b6492294aacb21f7f29596502 --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 167.71.166.248 Nmap scan report for 167.71.166.248 Host is up (0.0077s latency). Not shown: 1004 closed ports, 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-auth-methods: | Supported authentication methods: |_ publickey | ssh-hostkey: | 2048 83:5c:ae:b5:ad:c7:75:3c:3f:6b:54:69:cc:5a:c1:3b (RSA) | 256 49:a3:4f:af:06:b3:2c:30:b4:20:3c:78:5c:d4:cd:94 (ECDSA) |_ 256 ad:b5:94:bf:2f:a5:b1:8c:a7:a3:4f:55:97:d0:6c:27 (EdDSA) 80/tcp open http nginx |_http-server-header: nginx |_http-title: Did not follow redirect to https://167.71.166.248:443/ 81/tcp open http nginx |_http-server-header: nginx |_http-title: Redirect 443/tcp open ssl/http nginx |_http-server-header: nginx | http-title: UNMS 1.2.7 |_Requested resource was https://167.71.166.248/nms/login | ssl-cert: Subject: commonName=unmsapp.com | Subject Alternative Name: DNS:unmsapp.com, DNS:*.dev.unmsapp.com, DNS:*.stg.unmsapp.com, DNS:*.unmsapp.com | Not valid before: 2020-09-18T00:00:00 |_Not valid after: 2021-06-28T23:59:59 |_ssl-date: TLS randomness does not represent time | ssl-enum-ciphers: | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A | tls-nextprotoneg: |_ http/1.1 Aggressive OS guesses: Linux 3.10 - 4.8 (98%), Linux 3.2 - 4.8 (97%), Linux 3.16 - 4.6 (96%), Linux 2.6.32 - 3.13 (96%), Linux 2.6.22 - 2.6.36 (94%), Linux 3.10 (94%), Linux 4.4 (94%), Linux 2.6.32 (94%), Linux 2.6.32 - 3.10 (93%), HP P2000 G3 NAS device (93%) No exact OS matches for host (test conditions non-ideal). Network Distance: 13 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 16:56:54 2021 -- 1 IP address (1 host up) scanned in 21.06 seconds