# Nmap 7.60 scan initiated Thu Jan 14 00:59:42 2021 as: nmap --privileged -oA /data/scans/natlas.7c8a99cd5d011d77bbf936457f0eb8a1/nmap.7c8a99cd5d011d77bbf936457f0eb8a1 --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 167.99.6.148 Nmap scan report for 167.99.6.148 Host is up (0.0073s latency). Not shown: 1005 closed ports, 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0) | ssh-auth-methods: | Supported authentication methods: | publickey |_ password | ssh-hostkey: | 2048 8a:9f:6d:23:23:f9:32:91:61:c4:c6:ca:56:df:9c:b1 (RSA) | 256 33:2c:26:5f:ef:72:2c:01:b5:7a:e7:1e:7a:00:ac:9d (ECDSA) |_ 256 e8:4a:3b:0b:27:f9:2c:b7:67:9b:36:26:a9:80:2a:7c (EdDSA) 80/tcp open http Apache httpd 2.4.18 |_http-server-header: Apache/2.4.18 (Ubuntu) |_http-title: Did not follow redirect to https://intelfinder.io/ 443/tcp open ssl/http Apache httpd 2.4.18 ((Ubuntu)) | http-robots.txt: 1 disallowed entry |_/wp-admin/ |_http-server-header: Apache/2.4.18 (Ubuntu) |_http-title: Did not follow redirect to https://intelfinder.io/ | ssl-cert: Subject: commonName=intelfinder.io | Subject Alternative Name: DNS:intelfinder.io | Not valid before: 2020-11-16T18:51:41 |_Not valid after: 2021-02-14T18:51:41 | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (brainpoolP256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (brainpoolP256r1) - A | compressors: | NULL | cipher preference: client |_ least strength: A Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.10 - 4.8 Network Distance: 12 hops Service Info: Host: intelfinder.io; OS: Linux; CPE: cpe:/o:linux:linux_kernel Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 01:00:05 2021 -- 1 IP address (1 host up) scanned in 22.55 seconds