# Nmap 7.60 scan initiated Thu Jan 14 01:01:18 2021 as: nmap --privileged -oA /data/scans/natlas.05ec0a95e00430b9c12ab9dd3d882588/nmap.05ec0a95e00430b9c12ab9dd3d882588 --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 167.99.69.181 Nmap scan report for 167.99.69.181 Host is up (0.26s latency). Not shown: 1007 filtered ports, 1 closed port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-auth-methods: | Supported authentication methods: |_ publickey | ssh-hostkey: | 2048 4a:76:39:94:4d:32:5d:4b:39:8a:63:4b:aa:93:4f:43 (RSA) | 256 59:3a:7c:c6:aa:69:e3:09:af:e6:73:c8:99:d0:c2:83 (ECDSA) |_ 256 00:76:16:90:4a:12:71:0c:39:fd:16:d1:78:97:f1:40 (EdDSA) Aggressive OS guesses: Linux 3.10 - 4.8 (97%), Linux 3.2 - 4.8 (96%), Linux 2.6.32 - 3.13 (94%), Linux 3.16 - 4.6 (94%), Linux 2.6.22 - 2.6.36 (92%), Linux 3.10 (92%), Linux 2.6.39 (92%), Linux 2.6.32 (91%), Linux 2.6.32 - 3.10 (91%), Linux 4.4 (90%) No exact OS matches for host (test conditions non-ideal). Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 01:01:53 2021 -- 1 IP address (1 host up) scanned in 35.19 seconds