# Nmap 7.60 scan initiated Thu Jan 14 01:00:54 2021 as: nmap --privileged -oA /data/scans/natlas.401aa2b16d05d958b29dc900851bfea3/nmap.401aa2b16d05d958b29dc900851bfea3 --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 188.166.91.55 Nmap scan report for bca65b37.customer.hyperhost.co (188.166.91.55) Host is up (0.093s latency). Not shown: 1005 closed ports, 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 80/tcp open http nginx 443/tcp open ssl/http nginx |_http-server-header: nginx |_http-title: 400 The plain HTTP request was sent to HTTPS port | ssl-cert: Subject: commonName=BCA65B37.customer.hyperhost.co/organizationName=HyperHost/stateOrProvinceName=Groningen/countryName=NL | Not valid before: 2018-01-31T15:07:17 |_Not valid after: 2028-01-29T15:07:17 | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 2222/tcp open ssh ProFTPD mod_sftp 0.9.9 (protocol 2.0) | ssh-auth-methods: | Supported authentication methods: |_ password Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.16 - 4.6 Network Distance: 14 hops Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 01:01:32 2021 -- 1 IP address (1 host up) scanned in 38.06 seconds