# Nmap 7.60 scan initiated Thu Jan 14 01:00:45 2021 as: nmap --privileged -oA /data/scans/natlas.ed9b330344d13b0a59af855afa68d2fd/nmap.ed9b330344d13b0a59af855afa68d2fd --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 206.189.228.234 Nmap scan report for flatworldonline.wpmudev.host (206.189.228.234) Host is up (0.0076s latency). Not shown: 1006 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 (protocol 2.0) | ssh-auth-methods: | Supported authentication methods: | publickey | password |_ keyboard-interactive 80/tcp open http nginx |_http-server-header: nginx |_http-title: Did not follow redirect to https://flatworldonline.wpmudev.host/ 443/tcp open ssl/http nginx | http-robots.txt: 1 disallowed entry |_/ |_http-server-header: nginx |_http-title: Did not follow redirect to https://flatworldonline.com/ | ssl-cert: Subject: commonName=*.wpmudev.host | Subject Alternative Name: DNS:*.wpmudev.host, DNS:wpmudev.host | Not valid before: 2020-08-24T00:00:00 |_Not valid after: 2021-09-25T00:00:00 | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 01:01:19 2021 -- 1 IP address (1 host up) scanned in 34.33 seconds