# Nmap 7.60 scan initiated Thu Jan 14 16:58:45 2021 as: nmap --privileged -oA /data/scans/natlas.e476546d220c778a2a6255a43f3b9d17/nmap.e476546d220c778a2a6255a43f3b9d17 --servicedb /data/conf/natlas-services -sV -O --script=default,ssl-enum-ciphers,ssh-auth-methods --open --script-timeout=60 --host-timeout=600 --osscan-limit -Pn 206.189.5.24 Nmap scan report for 206.189.5.24 Host is up (0.094s latency). Not shown: 1007 closed ports, 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-auth-methods: | Supported authentication methods: |_ publickey | ssh-hostkey: | 2048 0d:13:7c:79:3a:46:d7:8f:23:be:74:3f:d3:f5:49:81 (RSA) | 256 25:bd:40:f5:31:00:6a:04:5a:5f:5a:ec:f0:fe:82:df (ECDSA) |_ 256 9e:68:fd:9e:d8:12:87:2e:0d:2f:7f:64:c3:67:31:1c (EdDSA) Aggressive OS guesses: Linux 2.6.32 - 3.13 (96%), Linux 2.6.22 - 2.6.36 (94%), Linux 3.10 (94%), Linux 3.10 - 4.8 (94%), Linux 2.6.32 (94%), Linux 3.2 - 4.8 (94%), Linux 2.6.32 - 3.10 (93%), HP P2000 G3 NAS device (93%), Linux 2.6.18 (93%), Linux 3.16 - 4.6 (93%) No exact OS matches for host (test conditions non-ideal). Network Distance: 14 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Read from /data/conf: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 14 16:58:56 2021 -- 1 IP address (1 host up) scanned in 11.20 seconds