# Nmap 7.60 scan initiated Fri Nov 22 22:32:42 2019 as: nmap --privileged -oA data/natlas.en7jsco434nr9m5l/nmap.en7jsco434nr9m5l --servicedb ./natlas-services -sV -O --script=default,ssh-auth-methods,ssl-enum-ciphers --open --script-timeout=60 --host-timeout=600 --osscan-limit 68.180.240.49 Nmap scan report for jpop300-pri.mail.vip.gq1.yahoo.com (68.180.240.49) Host is up (0.070s latency). Not shown: 1838 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 995/tcp open ssl/pop3 | fingerprint-strings: | GenericLines, GetRequest, HTTPOptions: | +OK Hello from jpop-0.1 | -ERR Invalid Command. | -ERR Invalid Command. | NULL: |_ +OK Hello from jpop-0.1 |_pop3-capabilities: IMPLEMENTATION(jpop-0) | ssl-cert: Subject: commonName=legacy.pop.mail.yahoo.com/organizationName=Oath Inc/stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:legacy.pop.mail.yahoo.com, DNS:pop.mail.yahoo.com, DNS:*.pop.mail.yahoo.com, DNS:pop.bizmail.yahoo.com, DNS:pop.mail.yahoo.com.ar, DNS:pop.mail.yahoo.com.au, DNS:pop.mail.yahoo.com.br, DNS:pop.mail.yahoo.com.hk, DNS:pop.mail.yahoo.com.my, DNS:pop.mail.yahoo.com.ph, DNS:pop.mail.yahoo.com.sg, DNS:pop.mail.yahoo.com.tw, DNS:pop.mail.yahoo.com.vn, DNS:pop.mail.yahoo.co.id, DNS:pop.mail.yahoo.co.in, DNS:pop.mail.yahoo.co.kr, DNS:pop.mail.yahoo.co.th, DNS:pop.mail.yahoo.co.uk, DNS:pop.mail.yahoo.ca, DNS:pop.mail.yahoo.de, DNS:pop.mail.yahoo.fr, DNS:pop.mail.yahoo.in, DNS:pop.mail.yahoo.it, DNS:pop.correo.yahoo.es, DNS:pop.y7mail.com, DNS:pop.att.yahoo.com | Not valid before: 2019-06-18T00:00:00 |_Not valid after: 2019-12-15T12:00:00 |_ssl-date: TLS randomness does not represent time | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | compressors: | NULL | cipher preference: server | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | compressors: | NULL | cipher preference: server | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256k1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256k1) - A | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack |_ least strength: C 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port995-TCP:V=7.60%T=SSL%I=7%D=11/22%Time=5DD86224%P=x86_64-pc-linux-gn SF:u%r(NULL,19,"\+OK\x20Hello\x20from\x20jpop-0\.1\r\n")%r(GenericLines,47 SF:,"\+OK\x20Hello\x20from\x20jpop-0\.1\r\n-ERR\x20Invalid\x20Command\.\r\ SF:n-ERR\x20Invalid\x20Command\.\r\n")%r(GetRequest,47,"\+OK\x20Hello\x20f SF:rom\x20jpop-0\.1\r\n-ERR\x20Invalid\x20Command\.\r\n-ERR\x20Invalid\x20 SF:Command\.\r\n")%r(HTTPOptions,47,"\+OK\x20Hello\x20from\x20jpop-0\.1\r\ SF:n-ERR\x20Invalid\x20Command\.\r\n-ERR\x20Invalid\x20Command\.\r\n"); Read from .: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Fri Nov 22 22:33:31 2019 -- 1 IP address (1 host up) scanned in 49.93 seconds