# Nmap 7.60 scan initiated Sat Nov 23 00:13:12 2019 as: nmap --privileged -oA data/natlas.67vnje9sim92axk9/nmap.67vnje9sim92axk9 --servicedb ./natlas-services -sV -O --script=default,ssh-auth-methods,ssl-enum-ciphers --open --script-timeout=60 --host-timeout=600 --osscan-limit 74.6.160.73 Nmap scan report for pr-west.pbp.vip.gq1.yahoo.com (74.6.160.73) Host is up (0.071s latency). Not shown: 1837 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 80/tcp open http-proxy Apache Traffic Server |_http-open-proxy: Proxy might be redirecting requests | http-robots.txt: 1 disallowed entry |_/ |_http-server-header: ATS |_http-title: Site doesn't have a title (text/html). 443/tcp open ssl/http-proxy Apache Traffic Server | http-robots.txt: 1 disallowed entry |_/ |_http-server-header: ATS |_http-title: Site doesn't have a title (text/html). | ssl-cert: Subject: commonName=*.ybp.yahoo.com/organizationName=Oath Inc/stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:*.ybp.yahoo.com, DNS:ybp.yahoo.com | Not valid before: 2019-08-07T00:00:00 |_Not valid after: 2020-02-03T12:00:00 |_ssl-date: TLS randomness does not represent time | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | compressors: | NULL | cipher preference: server | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | compressors: | NULL | cipher preference: server | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | compressors: | NULL | cipher preference: server | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack |_ least strength: C | tls-nextprotoneg: | h2 | http/1.1 |_ http/1.0 Read from .: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sat Nov 23 00:17:23 2019 -- 1 IP address (1 host up) scanned in 252.86 seconds