Escanear informe para "207.188.164.63"

Escaneo de puertos (nmap -sV -p 21,22,25,80,110,143,443,445 207.188.164.63)
Starting Nmap 7.80 ( https://nmap.org ) at 2023-03-19 20:05 EDT
Nmap scan report for 207.188.164.63
Host is up (0.14s latency).

PORT    STATE SERVICE       VERSION
21/tcp  open  ftp           vsftpd 2.0.8 or later
22/tcp  open  ssh           OpenSSH 7.9p1 (protocol 2.0)
25/tcp  open  smtp          Exim smtpd 4.81
80/tcp  open  http          aiohttp 3.8.3 (Python 3.10)
110/tcp open  pop3?
143/tcp open  imap?
443/tcp open  ssl/https?
445/tcp open  microsoft-ds?
4 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port110-TCP:V=7.80%I=7%D=3/19%Time=6417A353%P=x86_64-pc-linux-gnu%r(NUL
SF:L,16,"\+OK\x20POP3\x20server\x20ready\n")%r(GenericLines,40,"\+OK\x20PO
SF:P3\x20server\x20ready\n-ERR\x20Unknown\x20command\n-ERR\x20Unknown\x20c
SF:ommand\n")%r(GetRequest,40,"\+OK\x20POP3\x20server\x20ready\n-ERR\x20Un
SF:known\x20command\n-ERR\x20Unknown\x20command\n")%r(HTTPOptions,40,"\+OK
SF:\x20POP3\x20server\x20ready\n-ERR\x20Unknown\x20command\n-ERR\x20Unknow
SF:n\x20command\n")%r(RTSPRequest,40,"\+OK\x20POP3\x20server\x20ready\n-ER
SF:R\x20Unknown\x20command\n-ERR\x20Unknown\x20command\n")%r(RPCCheck,16,"
SF:\+OK\x20POP3\x20server\x20ready\n")%r(DNSVersionBindReqTCP,16,"\+OK\x20
SF:POP3\x20server\x20ready\n")%r(DNSStatusRequestTCP,16,"\+OK\x20POP3\x20s
SF:erver\x20ready\n")%r(Help,2B,"\+OK\x20POP3\x20server\x20ready\n-ERR\x20
SF:Unknown\x20command\n")%r(SSLSessionReq,16,"\+OK\x20POP3\x20server\x20re
SF:ady\n")%r(TerminalServerCookie,16,"\+OK\x20POP3\x20server\x20ready\n")%
SF:r(TLSSessionReq,16,"\+OK\x20POP3\x20server\x20ready\n")%r(Kerberos,16,"
SF:\+OK\x20POP3\x20server\x20ready\n")%r(SMBProgNeg,16,"\+OK\x20POP3\x20se
SF:rver\x20ready\n")%r(X11Probe,16,"\+OK\x20POP3\x20server\x20ready\n")%r(
SF:FourOhFourRequest,40,"\+OK\x20POP3\x20server\x20ready\n-ERR\x20Unknown\
SF:x20command\n-ERR\x20Unknown\x20command\n")%r(LPDString,2B,"\+OK\x20POP3
SF:\x20server\x20ready\n-ERR\x20Unknown\x20command\n")%r(LDAPSearchReq,16,
SF:"\+OK\x20POP3\x20server\x20ready\n")%r(LDAPBindReq,16,"\+OK\x20POP3\x20
SF:server\x20ready\n")%r(SIPOptions,FD,"\+OK\x20POP3\x20server\x20ready\n-
SF:ERR\x20Unknown\x20command\n-ERR\x20Unknown\x20command\n-ERR\x20Unknown\
SF:x20command\n-ERR\x20Unknown\x20command\n-ERR\x20Unknown\x20command\n-ER
SF:R\x20Unknown\x20command\n-ERR\x20Unknown\x20command\n-ERR\x20Unknown\x2
SF:0command\n-ERR\x20Unknown\x20command\n-ERR\x20Unknown\x20command\n-ERR\
SF:x20Unknown\x20command\n")%r(LANDesk-RC,16,"\+OK\x20POP3\x20server\x20re
SF:ady\n")%r(TerminalServer,16,"\+OK\x20POP3\x20server\x20ready\n")%r(NCP,
SF:16,"\+OK\x20POP3\x20server\x20ready\n")%r(NotesRPC,16,"\+OK\x20POP3\x20
SF:server\x20ready\n")%r(JavaRMI,16,"\+OK\x20POP3\x20server\x20ready\n")%r
SF:(WMSRequest,16,"\+OK\x20POP3\x20server\x20ready\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port143-TCP:V=7.80%I=7%D=3/19%Time=6417A353%P=x86_64-pc-linux-gnu%r(NUL
SF:L,1D,"\*\x20OK\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(GetRequest,4D,"\
SF:*\x20OK\x20IMAP4rev1\x20Server\x20Ready\r\nGET\x20BAD\x20invalid\x20com
SF:mand\r\n\*\x20BAD\x20invalid\x20command\r\n")%r(GenericLines,4B,"\*\x20
SF:OK\x20IMAP4rev1\x20Server\x20Ready\r\n\*\x20BAD\x20invalid\x20command\r
SF:\n\*\x20BAD\x20invalid\x20command\r\n")%r(HTTPOptions,51,"\*\x20OK\x20I
SF:MAP4rev1\x20Server\x20Ready\r\nOPTIONS\x20BAD\x20invalid\x20command\r\n
SF:\*\x20BAD\x20invalid\x20command\r\n")%r(RTSPRequest,51,"\*\x20OK\x20IMA
SF:P4rev1\x20Server\x20Ready\r\nOPTIONS\x20BAD\x20invalid\x20command\r\n\*
SF:\x20BAD\x20invalid\x20command\r\n")%r(RPCCheck,1D,"\*\x20OK\x20IMAP4rev
SF:1\x20Server\x20Ready\r\n")%r(DNSVersionBindReqTCP,1D,"\*\x20OK\x20IMAP4
SF:rev1\x20Server\x20Ready\r\n")%r(DNSStatusRequestTCP,1D,"\*\x20OK\x20IMA
SF:P4rev1\x20Server\x20Ready\r\n")%r(Help,34,"\*\x20OK\x20IMAP4rev1\x20Ser
SF:ver\x20Ready\r\n\*\x20BAD\x20invalid\x20command\r\n")%r(SSLSessionReq,1
SF:D,"\*\x20OK\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(TerminalServerCooki
SF:e,1D,"\*\x20OK\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(TLSSessionReq,1D
SF:,"\*\x20OK\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(Kerberos,1D,"\*\x20O
SF:K\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(SMBProgNeg,1D,"\*\x20OK\x20IM
SF:AP4rev1\x20Server\x20Ready\r\n")%r(X11Probe,1D,"\*\x20OK\x20IMAP4rev1\x
SF:20Server\x20Ready\r\n")%r(FourOhFourRequest,4D,"\*\x20OK\x20IMAP4rev1\x
SF:20Server\x20Ready\r\nGET\x20BAD\x20invalid\x20command\r\n\*\x20BAD\x20i
SF:nvalid\x20command\r\n")%r(LPDString,34,"\*\x20OK\x20IMAP4rev1\x20Server
SF:\x20Ready\r\n\*\x20BAD\x20invalid\x20command\r\n")%r(LDAPSearchReq,1D,"
SF:\*\x20OK\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(LDAPBindReq,1D,"\*\x20
SF:OK\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(SIPOptions,15B,"\*\x20OK\x20
SF:IMAP4rev1\x20Server\x20Ready\r\nOPTIONS\x20BAD\x20invalid\x20command\r\
SF:nVia:\x20BAD\x20invalid\x20command\r\nFrom:\x20BAD\x20invalid\x20comman
SF:d\r\nTo:\x20BAD\x20invalid\x20command\r\nCall-ID:\x20BAD\x20invalid\x20
SF:command\r\nCSeq:\x20BAD\x20invalid\x20command\r\nMax-Forwards:\x20BAD\x
SF:20invalid\x20command\r\nContent-Length:\x20BAD\x20invalid\x20command\r\
SF:nContact:\x20BAD\x20invalid\x20command\r\nAccept:\x20BAD\x20invalid\x20
SF:command\r\n\*\x20BAD\x20invalid\x20command\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.80%T=SSL%I=7%D=3/19%Time=6417A35A%P=x86_64-pc-linux-gnu
SF:%r(HTTPOptions,2C,"HTTP/1\.1\x20Unsupported\x20method\x20\('OPTIONS'\)\
SF:x20OK\r\n")%r(RTSPRequest,2E,"HTTP/1\.1\x20Bad\x20request\x20version\x2
SF:0\('RTSP/1\.0'\)\x20OK\r\n")%r(Help,29,"HTTP/1\.1\x20Bad\x20request\x20
SF:syntax\x20\('HELP'\)\x20OK\r\n")%r(SSLSessionReq,A7,"HTTP/1\.1\x20Bad\x
SF:20request\x20syntax\x20\('\\x16\\x03\\x00\\x00S\\x01\\x00\\x00O\\x03\\x
SF:00\?G\xc3\x97\xc3\xb7\xc2\xba,\xc3\xae\xc3\xaa\xc2\xb2`~\xc3\xb3\\x00\x
SF:c3\xbd\\x82{\xc2\xb9\xc3\x95\\x96\xc3\x88w\\x9b\xc3\xa6\xc3\x84\xc3\x9b
SF:<=\xc3\x9bo\xc3\xaf\\x10n\\x00\\x00\(\\x00\\x16\\x00\\x13\\x00'\)\x20OK
SF:\r\n")%r(TerminalServerCookie,57,"HTTP/1\.1\x20Bad\x20HTTP/0\.9\x20requ
SF:est\x20type\x20\('\\x03\\x00\\x00\*%\xc3\xa0\\x00\\x00\\x00\\x00\\x00Co
SF:okie:'\)\x20OK\r\n")%r(TLSSessionReq,2F,"HTTP/1\.1\x20Bad\x20request\x2
SF:0version\x20\('\\x00/\\x00'\)\x20OK\r\n")%r(Kerberos,5E,"HTTP/1\.1\x20B
SF:ad\x20request\x20syntax\x20\('\\x00\\x00\\x00qj\\x81n0\\x81k\xc2\xa1\\x
SF:03\\x02\\x01\\x05\xc2\xa2\\x03\\x02\\x01'\)\x20OK\r\n")%r(LPDString,30,
SF:"HTTP/1\.1\x20Bad\x20request\x20syntax\x20\('\\x01default'\)\x20OK\r\n"
SF:)%r(LDAPSearchReq,5D,"HTTP/1\.1\x20Bad\x20request\x20syntax\x20\('0\\x8
SF:4\\x00\\x00\\x00-\\x02\\x01\\x07c\\x84\\x00\\x00\\x00\$\\x04\\x00'\)\x2
SF:0OK\r\n")%r(SIPOptions,2D,"HTTP/1\.1\x20Bad\x20request\x20version\x20\(
SF:'SIP/2\.0'\)\x20OK\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port445-TCP:V=7.80%I=7%D=3/19%Time=6417A358%P=x86_64-pc-linux-gnu%r(SMB
SF:ProgNeg,5D,"\0\0\0Y\xffSMBr\0\0\0\0\x98\x01@\0\0\0\0\0\0\0\0\0\0\0\0\xf
SF:f\xff@\x06\0\0\x01\0\x11\x07\0\x03\x01\0\x01\0\0\x10\0\0\0\0\x01\0\0\0\
SF:0\0\xfd\xe3\0\0\x1a:0\x83\xb3Z\xd9\x01\xc4\xff\0\x14\0D\0A\0C\0H\0\0\0A
SF:\0D\0F\0S\0\0\0");
Service Info: Host: mailrelay.local

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 129.11 seconds
Esquema de color
Objetivo
Tipo de scaneado
Escaneo de puertos
Comando Nmap
nmap -sV -p 21,22,25,80,110,143,443,445 207.188.164.63
Fecha de escaneo
19 Mar 2023 20:05
API - Scan ID
Copiar resultado de escaneo
Descargar resultado
Eliminar resultado de escaneo
$
Escaneos totales
Ingrese el nombre de dominio o la dirección IP y seleccione el método de escaneo. Una vez finalizado el escaneo, obtienes el resultado del escaneo Nmap para tu objetivo.
Algunos firewalls bloquean los escaneos de Nmap. Para obtener verdaderos resultados positivos, agregue las direcciones IP nmap.online (91.214.64.186-91.214.64.187) a la lista blanca
Opciones de escaneo: [scan_type] de [scan_block] con un [scan_output]. Cambiar opciones
Visibilidad:
Tipo de scaneado:

Opciones

Escanear forma:
Producción:
Calendario escaneo:
Calendario escaneo (GMT-4)