Scan report for "207.188.164.63"

Port scan (nmap -sV -p 21,22,25,80,110,143,443,445 207.188.164.63)
Starting Nmap 7.80 ( https://nmap.org ) at 2023-03-19 20:05 EDT
Nmap scan report for 207.188.164.63
Host is up (0.14s latency).

PORT    STATE SERVICE       VERSION
21/tcp  open  ftp           vsftpd 2.0.8 or later
22/tcp  open  ssh           OpenSSH 7.9p1 (protocol 2.0)
25/tcp  open  smtp          Exim smtpd 4.81
80/tcp  open  http          aiohttp 3.8.3 (Python 3.10)
110/tcp open  pop3?
143/tcp open  imap?
443/tcp open  ssl/https?
445/tcp open  microsoft-ds?
4 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port110-TCP:V=7.80%I=7%D=3/19%Time=6417A353%P=x86_64-pc-linux-gnu%r(NUL
SF:L,16,"\+OK\x20POP3\x20server\x20ready\n")%r(GenericLines,40,"\+OK\x20PO
SF:P3\x20server\x20ready\n-ERR\x20Unknown\x20command\n-ERR\x20Unknown\x20c
SF:ommand\n")%r(GetRequest,40,"\+OK\x20POP3\x20server\x20ready\n-ERR\x20Un
SF:known\x20command\n-ERR\x20Unknown\x20command\n")%r(HTTPOptions,40,"\+OK
SF:\x20POP3\x20server\x20ready\n-ERR\x20Unknown\x20command\n-ERR\x20Unknow
SF:n\x20command\n")%r(RTSPRequest,40,"\+OK\x20POP3\x20server\x20ready\n-ER
SF:R\x20Unknown\x20command\n-ERR\x20Unknown\x20command\n")%r(RPCCheck,16,"
SF:\+OK\x20POP3\x20server\x20ready\n")%r(DNSVersionBindReqTCP,16,"\+OK\x20
SF:POP3\x20server\x20ready\n")%r(DNSStatusRequestTCP,16,"\+OK\x20POP3\x20s
SF:erver\x20ready\n")%r(Help,2B,"\+OK\x20POP3\x20server\x20ready\n-ERR\x20
SF:Unknown\x20command\n")%r(SSLSessionReq,16,"\+OK\x20POP3\x20server\x20re
SF:ady\n")%r(TerminalServerCookie,16,"\+OK\x20POP3\x20server\x20ready\n")%
SF:r(TLSSessionReq,16,"\+OK\x20POP3\x20server\x20ready\n")%r(Kerberos,16,"
SF:\+OK\x20POP3\x20server\x20ready\n")%r(SMBProgNeg,16,"\+OK\x20POP3\x20se
SF:rver\x20ready\n")%r(X11Probe,16,"\+OK\x20POP3\x20server\x20ready\n")%r(
SF:FourOhFourRequest,40,"\+OK\x20POP3\x20server\x20ready\n-ERR\x20Unknown\
SF:x20command\n-ERR\x20Unknown\x20command\n")%r(LPDString,2B,"\+OK\x20POP3
SF:\x20server\x20ready\n-ERR\x20Unknown\x20command\n")%r(LDAPSearchReq,16,
SF:"\+OK\x20POP3\x20server\x20ready\n")%r(LDAPBindReq,16,"\+OK\x20POP3\x20
SF:server\x20ready\n")%r(SIPOptions,FD,"\+OK\x20POP3\x20server\x20ready\n-
SF:ERR\x20Unknown\x20command\n-ERR\x20Unknown\x20command\n-ERR\x20Unknown\
SF:x20command\n-ERR\x20Unknown\x20command\n-ERR\x20Unknown\x20command\n-ER
SF:R\x20Unknown\x20command\n-ERR\x20Unknown\x20command\n-ERR\x20Unknown\x2
SF:0command\n-ERR\x20Unknown\x20command\n-ERR\x20Unknown\x20command\n-ERR\
SF:x20Unknown\x20command\n")%r(LANDesk-RC,16,"\+OK\x20POP3\x20server\x20re
SF:ady\n")%r(TerminalServer,16,"\+OK\x20POP3\x20server\x20ready\n")%r(NCP,
SF:16,"\+OK\x20POP3\x20server\x20ready\n")%r(NotesRPC,16,"\+OK\x20POP3\x20
SF:server\x20ready\n")%r(JavaRMI,16,"\+OK\x20POP3\x20server\x20ready\n")%r
SF:(WMSRequest,16,"\+OK\x20POP3\x20server\x20ready\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port143-TCP:V=7.80%I=7%D=3/19%Time=6417A353%P=x86_64-pc-linux-gnu%r(NUL
SF:L,1D,"\*\x20OK\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(GetRequest,4D,"\
SF:*\x20OK\x20IMAP4rev1\x20Server\x20Ready\r\nGET\x20BAD\x20invalid\x20com
SF:mand\r\n\*\x20BAD\x20invalid\x20command\r\n")%r(GenericLines,4B,"\*\x20
SF:OK\x20IMAP4rev1\x20Server\x20Ready\r\n\*\x20BAD\x20invalid\x20command\r
SF:\n\*\x20BAD\x20invalid\x20command\r\n")%r(HTTPOptions,51,"\*\x20OK\x20I
SF:MAP4rev1\x20Server\x20Ready\r\nOPTIONS\x20BAD\x20invalid\x20command\r\n
SF:\*\x20BAD\x20invalid\x20command\r\n")%r(RTSPRequest,51,"\*\x20OK\x20IMA
SF:P4rev1\x20Server\x20Ready\r\nOPTIONS\x20BAD\x20invalid\x20command\r\n\*
SF:\x20BAD\x20invalid\x20command\r\n")%r(RPCCheck,1D,"\*\x20OK\x20IMAP4rev
SF:1\x20Server\x20Ready\r\n")%r(DNSVersionBindReqTCP,1D,"\*\x20OK\x20IMAP4
SF:rev1\x20Server\x20Ready\r\n")%r(DNSStatusRequestTCP,1D,"\*\x20OK\x20IMA
SF:P4rev1\x20Server\x20Ready\r\n")%r(Help,34,"\*\x20OK\x20IMAP4rev1\x20Ser
SF:ver\x20Ready\r\n\*\x20BAD\x20invalid\x20command\r\n")%r(SSLSessionReq,1
SF:D,"\*\x20OK\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(TerminalServerCooki
SF:e,1D,"\*\x20OK\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(TLSSessionReq,1D
SF:,"\*\x20OK\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(Kerberos,1D,"\*\x20O
SF:K\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(SMBProgNeg,1D,"\*\x20OK\x20IM
SF:AP4rev1\x20Server\x20Ready\r\n")%r(X11Probe,1D,"\*\x20OK\x20IMAP4rev1\x
SF:20Server\x20Ready\r\n")%r(FourOhFourRequest,4D,"\*\x20OK\x20IMAP4rev1\x
SF:20Server\x20Ready\r\nGET\x20BAD\x20invalid\x20command\r\n\*\x20BAD\x20i
SF:nvalid\x20command\r\n")%r(LPDString,34,"\*\x20OK\x20IMAP4rev1\x20Server
SF:\x20Ready\r\n\*\x20BAD\x20invalid\x20command\r\n")%r(LDAPSearchReq,1D,"
SF:\*\x20OK\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(LDAPBindReq,1D,"\*\x20
SF:OK\x20IMAP4rev1\x20Server\x20Ready\r\n")%r(SIPOptions,15B,"\*\x20OK\x20
SF:IMAP4rev1\x20Server\x20Ready\r\nOPTIONS\x20BAD\x20invalid\x20command\r\
SF:nVia:\x20BAD\x20invalid\x20command\r\nFrom:\x20BAD\x20invalid\x20comman
SF:d\r\nTo:\x20BAD\x20invalid\x20command\r\nCall-ID:\x20BAD\x20invalid\x20
SF:command\r\nCSeq:\x20BAD\x20invalid\x20command\r\nMax-Forwards:\x20BAD\x
SF:20invalid\x20command\r\nContent-Length:\x20BAD\x20invalid\x20command\r\
SF:nContact:\x20BAD\x20invalid\x20command\r\nAccept:\x20BAD\x20invalid\x20
SF:command\r\n\*\x20BAD\x20invalid\x20command\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.80%T=SSL%I=7%D=3/19%Time=6417A35A%P=x86_64-pc-linux-gnu
SF:%r(HTTPOptions,2C,"HTTP/1\.1\x20Unsupported\x20method\x20\('OPTIONS'\)\
SF:x20OK\r\n")%r(RTSPRequest,2E,"HTTP/1\.1\x20Bad\x20request\x20version\x2
SF:0\('RTSP/1\.0'\)\x20OK\r\n")%r(Help,29,"HTTP/1\.1\x20Bad\x20request\x20
SF:syntax\x20\('HELP'\)\x20OK\r\n")%r(SSLSessionReq,A7,"HTTP/1\.1\x20Bad\x
SF:20request\x20syntax\x20\('\\x16\\x03\\x00\\x00S\\x01\\x00\\x00O\\x03\\x
SF:00\?G\xc3\x97\xc3\xb7\xc2\xba,\xc3\xae\xc3\xaa\xc2\xb2`~\xc3\xb3\\x00\x
SF:c3\xbd\\x82{\xc2\xb9\xc3\x95\\x96\xc3\x88w\\x9b\xc3\xa6\xc3\x84\xc3\x9b
SF:<=\xc3\x9bo\xc3\xaf\\x10n\\x00\\x00\(\\x00\\x16\\x00\\x13\\x00'\)\x20OK
SF:\r\n")%r(TerminalServerCookie,57,"HTTP/1\.1\x20Bad\x20HTTP/0\.9\x20requ
SF:est\x20type\x20\('\\x03\\x00\\x00\*%\xc3\xa0\\x00\\x00\\x00\\x00\\x00Co
SF:okie:'\)\x20OK\r\n")%r(TLSSessionReq,2F,"HTTP/1\.1\x20Bad\x20request\x2
SF:0version\x20\('\\x00/\\x00'\)\x20OK\r\n")%r(Kerberos,5E,"HTTP/1\.1\x20B
SF:ad\x20request\x20syntax\x20\('\\x00\\x00\\x00qj\\x81n0\\x81k\xc2\xa1\\x
SF:03\\x02\\x01\\x05\xc2\xa2\\x03\\x02\\x01'\)\x20OK\r\n")%r(LPDString,30,
SF:"HTTP/1\.1\x20Bad\x20request\x20syntax\x20\('\\x01default'\)\x20OK\r\n"
SF:)%r(LDAPSearchReq,5D,"HTTP/1\.1\x20Bad\x20request\x20syntax\x20\('0\\x8
SF:4\\x00\\x00\\x00-\\x02\\x01\\x07c\\x84\\x00\\x00\\x00\$\\x04\\x00'\)\x2
SF:0OK\r\n")%r(SIPOptions,2D,"HTTP/1\.1\x20Bad\x20request\x20version\x20\(
SF:'SIP/2\.0'\)\x20OK\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port445-TCP:V=7.80%I=7%D=3/19%Time=6417A358%P=x86_64-pc-linux-gnu%r(SMB
SF:ProgNeg,5D,"\0\0\0Y\xffSMBr\0\0\0\0\x98\x01@\0\0\0\0\0\0\0\0\0\0\0\0\xf
SF:f\xff@\x06\0\0\x01\0\x11\x07\0\x03\x01\0\x01\0\0\x10\0\0\0\0\x01\0\0\0\
SF:0\0\xfd\xe3\0\0\x1a:0\x83\xb3Z\xd9\x01\xc4\xff\0\x14\0D\0A\0C\0H\0\0\0A
SF:\0D\0F\0S\0\0\0");
Service Info: Host: mailrelay.local

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 129.11 seconds
Color Scheme
Target
Scan type
Port scan
Nmap Command
nmap -sV -p 21,22,25,80,110,143,443,445 207.188.164.63
Scan date
19 Mar 2023 20:05
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)