Scan report for "92.27.115.18"
Port scan (nmap -sV -p 21,22,25,80,110,143,443,445 92.27.115.18)
Starting Nmap 7.80 ( https://nmap.org ) at 2024-10-29 20:58 EDT Nmap scan report for host-92-27-115-18.static.as13285.net (92.27.115.18) Host is up (0.12s latency). PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.2 22/tcp filtered ssh 25/tcp filtered smtp 80/tcp open http 110/tcp filtered pop3 143/tcp filtered imap 443/tcp filtered https 445/tcp filtered microsoft-ds 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.80%I=7%D=10/29%Time=672184AC%P=x86_64-pc-linux-gnu%r(Get SF:Request,110,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nX-Frame-Option SF:s:\x20SAMEORIGIN\r\nContent-Security-Policy:\x20frame-ancestors\x20'sel SF:f'\r\nX-XSS-Protection:\x201;\x20mode=block\r\nStrict-Transport-Securit SF:y:\x20max-age=63072000\r\nlocation:\x20https://:8443/\r\nDate:\x20Wed,\ SF:x2030\x20Oct\x202024\x2000:58:20\x20GMT\r\nConnection:\x20close\r\n\r\n SF:")%r(HTTPOptions,110,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nX-Fra SF:me-Options:\x20SAMEORIGIN\r\nContent-Security-Policy:\x20frame-ancestor SF:s\x20'self'\r\nX-XSS-Protection:\x201;\x20mode=block\r\nStrict-Transpor SF:t-Security:\x20max-age=63072000\r\nlocation:\x20https://:8443/\r\nDate: SF:\x20Wed,\x2030\x20Oct\x202024\x2000:58:21\x20GMT\r\nConnection:\x20clos SF:e\r\n\r\n")%r(RTSPRequest,110,"HTTP/1\.1\x20301\x20Moved\x20Permanently SF:\r\nX-Frame-Options:\x20SAMEORIGIN\r\nContent-Security-Policy:\x20frame SF:-ancestors\x20'self'\r\nX-XSS-Protection:\x201;\x20mode=block\r\nStrict SF:-Transport-Security:\x20max-age=63072000\r\nlocation:\x20https://:8443/ SF:\r\nDate:\x20Wed,\x2030\x20Oct\x202024\x2000:58:21\x20GMT\r\nConnection SF::\x20close\r\n\r\n")%r(X11Probe,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\ SF:r\nConnection:\x20close\r\n\r\n")%r(FourOhFourRequest,133,"HTTP/1\.1\x2 SF:0301\x20Moved\x20Permanently\r\nX-Frame-Options:\x20SAMEORIGIN\r\nConte SF:nt-Security-Policy:\x20frame-ancestors\x20'self'\r\nX-XSS-Protection:\x SF:201;\x20mode=block\r\nStrict-Transport-Security:\x20max-age=63072000\r\ SF:nlocation:\x20https://:8443/nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\nDat SF:e:\x20Wed,\x2030\x20Oct\x202024\x2000:58:21\x20GMT\r\nConnection:\x20cl SF:ose\r\n\r\n")%r(RPCCheck,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConn SF:ection:\x20close\r\n\r\n")%r(DNSVersionBindReqTCP,2F,"HTTP/1\.1\x20400\ SF:x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(DNSStatusRequestT SF:CP,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r SF:\n")%r(Help,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20cl SF:ose\r\n\r\n")%r(SSLSessionReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ SF:nConnection:\x20close\r\n\r\n"); Service Info: OS: Unix Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 24.36 seconds
Color Scheme
- Target
-
Scan type
Port scan
-
Nmap Command
nmap -sV -p 21,22,25,80,110,143,443,445 92.27.115.18
-
Scan date
29 Oct 2024 20:58
- API - Scan ID
-
Copy scan report
- Download report
- Remove scan result
- Total scans