Scan Report
Nmap 7.91

nmap -n -vvv -sS -sV -sC -p- -oA nmap/version --stylesheet https://jiveturkey.rocks/assets/reports/nmap/nmap-bootstrap.xsl 192.168.9.130

Fri Dec 4 13:19:08 2020 – Fri Dec 4 13:21:53 2020
1 hosts scanned. 1 hosts up. 0 hosts down.

1
0

Scanned Hosts

State Address Hostname TCP (open) UDP (open)
up 192.168.9.130 3 0

Online Hosts

192.168.9.130

Ports

Port Protocol State
Reason
Service Product Version Extra Info
21 tcp open
syn-ack
ftp vsftpd 3.0.3
cpe:/a:vsftpd:vsftpd:3.0.3
ftp-anon
Anonymous FTP login allowed (FTP code 230)
dr-xr-xr-x    2 ftp      ftp          4096 Nov 08 15:29 anon
ftp-syst
  STAT:
FTP server status:
     Connected to ::ffff:192.168.9.129
     Logged in as ftp
     TYPE: ASCII
     No session bandwidth limit
     Session timeout in seconds is 300
     Control connection is plain text
     Data connections will be plain text
     At session startup, client count was 1
     vsFTPd 3.0.3 - secure, fast, stable
End of status
22 tcp open
syn-ack
ssh OpenSSH 7.9p1 Debian 10+deb10u2 protocol 2.0
cpe:/a:openbsd:openssh:7.9p1
ssh-hostkey
  2048 43:30:8c:57:bc:49:68:49:9c:9a:53:e7:a9:b7:83:9f (RSA)
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCq+oocbQT+c73wXXDmSQrhe8f9OGxx41deFh60k1K/eyHSzEpU01VrC8sPUhhnx9YweljhcWt8XmdmQNqciXz9F8Io6/u441nwziXBKNmjeKzY/B9VRQXKwaQfNOtkJ/g1QijMT7xG/A6x3bI1Es5RMTuMHwf8/6P23s0OJWW2P0IPNW2dfTpdAcgXOoSZyA+ZrV8jvOuoADGWq93zHAW663HBHMOyzW452coJZ12I6DVvXURXAfNZygBmswh5Hf+gJ1UNMYJjuoEhmiPCMZK2F8GVdP0W4qEEY4ECwaz8NpKgn8OsbYYBmNyAavLtNGr+IYweLtj7WVGeaV/la423
  256 c9:8d:46:c8:ef:33:d2:62:21:3a:bf:95:cb:fb:44:a3 (ECDSA)
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBJ5iBoU1MSkyJr0Off1VNkZfhbQr6ro41DQRKqraAi/DLKRJhWiObYTaoIzzNOiuoYyyIPSGl/WHKal8Lkz9qmc=
  256 9b:86:ff:5c:6c:61:50:d0:36:59:b0:7a:bf:77:b2:a6 (ED25519)
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMR0YBLhRmjcBvgDcedoiY4c0Ndrc+uYld9hYYerGvvb
1337 tcp open
syn-ack
waste
fingerprint-strings
  DNSStatusRequestTCP, DNSVersionBindReqTCP, NULL, RPCCheck, SMBProgNeg:
    # WARZONE 2 # WARZONE 2 # WARZONE 2 #
    {SECRET SYSTEM REMOTE ACCESS}
    Username :
  GenericLines, GetRequest, HTTPOptions, RTSPRequest, TLSSessionReq:
    # WARZONE 2 # WARZONE 2 # WARZONE 2 #
    {SECRET SYSTEM REMOTE ACCESS}
    Username :Password :Token :
  Help, Kerberos, SSLSessionReq, TerminalServerCookie:
    # WARZONE 2 # WARZONE 2 # WARZONE 2 #
    {SECRET SYSTEM REMOTE ACCESS}
    Username :Password :

Open Services

Address Port Protocol Service Product Version CPE Extra info
192.168.9.130 21 tcp ftp vsftpd 3.0.3 cpe:/a:vsftpd:vsftpd:3.0.3
192.168.9.130 22 tcp ssh OpenSSH 7.9p1 Debian 10+deb10u2 cpe:/a:openbsd:openssh:7.9p1 protocol 2.0
192.168.9.130 1337 tcp waste