Scan Report
Nmap 7.70

nmap --max-retries 2 --max-rtt-timeout 500ms -p[port(s)] -Pn -s(T|U) -sV -n --script vulners [ip(s)]


1 hosts scanned. 1 hosts up. 0 hosts down.

1
0

Scanned Hosts

State Address Hostname TCP (open) UDP (open)
up 45.33.32.156 4 0

Online Hosts

45.33.32.156

Ports

Port Protocol State
Reason
Service Product Version Extra Info
22 tcp open
syn-ack
ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 Ubuntu Linux; protocol 2.0
cpe:/a:openbsd:openssh:6.6.1p1
80 tcp open
syn-ack
http Apache httpd 2.4.7 (Ubuntu)
cpe:/a:apache:http_server:2.4.7
http-server-header
Apache/2.4.7 (Ubuntu)
9929 tcp open
syn-ack
nping-echo Nping echo
31337 tcp open
syn-ack
tcpwrapped

Open Services

Address Port Protocol Service Product Version CPE Extra info
45.33.32.156 22 tcp ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 cpe:/a:openbsd:openssh:6.6.1p1 Ubuntu Linux; protocol 2.0
45.33.32.156 80 tcp http Apache httpd 2.4.7 cpe:/a:apache:http_server:2.4.7 (Ubuntu)
45.33.32.156 9929 tcp nping-echo Nping echo
45.33.32.156 31337 tcp tcpwrapped