# Nmap 7.92 scan initiated Thu Dec 16 19:59:26 2021 as: nmap -p- --open -vvv -sS --min-rate 5000 -n -Pn -sCV -oN Reel_nmap.txt 10.10.10.77 Nmap scan report for 10.10.10.77 Host is up, received user-set (0.045s latency). Scanned at 2021-12-16 19:59:27 CET for 194s Not shown: 65532 filtered tcp ports (no-response) Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE REASON VERSION 21/tcp open ftp syn-ack ttl 127 Microsoft ftpd | ftp-syst: |_ SYST: Windows_NT | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_05-28-18 11:19PM documents 22/tcp open ssh syn-ack ttl 127 OpenSSH 7.6 (protocol 2.0) | ssh-hostkey: | 2048 82:20:c3:bd:16:cb:a2:9c:88:87:1d:6c:15:59:ed:ed (RSA) | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQkehAZGj87mZluxFiVu+GPAAnC/OQ9QKUF2wlIwvefrD2L4zWyGXlAgSbUq/MqujR/efrTIjPYWK+5Mlxc7gEoZBylGAPbdxFivL8YQs3dQPt6aHNF0v+ABS01L2qZ4ewd1sTi1TlT6LtWHehX2PBJ6S3LWG09v+E/3ue97y9gaOjfA6BCMWgQ7K3yvQeHrRpBSk/vQxfCh4TINwV3EGbGTfbs8VvvR+Et7weB5EOifgXfHbyh04KemONkceFSAnjRRYOgwvtXai9imsDJ8KtS2RMR197VK4MBhsY7+h0nOvUMgm76RcRc6N8GW1mn6gWp98Ds9VeymzAmQvprs97 | 256 23:2b:b8:0a:8c:1c:f4:4d:8d:7e:5e:64:58:80:33:45 (ECDSA) | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBAw2CYanDlTRpGqzVXrfGTcAYVe/vUnnkWicQPzdfix5gFsv4nOGNUM+Fko7QAW0jqCFQKc8anGAwJjFGLTB00k= | 256 ac:8b:de:25:1d:b7:d8:38:38:9b:9c:16:bf:f6:3f:ed (ED25519) |_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICdDfn+n5xueGtHP20/aPkI8pvCfxb2UZA3RQdqnpjBk 25/tcp open smtp? syn-ack ttl 127 | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LDAPBindReq, LDAPSearchReq, LPDString, NULL, RPCCheck, SMBProgNeg, SSLSessionReq, TLSSessionReq, X11Probe: | 220 Mail Service ready | FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, RTSPRequest: | 220 Mail Service ready | sequence of commands | sequence of commands | Hello: | 220 Mail Service ready | EHLO Invalid domain address. | Help: | 220 Mail Service ready | DATA HELO EHLO MAIL NOOP QUIT RCPT RSET SAML TURN VRFY | SIPOptions: | 220 Mail Service ready | sequence of commands | sequence of commands | sequence of commands | sequence of commands | sequence of commands | sequence of commands | sequence of commands | sequence of commands | sequence of commands | sequence of commands | sequence of commands | TerminalServerCookie: | 220 Mail Service ready |_ sequence of commands | smtp-commands: REEL, SIZE 20480000, AUTH LOGIN PLAIN, HELP |_ 211 DATA HELO EHLO MAIL NOOP QUIT RCPT RSET SAML TURN VRFY 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port25-TCP:V=7.92%I=7%D=12/16%Time=61BB8CAF%P=x86_64-pc-linux-gnu%r(NUL SF:L,18,"220\x20Mail\x20Service\x20ready\r\n")%r(Hello,3A,"220\x20Mail\x20 SF:Service\x20ready\r\n501\x20EHLO\x20Invalid\x20domain\x20address\.\r\n") SF:%r(Help,54,"220\x20Mail\x20Service\x20ready\r\n211\x20DATA\x20HELO\x20E SF:HLO\x20MAIL\x20NOOP\x20QUIT\x20RCPT\x20RSET\x20SAML\x20TURN\x20VRFY\r\n SF:")%r(GenericLines,54,"220\x20Mail\x20Service\x20ready\r\n503\x20Bad\x20 SF:sequence\x20of\x20commands\r\n503\x20Bad\x20sequence\x20of\x20commands\ SF:r\n")%r(GetRequest,54,"220\x20Mail\x20Service\x20ready\r\n503\x20Bad\x2 SF:0sequence\x20of\x20commands\r\n503\x20Bad\x20sequence\x20of\x20commands SF:\r\n")%r(HTTPOptions,54,"220\x20Mail\x20Service\x20ready\r\n503\x20Bad\ SF:x20sequence\x20of\x20commands\r\n503\x20Bad\x20sequence\x20of\x20comman SF:ds\r\n")%r(RTSPRequest,54,"220\x20Mail\x20Service\x20ready\r\n503\x20Ba SF:d\x20sequence\x20of\x20commands\r\n503\x20Bad\x20sequence\x20of\x20comm SF:ands\r\n")%r(RPCCheck,18,"220\x20Mail\x20Service\x20ready\r\n")%r(DNSVe SF:rsionBindReqTCP,18,"220\x20Mail\x20Service\x20ready\r\n")%r(DNSStatusRe SF:questTCP,18,"220\x20Mail\x20Service\x20ready\r\n")%r(SSLSessionReq,18," SF:220\x20Mail\x20Service\x20ready\r\n")%r(TerminalServerCookie,36,"220\x2 SF:0Mail\x20Service\x20ready\r\n503\x20Bad\x20sequence\x20of\x20commands\r SF:\n")%r(TLSSessionReq,18,"220\x20Mail\x20Service\x20ready\r\n")%r(Kerber SF:os,18,"220\x20Mail\x20Service\x20ready\r\n")%r(SMBProgNeg,18,"220\x20Ma SF:il\x20Service\x20ready\r\n")%r(X11Probe,18,"220\x20Mail\x20Service\x20r SF:eady\r\n")%r(FourOhFourRequest,54,"220\x20Mail\x20Service\x20ready\r\n5 SF:03\x20Bad\x20sequence\x20of\x20commands\r\n503\x20Bad\x20sequence\x20of SF:\x20commands\r\n")%r(LPDString,18,"220\x20Mail\x20Service\x20ready\r\n" SF:)%r(LDAPSearchReq,18,"220\x20Mail\x20Service\x20ready\r\n")%r(LDAPBindR SF:eq,18,"220\x20Mail\x20Service\x20ready\r\n")%r(SIPOptions,162,"220\x20M SF:ail\x20Service\x20ready\r\n503\x20Bad\x20sequence\x20of\x20commands\r\n SF:503\x20Bad\x20sequence\x20of\x20commands\r\n503\x20Bad\x20sequence\x20o SF:f\x20commands\r\n503\x20Bad\x20sequence\x20of\x20commands\r\n503\x20Bad SF:\x20sequence\x20of\x20commands\r\n503\x20Bad\x20sequence\x20of\x20comma SF:nds\r\n503\x20Bad\x20sequence\x20of\x20commands\r\n503\x20Bad\x20sequen SF:ce\x20of\x20commands\r\n503\x20Bad\x20sequence\x20of\x20commands\r\n503 SF:\x20Bad\x20sequence\x20of\x20commands\r\n503\x20Bad\x20sequence\x20of\x SF:20commands\r\n"); Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Dec 16 20:02:41 2021 -- 1 IP address (1 host up) scanned in 194.86 seconds