Scan Time: Wed Dec 31 11:51:07 2025 Target: 161.132.53.144 ---------------------------------------- Starting Nmap 7.95 ( https://nmap.org ) at 2025-12-31 11:48 UTC Nmap scan report for 161.132.53.144 Host is up (0.18s latency). Not shown: 993 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.13 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 256 fe:3d:79:ea:69:7a:a6:aa:17:9b:98:8a:79:65:40:bb (ECDSA) |_ 256 b0:44:f5:9b:36:50:31:94:a5:05:7e:04:62:73:a8:fc (ED25519) 80/tcp open http Golang net/http server (Go-IPFS json-rpc or InfluxDB API) |_http-title: Site doesn't have a title (text/plain; charset=utf-8). 443/tcp open ssl/http Golang net/http server |_http-title: Site doesn't have a title (text/plain; charset=utf-8). | ssl-cert: Subject: commonName=TRAEFIK DEFAULT CERT | Subject Alternative Name: DNS:efd295b9008ea9783ea02be3df57ebe5.ab51cdef8e98e6b4c34ce7f5e80b978d.traefik.default | Not valid before: 2025-12-31T00:00:27 |_Not valid after: 2026-12-31T00:00:27 | fingerprint-strings: | FourOhFourRequest, HTTPOptions: | HTTP/1.0 503 Service Unavailable | Alt-Svc: h3=":443"; ma=2592000 | Content-Type: text/plain; charset=utf-8 | X-Content-Type-Options: nosniff | Date: Wed, 31 Dec 2025 11:48:42 GMT | Content-Length: 20 | available server | GenericLines, Help, LPDString, RTSPRequest, SIPOptions, SSLSessionReq, Socks5: | HTTP/1.1 400 Bad Request | Content-Type: text/plain; charset=utf-8 | Connection: close | Request | GetRequest: | HTTP/1.0 503 Service Unavailable | Alt-Svc: h3=":443"; ma=2592000 | Content-Type: text/plain; charset=utf-8 | X-Content-Type-Options: nosniff | Date: Wed, 31 Dec 2025 11:48:41 GMT | Content-Length: 20 |_ available server 6001/tcp open X11:1? | fingerprint-strings: | FourOhFourRequest, HTTPOptions, RTSPRequest, SIPOptions: | HTTP/1.1 404 Not Found | Access-Control-Allow-Origin: * | Access-Control-Allow-Methods: GET, POST, PUT, DELETE, OPTIONS | Access-Control-Allow-Headers: Origin, Content-Type, X-Auth-Token, X-Requested-With, Accept, Authorization, X-CSRF-TOKEN, XSRF-TOKEN, X-Socket-Id | uWebSockets: 20 | Content-Length: 0 | GetRequest: | HTTP/1.1 200 OK | Access-Control-Allow-Origin: * | Access-Control-Allow-Methods: GET, POST, PUT, DELETE, OPTIONS | Access-Control-Allow-Headers: Origin, Content-Type, X-Auth-Token, X-Requested-With, Accept, Authorization, X-CSRF-TOKEN, XSRF-TOKEN, X-Socket-Id | uWebSockets: 20 |_ Content-Length: 2 6002/tcp open X11:2? | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, RPCCheck, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: | HTTP/1.1 400 Bad Request | Connection: close | FourOhFourRequest: | HTTP/1.1 404 Not Found | Content-Type: text/plain | Date: Wed, 31 Dec 2025 11:48:44 GMT | Connection: close | Found | GetRequest, HTTPOptions: | HTTP/1.1 404 Not Found | Content-Type: text/plain | Date: Wed, 31 Dec 2025 11:48:40 GMT | Connection: close | Found | RTSPRequest: | HTTP/1.1 404 Not Found | Content-Type: text/plain | Date: Wed, 31 Dec 2025 11:48:41 GMT | Connection: close |_ Found 8000/tcp open http nginx |_http-trane-info: Problem with XML parsing of /evox/about | http-title: [CODEXT] Coolify |_Requested resource was http://161.132.53.144:8000/login | http-robots.txt: 1 disallowed entry |_/ 8080/tcp closed http-proxy 3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.95%T=SSL%I=7%D=12/31%Time=69550D99%P=x86_64-pc-linux-gn SF:u%r(GetRequest,DB,"HTTP/1\.0\x20503\x20Service\x20Unavailable\r\nAlt-Sv SF:c:\x20h3=\":443\";\x20ma=2592000\r\nContent-Type:\x20text/plain;\x20cha SF:rset=utf-8\r\nX-Content-Type-Options:\x20nosniff\r\nDate:\x20Wed,\x2031 SF:\x20Dec\x202025\x2011:48:41\x20GMT\r\nContent-Length:\x2020\r\n\r\nno\x SF:20available\x20server\n")%r(HTTPOptions,DB,"HTTP/1\.0\x20503\x20Service SF:\x20Unavailable\r\nAlt-Svc:\x20h3=\":443\";\x20ma=2592000\r\nContent-Ty SF:pe:\x20text/plain;\x20charset=utf-8\r\nX-Content-Type-Options:\x20nosni SF:ff\r\nDate:\x20Wed,\x2031\x20Dec\x202025\x2011:48:42\x20GMT\r\nContent- SF:Length:\x2020\r\n\r\nno\x20available\x20server\n")%r(FourOhFourRequest, SF:DB,"HTTP/1\.0\x20503\x20Service\x20Unavailable\r\nAlt-Svc:\x20h3=\":443 SF:\";\x20ma=2592000\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nX SF:-Content-Type-Options:\x20nosniff\r\nDate:\x20Wed,\x2031\x20Dec\x202025 SF:\x2011:48:42\x20GMT\r\nContent-Length:\x2020\r\n\r\nno\x20available\x20 SF:server\n")%r(GenericLines,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCon SF:tent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\ SF:r\n400\x20Bad\x20Request")%r(RTSPRequest,67,"HTTP/1\.1\x20400\x20Bad\x2 SF:0Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection SF::\x20close\r\n\r\n400\x20Bad\x20Request")%r(Help,67,"HTTP/1\.1\x20400\x SF:20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nCo SF:nnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(SSLSessionReq,67,"H SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20ch SF:arset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(LP SF:DString,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text SF:/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20R SF:equest")%r(SIPOptions,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent SF:-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n4 SF:00\x20Bad\x20Request")%r(Socks5,67,"HTTP/1\.1\x20400\x20Bad\x20Request\ SF:r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20clos SF:e\r\n\r\n400\x20Bad\x20Request"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port6001-TCP:V=7.95%I=7%D=12/31%Time=69550D9A%P=x86_64-pc-linux-gnu%r(G SF:etRequest,12A,"HTTP/1\.1\x20200\x20OK\r\nAccess-Control-Allow-Origin:\x SF:20\*\r\nAccess-Control-Allow-Methods:\x20GET,\x20POST,\x20PUT,\x20DELET SF:E,\x20OPTIONS\r\nAccess-Control-Allow-Headers:\x20Origin,\x20Content-Ty SF:pe,\x20X-Auth-Token,\x20X-Requested-With,\x20Accept,\x20Authorization,\ SF:x20X-CSRF-TOKEN,\x20XSRF-TOKEN,\x20X-Socket-Id\r\nuWebSockets:\x2020\r\ SF:nContent-Length:\x202\r\n\r\nOK")%r(HTTPOptions,12F,"HTTP/1\.1\x20404\x SF:20Not\x20Found\r\nAccess-Control-Allow-Origin:\x20\*\r\nAccess-Control- SF:Allow-Methods:\x20GET,\x20POST,\x20PUT,\x20DELETE,\x20OPTIONS\r\nAccess SF:-Control-Allow-Headers:\x20Origin,\x20Content-Type,\x20X-Auth-Token,\x2 SF:0X-Requested-With,\x20Accept,\x20Authorization,\x20X-CSRF-TOKEN,\x20XSR SF:F-TOKEN,\x20X-Socket-Id\r\nuWebSockets:\x2020\r\nContent-Length:\x200\r SF:\n\r\n")%r(RTSPRequest,12F,"HTTP/1\.1\x20404\x20Not\x20Found\r\nAccess- SF:Control-Allow-Origin:\x20\*\r\nAccess-Control-Allow-Methods:\x20GET,\x2 SF:0POST,\x20PUT,\x20DELETE,\x20OPTIONS\r\nAccess-Control-Allow-Headers:\x SF:20Origin,\x20Content-Type,\x20X-Auth-Token,\x20X-Requested-With,\x20Acc SF:ept,\x20Authorization,\x20X-CSRF-TOKEN,\x20XSRF-TOKEN,\x20X-Socket-Id\r SF:\nuWebSockets:\x2020\r\nContent-Length:\x200\r\n\r\n")%r(FourOhFourRequ SF:est,12F,"HTTP/1\.1\x20404\x20Not\x20Found\r\nAccess-Control-Allow-Origi SF:n:\x20\*\r\nAccess-Control-Allow-Methods:\x20GET,\x20POST,\x20PUT,\x20D SF:ELETE,\x20OPTIONS\r\nAccess-Control-Allow-Headers:\x20Origin,\x20Conten SF:t-Type,\x20X-Auth-Token,\x20X-Requested-With,\x20Accept,\x20Authorizati SF:on,\x20X-CSRF-TOKEN,\x20XSRF-TOKEN,\x20X-Socket-Id\r\nuWebSockets:\x202 SF:0\r\nContent-Length:\x200\r\n\r\n")%r(SIPOptions,12F,"HTTP/1\.1\x20404\ SF:x20Not\x20Found\r\nAccess-Control-Allow-Origin:\x20\*\r\nAccess-Control SF:-Allow-Methods:\x20GET,\x20POST,\x20PUT,\x20DELETE,\x20OPTIONS\r\nAcces SF:s-Control-Allow-Headers:\x20Origin,\x20Content-Type,\x20X-Auth-Token,\x SF:20X-Requested-With,\x20Accept,\x20Authorization,\x20X-CSRF-TOKEN,\x20XS SF:RF-TOKEN,\x20X-Socket-Id\r\nuWebSockets:\x2020\r\nContent-Length:\x200\ SF:r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port6002-TCP:V=7.95%I=7%D=12/31%Time=69550D92%P=x86_64-pc-linux-gnu%r(X SF:11Probe,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\ SF:r\n\r\n")%r(GetRequest,75,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent- SF:Type:\x20text/plain\r\nDate:\x20Wed,\x2031\x20Dec\x202025\x2011:48:40\x SF:20GMT\r\nConnection:\x20close\r\n\r\nNot\x20Found")%r(HTTPOptions,75,"H SF:TTP/1\.1\x20404\x20Not\x20Found\r\nContent-Type:\x20text/plain\r\nDate: SF:\x20Wed,\x2031\x20Dec\x202025\x2011:48:40\x20GMT\r\nConnection:\x20clos SF:e\r\n\r\nNot\x20Found")%r(RTSPRequest,75,"HTTP/1\.1\x20404\x20Not\x20Fo SF:und\r\nContent-Type:\x20text/plain\r\nDate:\x20Wed,\x2031\x20Dec\x20202 SF:5\x2011:48:41\x20GMT\r\nConnection:\x20close\r\n\r\nNot\x20Found")%r(RP SF:CCheck,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r SF:\n\r\n")%r(DNSVersionBindReqTCP,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\ SF:r\nConnection:\x20close\r\n\r\n")%r(DNSStatusRequestTCP,2F,"HTTP/1\.1\x SF:20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(Help,2F,"HT SF:TP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SS SF:LSessionReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20cl SF:ose\r\n\r\n")%r(TerminalServerCookie,2F,"HTTP/1\.1\x20400\x20Bad\x20Req SF:uest\r\nConnection:\x20close\r\n\r\n")%r(TLSSessionReq,2F,"HTTP/1\.1\x2 SF:0400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(Kerberos,2F, SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r SF:(SMBProgNeg,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20cl SF:ose\r\n\r\n")%r(FourOhFourRequest,75,"HTTP/1\.1\x20404\x20Not\x20Found\ SF:r\nContent-Type:\x20text/plain\r\nDate:\x20Wed,\x2031\x20Dec\x202025\x2 SF:011:48:44\x20GMT\r\nConnection:\x20close\r\n\r\nNot\x20Found")%r(LPDStr SF:ing,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\ SF:r\n")%r(LDAPSearchReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnect SF:ion:\x20close\r\n\r\n")%r(LDAPBindReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Re SF:quest\r\nConnection:\x20close\r\n\r\n")%r(SIPOptions,2F,"HTTP/1\.1\x204 SF:00\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(LANDesk-RC,2F, SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n"); Aggressive OS guesses: Linux 5.0 - 5.14 (98%), MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3) (98%), Linux 4.15 - 5.19 (94%), OpenWrt 21.02 (Linux 5.4) (94%), Linux 2.6.32 - 3.13 (93%), Linux 5.1 - 5.15 (93%), Linux 6.0 (93%), Linux 2.6.39 (93%), OpenWrt 22.03 (Linux 5.10) (93%), Linux 4.19 (92%) No exact OS matches for host (test conditions non-ideal). Network Distance: 15 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 8080/tcp) HOP RTT ADDRESS 1 0.04 ms 172.18.0.1 2 2.36 ms 172.31.1.1 3 0.46 ms 26472.your-cloud.host (162.55.119.126) 4 ... 5 6 0.58 ms core-spine-rdev2.cloud2.fsn1.hetzner.com (213.239.239.81) 7 0.61 ms core23.fsn1.hetzner.com (213.239.227.202) 8 0.78 ms juniper5.dc1.fsn1.hetzner.com (213.239.203.114) 9 7.80 ms ae55.edge5.Berlin1.Level3.net (62.67.27.9) 10 180.07 ms 81.231.189.200.static.ciriontechnologies.net (200.189.231.81) 11 180.51 ms 8.243.96.218 12 ... 14 15 180.14 ms 161.132.53.144 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 169.66 seconds