Scan Time: Wed Dec 31 00:59:03 2025 Target: 39.152.34.224 ---------------------------------------- Starting Nmap 7.95 ( https://nmap.org ) at 2025-12-31 00:56 UTC Nmap scan report for 39.152.34.224 Host is up (0.21s latency). Not shown: 973 closed tcp ports (reset) PORT STATE SERVICE VERSION 21/tcp filtered ftp 22/tcp open ssh (protocol 1.99) | fingerprint-strings: | NULL: |_ SSH-1.99-IPSSH_5.1.0p1 23/tcp open telnet | fingerprint-strings: | GenericLines: | User Access Verification For vty7 | login: | login: | GetRequest: | User Access Verification For vty4 | login:GET / HTTP/1.0 | password: | NULL: | User Access Verification For vty7 | login: | tn3270: | User Access Verification For vty4 |_ login: 25/tcp filtered smtp 53/tcp filtered domain 80/tcp filtered http 135/tcp filtered msrpc 222/tcp open ssh OpenSSH 7.4 (protocol 2.0) | ssh-hostkey: | 2048 4d:29:1d:69:71:fe:5d:0e:ad:d8:e8:f6:4e:ba:35:a9 (RSA) | 256 91:b5:22:c1:59:cb:f5:01:54:b0:24:81:48:37:43:53 (ECDSA) |_ 256 5e:ce:f0:97:7f:5a:71:0d:f1:ae:43:55:c2:c7:91:bb (ED25519) 280/tcp open http nginx 1.17.3 |_http-title: Welcome to nginx! |_http-server-header: nginx/1.17.3 443/tcp filtered https 445/tcp filtered microsoft-ds 465/tcp filtered smtps 722/tcp filtered unknown 1443/tcp filtered ies-lm 7777/tcp open cbt? 8001/tcp filtered vcom-tunnel 8080/tcp filtered http-proxy 8088/tcp filtered radan-http 8090/tcp filtered opsmessaging 8443/tcp filtered https-alt 8888/tcp filtered sun-answerbook 9010/tcp open sdr? 9998/tcp open http nginx | uptime-agent-info: HTTP/1.1 400 Bad Request\x0D | Server: nginx\x0D | Date: Wed, 31 Dec 2025 01:01:31 GMT\x0D | Content-Type: text/html; charset=utf-8\x0D | Content-Length: 150\x0D | Connection: close\x0D | \x0D | \x0D | 400 Bad Request\x0D | \x0D |

400 Bad Request

\x0D |
nginx
\x0D | \x0D |_\x0D |_http-title: 403 Forbidden 9999/tcp open ssl/http nginx |_ssl-date: TLS randomness does not represent time | tls-alpn: | http/1.1 | http/1.0 |_ http/0.9 | ssl-cert: Subject: organizationName=Default Company Ltd/countryName=CN | Not valid before: 2020-03-05T04:31:42 |_Not valid after: 2030-03-03T04:31:42 |_http-title: 403 Forbidden 11111/tcp filtered vce 12000/tcp filtered cce4x 12345/tcp filtered netbus 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port22-TCP:V=7.95%I=7%D=12/31%Time=695474C8%P=x86_64-pc-linux-gnu%r(NUL SF:L,17,"SSH-1\.99-IPSSH_5\.1\.0p1\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port23-TCP:V=7.95%I=7%D=12/31%Time=695474C8%P=x86_64-pc-linux-gnu%r(NUL SF:L,3A,"\xff\xfb\x01\xff\xfb\x03\xff\xfc\x1f\r\r\nUser\x20Access\x20Verif SF:ication\x20For\x20vty7\r\n\r\n\r\r\nlogin:")%r(GenericLines,43,"\xff\xf SF:b\x01\xff\xfb\x03\xff\xfc\x1f\r\r\nUser\x20Access\x20Verification\x20Fo SF:r\x20vty7\r\n\r\n\r\r\nlogin:\r\r\nlogin:")%r(tn3270,49,"\xff\xfb\x01\x SF:ff\xfb\x03\xff\xfc\x1f\xff\xfe\x18\xff\xfe\x19\xff\xfc\x19\xff\xfd\0\xf SF:f\xfb\0\r\r\nUser\x20Access\x20Verification\x20For\x20vty4\r\n\r\n\r\r\ SF:nlogin:")%r(GetRequest,54,"\xff\xfb\x01\xff\xfb\x03\xff\xfc\x1f\r\r\nUs SF:er\x20Access\x20Verification\x20For\x20vty4\r\n\r\n\r\r\nlogin:GET\x20/ SF:\x20HTTP/1\.0\r\r\npassword:"); Aggressive OS guesses: 3Com 5500-EI switch (92%), Motorola SURFboard SB5100i cable modem (90%), 3Com 7760 WAP (89%), 3Com SuperStack 3 Switch 4500 (88%), ZyXEL ZyWALL 2, 5, or 70 firewall (ZyNOS 4.04) (88%), ZyXEL ZyWALL 5 firewall (ZyNOS 4.04) (88%), ZyXEL ZyWALL firewall (ZyNOS 4.04) (88%), Westell WireSpeed B90-220030-04 DSL router (VxWorks) (88%), Siemens HiPath optiPoint 400 VoIP phone (86%), Motorola SURFboard SBV5121 broadband router (VxWorks 5.4) (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 19 hops TRACEROUTE (using port 199/tcp) HOP RTT ADDRESS 1 0.07 ms 172.18.0.1 2 3.01 ms 172.31.1.1 3 0.46 ms 26472.your-cloud.host (162.55.119.126) 4 ... 5 6 0.70 ms core-spine-rdev1.cloud2.fsn1.hetzner.com (213.239.239.77) 7 0.55 ms core21.fsn1.hetzner.com (213.239.227.210) 8 5.22 ms core0.fra.hetzner.com (213.239.224.98) 9 7.23 ms ipv4.de-cix.fra.de.as58453.chinamobile.com (80.81.195.121) 10 7.07 ms 223.120.10.14 11 243.90 ms 223.120.16.146 12 ... 13 14 233.50 ms 221.183.89.10 15 ... 16 17 223.09 ms 111.45.144.154 18 ... 19 223.69 ms 39.152.34.224 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 162.89 seconds