Nmap Scan Report - Scanned at Thu May 30 14:38:04 2024

Scan Summary

Nmap 7.94 was initiated at Thu May 30 14:38:04 2024 with these arguments:
nmap -p- -sS -sC -sV --min-rate=5000 -n -Pn -oX vivifytech 192.168.0.104

Verbosity: 0; Debug level 0

Nmap done at Thu May 30 14:38:20 2024; 1 IP address (1 host up) scanned in 15.51 seconds

192.168.0.104(online)

Address

Ports

The 65531 ports scanned but not shown below are in state: closed

Port State (toggle closed [0] | filtered [0]) Service Reason Product Version Extra info
22 tcp open ssh  syn-ack OpenSSH  9.2p1 Debian 2+deb12u1  protocol 2.0 
ssh-hostkey 
  256 32:f3:f6:36:95:12:c8:18:f3:ad:b8:0f:04:4d:73:2f (ECDSA)
  256 1d:ec:9c:6e:3c:cf:83:f6:f0:45:22:58:13:2f:d3:9e (ED25519) 
80 tcp open http  syn-ack Apache httpd  2.4.57  (Debian) 
http-title 
Apache2 Debian Default Page: It works 
http-server-header 
Apache/2.4.57 (Debian) 
3306 tcp open mysql  syn-ack MySQL    unauthorized 
33060 tcp open mysqlx  syn-ack      
fingerprint-strings 
  DNSStatusRequestTCP, LDAPSearchReq, NotesRPC, SSLSessionReq, TLSSessionReq, X11Probe, afp: 
    Invalid message"
    HY000
  LDAPBindReq: 
    *Parse error unserializing protobuf message"
    HY000
  oracle-tns: 
    Invalid message-frame."
    HY000 

Misc Metrics (click to expand)