Nmap scan report for www.mhriley.com (92.205.11.152) Host is up (0.14s latency). rDNS record for 92.205.11.152: 152.11.205.92.host.secureserver.net Not shown: 975 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 20/tcp closed ftp-data 21/tcp open ftp Pure-FTPd |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=*.prod.sxb1.secureserver.net | Subject Alternative Name: DNS:*.prod.sxb1.secureserver.net, DNS:prod.sxb1.secureserver.net | Not valid before: 2025-03-10T18:02:04 |_Not valid after: 2026-04-11T18:02:04 22/tcp open ssh OpenSSH 8.0 (protocol 2.0) | ssh-hostkey: | 2048 20:cc:a0:cb:c4:a0:bd:79:17:f3:f4:cd:8f:af:31:1d (RSA) | 256 ff:fb:6d:33:d9:27:93:6b:58:82:84:a7:e1:f2:b9:b4 (ECDSA) |_ 256 99:a6:5b:83:9e:ea:16:ce:9e:77:c2:13:a7:d4:65:52 (ED25519) 25/tcp open smtp? |_smtp-commands: SMTP EHLO www.mhriley.com: failed to receive data: connection closed | fingerprint-strings: | NULL: |_ 421 Too many concurrent SMTP connections from this IP address; please try again later. 80/tcp open http Apache httpd |_http-server-header: Apache |_http-title: Did not follow redirect to https://www.mhriley.com/ 110/tcp open pop3 Dovecot pop3d |_ssl-date: TLS randomness does not represent time |_pop3-capabilities: PIPELINING USER RESP-CODES UIDL SASL(PLAIN LOGIN) CAPA TOP STLS AUTH-RESP-CODE | ssl-cert: Subject: commonName=mhriley.com | Subject Alternative Name: DNS:mhriley.com, DNS:www.mhriley.com | Not valid before: 2025-07-30T12:51:52 |_Not valid after: 2025-10-28T12:51:52 143/tcp open imap Dovecot imapd |_ssl-date: TLS randomness does not represent time |_imap-capabilities: post-login ID IDLE STARTTLS capabilities SASL-IR Pre-login ENABLE LITERAL+ more AUTH=LOGINA0001 OK listed have NAMESPACE IMAP4rev1 LOGIN-REFERRALS AUTH=PLAIN | ssl-cert: Subject: commonName=mhriley.com | Subject Alternative Name: DNS:mhriley.com, DNS:www.mhriley.com | Not valid before: 2025-07-30T12:51:52 |_Not valid after: 2025-10-28T12:51:52 443/tcp open ssl/http Apache httpd |_http-server-header: Apache |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=mhriley.com | Subject Alternative Name: DNS:mhriley.com, DNS:www.mhriley.com | Not valid before: 2025-07-30T12:51:52 |_Not valid after: 2025-10-28T12:51:52 | tls-alpn: | h2 |_ http/1.1 |_http-title: 403 Forbidden 465/tcp open smtps? | fingerprint-strings: | NULL, NotesRPC: |_ 421 Too many concurrent SMTP connections from this IP address; please try again later. | smtp-commands: sxb1plzcpnl491036.prod.sxb1.secureserver.net Hello www.mhriley.com [208.76.253.234], SIZE 52428800, LIMITS MAILMAX=10 RCPTMAX=50000, 8BITMIME, PIPELINING, PIPECONNECT, AUTH PLAIN LOGIN, HELP |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP 587/tcp open smtp Exim smtpd 4.98.2 |_smtp-commands: SMTP EHLO www.mhriley.com: failed to receive data: connection closed |_ssl-date: TLS randomness does not represent time 990/tcp closed ftps 993/tcp open imaps? |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=mhriley.com | Subject Alternative Name: DNS:mhriley.com, DNS:www.mhriley.com | Not valid before: 2025-07-30T12:51:52 |_Not valid after: 2025-10-28T12:51:52 |_imap-capabilities: CAPABILITY 995/tcp open pop3s? | ssl-cert: Subject: commonName=mhriley.com | Subject Alternative Name: DNS:mhriley.com, DNS:www.mhriley.com | Not valid before: 2025-07-30T12:51:52 |_Not valid after: 2025-10-28T12:51:52 |_ssl-date: TLS randomness does not represent time |_pop3-capabilities: RESP-CODES UIDL PIPELINING USER CAPA TOP SASL(PLAIN LOGIN) AUTH-RESP-CODE 3306/tcp open mysql MariaDB (unauthorized) 8443/tcp closed https-alt 50000/tcp closed ibm-db2 50001/tcp closed unknown 50002/tcp closed iiimsf 50003/tcp closed unknown 50006/tcp closed unknown 50300/tcp closed unknown 50389/tcp closed unknown 50500/tcp closed unknown 50636/tcp closed unknown 50800/tcp closed unknown 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port25-TCP:V=7.92%I=7%D=9/15%Time=68C7EF12%P=x86_64-redhat-linux-gnu%r( SF:NULL,58,"421\x20Too\x20many\x20concurrent\x20SMTP\x20connections\x20fro SF:m\x20this\x20IP\x20address;\x20please\x20try\x20again\x20later\.\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port465-TCP:V=7.92%I=7%D=9/15%Time=68C7EF12%P=x86_64-redhat-linux-gnu%r SF:(NULL,58,"421\x20Too\x20many\x20concurrent\x20SMTP\x20connections\x20fr SF:om\x20this\x20IP\x20address;\x20please\x20try\x20again\x20later\.\r\n") SF:%r(NotesRPC,58,"421\x20Too\x20many\x20concurrent\x20SMTP\x20connections SF:\x20from\x20this\x20IP\x20address;\x20please\x20try\x20again\x20later\. SF:\r\n"); Aggressive OS guesses: Linux 3.2 - 4.9 (96%), Linux 2.6.32 - 3.13 (95%), Linux 5.1 (94%), Linux 3.10 - 4.11 (93%), Linux 2.6.32 (92%), Linux 2.6.32 - 3.10 (92%), HP P2000 G3 NAS device (91%), Linux 3.16 - 4.6 (91%), Infomir MAG-250 set-top box (91%), Ubiquiti AirMax NanoStation WAP (Linux 2.6.32) (91%) No exact OS matches for host (test conditions non-ideal). Network Distance: 20 hops Service Info: Host: sxb1plzcpnl491036.prod.sxb1.secureserver.net TRACEROUTE (using port 50000/tcp) HOP RTT ADDRESS 1 0.17 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.61 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.68 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 1.06 ms be3243.ccr41.lax05.atlas.cogentco.com (154.54.27.118) 6 1.07 ms lax-b22-link.ip.twelve99.net (80.239.160.64) 7 0.72 ms lax-bb1-link.ip.twelve99.net (62.115.140.226) 8 140.29 ms dls-bb1-link.ip.twelve99.net (62.115.140.237) 9 58.64 ms rest-bb1-link.ip.twelve99.net (62.115.114.87) 10 130.52 ms prs-bb1-link.ip.twelve99.net (62.115.140.104) 11 135.20 ms ae30.sxb1-cr-vega.bb.gdinf.net (87.230.112.17) 12 ... 13 145.27 ms prs-b3-link.ip.twelve99.net (62.115.118.59) 14 ... 19 20 142.64 ms 152.11.205.92.host.secureserver.net (92.205.11.152) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 192.59 seconds