Ports
Duration
Date
IP
Nmap scan report for www.mhriley.com (92.205.11.152) Host is up (0.14s latency). rDNS record for 92.205.11.152: 152.11.205.92.host.secureserver.net Not shown: 975 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 20/tcp closed ftp-data 21/tcp open ftp Pure-FTPd |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=*.prod.sxb1.secureserver.net | Subject Alternative Name: DNS:*.prod.sxb1.secureserver.net, DNS:prod.sxb1.secureserver.net | Not valid before: 2025-03-10T18:02:04 |_Not valid after: 2026-04-11T18:02:04 22/tcp open ssh OpenSSH 8.0 (protocol 2.0) | ssh-hostkey: | 2048 20:cc:a0:cb:c4:a0:bd:79:17:f3:f4:cd:8f:af:31:1d (RSA) | 256 ff:fb:6d:33:d9:27:93:6b:58:82:84:a7:e1:f2:b9:b4 (ECDSA) |_ 256 99:a6:5b:83:9e:ea:16:ce:9e:77:c2:13:a7:d4:65:52 (ED25519) 25/tcp open smtp? |_smtp-commands: SMTP EHLO www.mhriley.com: failed to receive data: connection closed | fingerprint-strings: | NULL: |_ 421 Too many concurrent SMTP connections from this IP address; please try again later. 80/tcp open http Apache httpd |_http-server-header: Apache |_http-title: Did not follow redirect to https://www.mhriley.com/ 110/tcp open pop3 Dovecot pop3d |_ssl-date: TLS randomness does not represent time |_pop3-capabilities: PIPELINING USER RESP-CODES UIDL SASL(PLAIN LOGIN) CAPA TOP STLS AUTH-RESP-CODE | ssl-cert: Subject: commonName=mhriley.com | Subject Alternative Name: DNS:mhriley.com, DNS:www.mhriley.com | Not valid before: 2025-07-30T12:51:52 |_Not valid after: 2025-10-28T12:51:52 143/tcp open imap Dovecot imapd |_ssl-date: TLS randomness does not represent time |_imap-capabilities: post-login ID IDLE STARTTLS capabilities SASL-IR Pre-login ENABLE LITERAL+ more AUTH=LOGINA0001 OK listed have NAMESPACE IMAP4rev1 LOGIN-REFERRALS AUTH=PLAIN | ssl-cert: Subject: commonName=mhriley.com | Subject Alternative Name: DNS:mhriley.com, DNS:www.mhriley.com | Not valid before: 2025-07-30T12:51:52 |_Not valid after: 2025-10-28T12:51:52 443/tcp open ssl/http Apache httpd |_http-server-header: Apache |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=mhriley.com | Subject Alternative Name: DNS:mhriley.com, DNS:www.mhriley.com | Not valid before: 2025-07-30T12:51:52 |_Not valid after: 2025-10-28T12:51:52 | tls-alpn: | h2 |_ http/1.1 |_http-title: 403 Forbidden 465/tcp open smtps? | fingerprint-strings: | NULL, NotesRPC: |_ 421 Too many concurrent SMTP connections from this IP address; please try again later. | smtp-commands: sxb1plzcpnl491036.prod.sxb1.secureserver.net Hello www.mhriley.com [208.76.253.234], SIZE 52428800, LIMITS MAILMAX=10 RCPTMAX=50000, 8BITMIME, PIPELINING, PIPECONNECT, AUTH PLAIN LOGIN, HELP |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP 587/tcp open smtp Exim smtpd 4.98.2 |_smtp-commands: SMTP EHLO www.mhriley.com: failed to receive data: connection closed |_ssl-date: TLS randomness does not represent time 990/tcp closed ftps 993/tcp open imaps? |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=mhriley.com | Subject Alternative Name: DNS:mhriley.com, DNS:www.mhriley.com | Not valid before: 2025-07-30T12:51:52 |_Not valid after: 2025-10-28T12:51:52 |_imap-capabilities: CAPABILITY 995/tcp open pop3s? | ssl-cert: Subject: commonName=mhriley.com | Subject Alternative Name: DNS:mhriley.com, DNS:www.mhriley.com | Not valid before: 2025-07-30T12:51:52 |_Not valid after: 2025-10-28T12:51:52 |_ssl-date: TLS randomness does not represent time |_pop3-capabilities: RESP-CODES UIDL PIPELINING USER CAPA TOP SASL(PLAIN LOGIN) AUTH-RESP-CODE 3306/tcp open mysql MariaDB (unauthorized) 8443/tcp closed https-alt 50000/tcp closed ibm-db2 50001/tcp closed unknown 50002/tcp closed iiimsf 50003/tcp closed unknown 50006/tcp closed unknown 50300/tcp closed unknown 50389/tcp closed unknown 50500/tcp closed unknown 50636/tcp closed unknown 50800/tcp closed unknown 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port25-TCP:V=7.92%I=7%D=9/15%Time=68C7EF12%P=x86_64-redhat-linux-gnu%r( SF:NULL,58,"421\x20Too\x20many\x20concurrent\x20SMTP\x20connections\x20fro SF:m\x20this\x20IP\x20address;\x20please\x20try\x20again\x20later\.\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port465-TCP:V=7.92%I=7%D=9/15%Time=68C7EF12%P=x86_64-redhat-linux-gnu%r SF:(NULL,58,"421\x20Too\x20many\x20concurrent\x20SMTP\x20connections\x20fr SF:om\x20this\x20IP\x20address;\x20please\x20try\x20again\x20later\.\r\n") SF:%r(NotesRPC,58,"421\x20Too\x20many\x20concurrent\x20SMTP\x20connections SF:\x20from\x20this\x20IP\x20address;\x20please\x20try\x20again\x20later\. SF:\r\n"); Aggressive OS guesses: Linux 3.2 - 4.9 (96%), Linux 2.6.32 - 3.13 (95%), Linux 5.1 (94%), Linux 3.10 - 4.11 (93%), Linux 2.6.32 (92%), Linux 2.6.32 - 3.10 (92%), HP P2000 G3 NAS device (91%), Linux 3.16 - 4.6 (91%), Infomir MAG-250 set-top box (91%), Ubiquiti AirMax NanoStation WAP (Linux 2.6.32) (91%) No exact OS matches for host (test conditions non-ideal). Network Distance: 20 hops Service Info: Host: sxb1plzcpnl491036.prod.sxb1.secureserver.net TRACEROUTE (using port 50000/tcp) HOP RTT ADDRESS 1 0.17 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.61 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.68 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 1.06 ms be3243.ccr41.lax05.atlas.cogentco.com (154.54.27.118) 6 1.07 ms lax-b22-link.ip.twelve99.net (80.239.160.64) 7 0.72 ms lax-bb1-link.ip.twelve99.net (62.115.140.226) 8 140.29 ms dls-bb1-link.ip.twelve99.net (62.115.140.237) 9 58.64 ms rest-bb1-link.ip.twelve99.net (62.115.114.87) 10 130.52 ms prs-bb1-link.ip.twelve99.net (62.115.140.104) 11 135.20 ms ae30.sxb1-cr-vega.bb.gdinf.net (87.230.112.17) 12 ... 13 145.27 ms prs-b3-link.ip.twelve99.net (62.115.118.59) 14 ... 19 20 142.64 ms 152.11.205.92.host.secureserver.net (92.205.11.152) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 192.59 seconds
Features
5 scans/day
Daily API Calls - 20 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is suitable for beginners who want to check if their host has any open ports accessible from the outside.
Lifetime
Features
10 000 scans/day
Daily API Calls - 100 000 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is best for professionals who need to test their host's open ports from an external source.
Billed Annually @ $45.00 - 50% discount