Starting Nmap 7.80 ( https://nmap.org ) at 2022-03-31 09:49 CEST Nmap scan report for ap23 (10.121.38.78) Host is up (0.00089s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5 (protocol 2.0) 80/tcp open http Apache httpd 2.4.52 | http-ls: Volume / | SIZE TIME FILENAME | - 2022-03-17 15:36 AP23/ | 465K 2021-05-14 07:40 adminer.php | - 2020-07-29 11:35 dokuwiki/ |_ |_http-server-header: Apache/2.4.52 (Debian) |_http-title: Index of / 3306/tcp open mysql? | fingerprint-strings: | NULL, TLSSessionReq: |_ Host 'gwsio2.sio.lan' is not allowed to connect to this MariaDB server 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port3306-TCP:V=7.80%I=7%D=3/31%Time=62455D05%P=x86_64-pc-linux-gnu%r(NU SF:LL,4D,"I\0\0\x01\xffj\x04Host\x20'gwsio2\.sio\.lan'\x20is\x20not\x20all SF:owed\x20to\x20connect\x20to\x20this\x20MariaDB\x20server")%r(TLSSession SF:Req,4D,"I\0\0\x01\xffj\x04Host\x20'gwsio2\.sio\.lan'\x20is\x20not\x20al SF:lowed\x20to\x20connect\x20to\x20this\x20MariaDB\x20server"); No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ). TCP/IP fingerprint: OS:SCAN(V=7.80%E=4%D=3/31%OT=22%CT=1%CU=44627%PV=Y%DS=2%DC=T%G=Y%TM=62455D1 OS:7%P=x86_64-pc-linux-gnu)SEQ(SP=FF%GCD=1%ISR=103%TI=Z%CI=Z%II=I%TS=A)OPS( OS:O1=M5B4ST11NW7%O2=M5B4ST11NW7%O3=M5B4NNT11NW7%O4=M5B4ST11NW7%O5=M5B4ST11 OS:NW7%O6=M5B4ST11)WIN(W1=FE88%W2=FE88%W3=FE88%W4=FE88%W5=FE88%W6=FE88)ECN( OS:R=Y%DF=Y%T=40%W=FAF0%O=M5B4NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS OS:%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R= OS:Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F= OS:R%O=%RD=0%Q=)T7(R=N)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%R OS:UCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S) Network Distance: 2 hops Service Info: Host: ap23.sio.lan; OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 143/tcp) HOP RTT ADDRESS 1 0.43 ms 192.168.0.1 2 0.95 ms 10.121.38.78 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 18.75 seconds