# Nmap 7.80 scan initiated Mon Oct 12 19:08:02 2020 as: nmap -oA data/nweb.8xdb8zivza -sC -sV --open -Pn --system-dns -p "443, 1110, 1755, 2121, 3986, 5009, 5432, 5666, 6646, 8009, 8081, 32768, 49152, 49153, 49154, 49155, 49156, 49157" 138.163.240.188
Nmap scan report for 138.163.240.188
Host is up (0.20s latency).
PORT STATE SERVICE VERSION
443/tcp open ssl/http Pulse Secure VPN gateway http config
| http-robots.txt: 1 disallowed entry
|_/
| http-title: PleaseWait
|_Requested resource was /dana-na/auth/url_default/welcome.cgi
| ssl-cert: Subject: commonName=rashawaii.nmci.navy.mil/organizationName=U.S. Government/countryName=US
| Subject Alternative Name: DNS:rashawaii.nmci.navy.mil
| Not valid before: 2019-10-02T00:53:54
|_Not valid after: 2022-10-02T00:53:54
1110/tcp open nfsd-status?
1755/tcp open wms?
2121/tcp open ccproxy-ftp?
3986/tcp open mapper-ws_ethd?
5009/tcp open airport-admin?
5432/tcp open tcpwrapped
5666/tcp open nrpe?
6646/tcp open unknown
8009/tcp open tcpwrapped
|_ajp-methods: Failed to get a valid response for the OPTION request
8081/tcp open blackice-icecap?
32768/tcp open filenet-tms?
49152/tcp open unknown
49153/tcp open unknown
49154/tcp open unknown
49155/tcp open unknown
49156/tcp open unknown
49157/tcp open unknown
Service Info: Device: security-misc
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Mon Oct 12 19:11:27 2020 -- 1 IP address (1 host up) scanned in 205.43 seconds