Host information for 'host-81-121-105-5.business.telecomitalia.it'


# Nmap 7.60 scan initiated Fri Jul 28 12:56:36 2023 as: nmap -oA data/nweb.k89trj75oe -sC -sV --open -Pn --system-dns -p 21, 179 81.121.105.5
Nmap scan report for host-81-121-105-5.business.telecomitalia.it (81.121.105.5)
Host is up (0.23s latency).

PORT    STATE SERVICE    VERSION
21/tcp  open  ftp?
| fingerprint-strings: 
|   DNSStatusRequest, DNSVersionBindReq, FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, NCP, NULL, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, X11Probe: 
|_    421 Session limit reached, closing control connection
179/tcp open  tcpwrapped
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port21-TCP:V=7.60%I=7%D=7/28%Time=64C41D76%P=x86_64-pc-linux-gnu%r(NULL
SF:,37,"421\x20Session\x20limit\x20reached,\x20closing\x20control\x20conne
SF:ction\r\n")%r(GenericLines,37,"421\x20Session\x20limit\x20reached,\x20c
SF:losing\x20control\x20connection\r\n")%r(Help,37,"421\x20Session\x20limi
SF:t\x20reached,\x20closing\x20control\x20connection\r\n")%r(GetRequest,37
SF:,"421\x20Session\x20limit\x20reached,\x20closing\x20control\x20connecti
SF:on\r\n")%r(HTTPOptions,37,"421\x20Session\x20limit\x20reached,\x20closi
SF:ng\x20control\x20connection\r\n")%r(RTSPRequest,37,"421\x20Session\x20l
SF:imit\x20reached,\x20closing\x20control\x20connection\r\n")%r(RPCCheck,3
SF:7,"421\x20Session\x20limit\x20reached,\x20closing\x20control\x20connect
SF:ion\r\n")%r(DNSVersionBindReq,37,"421\x20Session\x20limit\x20reached,\x
SF:20closing\x20control\x20connection\r\n")%r(DNSStatusRequest,37,"421\x20
SF:Session\x20limit\x20reached,\x20closing\x20control\x20connection\r\n")%
SF:r(SSLSessionReq,37,"421\x20Session\x20limit\x20reached,\x20closing\x20c
SF:ontrol\x20connection\r\n")%r(TLSSessionReq,37,"421\x20Session\x20limit\
SF:x20reached,\x20closing\x20control\x20connection\r\n")%r(Kerberos,37,"42
SF:1\x20Session\x20limit\x20reached,\x20closing\x20control\x20connection\r
SF:\n")%r(SMBProgNeg,37,"421\x20Session\x20limit\x20reached,\x20closing\x2
SF:0control\x20connection\r\n")%r(X11Probe,37,"421\x20Session\x20limit\x20
SF:reached,\x20closing\x20control\x20connection\r\n")%r(FourOhFourRequest,
SF:37,"421\x20Session\x20limit\x20reached,\x20closing\x20control\x20connec
SF:tion\r\n")%r(LPDString,37,"421\x20Session\x20limit\x20reached,\x20closi
SF:ng\x20control\x20connection\r\n")%r(LDAPSearchReq,37,"421\x20Session\x2
SF:0limit\x20reached,\x20closing\x20control\x20connection\r\n")%r(LDAPBind
SF:Req,37,"421\x20Session\x20limit\x20reached,\x20closing\x20control\x20co
SF:nnection\r\n")%r(SIPOptions,37,"421\x20Session\x20limit\x20reached,\x20
SF:closing\x20control\x20connection\r\n")%r(LANDesk-RC,37,"421\x20Session\
SF:x20limit\x20reached,\x20closing\x20control\x20connection\r\n")%r(Termin
SF:alServer,37,"421\x20Session\x20limit\x20reached,\x20closing\x20control\
SF:x20connection\r\n")%r(NCP,37,"421\x20Session\x20limit\x20reached,\x20cl
SF:osing\x20control\x20connection\r\n");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Jul 28 12:56:57 2023 -- 1 IP address (1 host up) scanned in 20.98 seconds