rustscan -a 10.10.11.63 --range 1-65535 -- -sV [!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers [!] Your file limit is very small, which negatively impacts RustScan's speed. Use the Docker image, or up the Ulimit with '--ulimit 5000'. Open 10.10.11.63:22 Open 10.10.11.63:80 Open 10.10.11.63:2222
[~] Starting Nmap [>] The Nmap command to be run is nmap -sV -vvv -p 22,80,2222 10.10.11.63
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-04-06 06:06 UTC NSE: Loaded 46 scripts for scanning. Initiating Ping Scan at 06:06 Scanning 10.10.11.63 [4 ports] Stats: 0:00:01 elapsed; 0 hosts completed (0 up), 1 undergoing Ping Scan Ping Scan Timing: About 100.00% done; ETC: 06:06 (0:00:00 remaining) Completed Ping Scan at 06:06, 0.36s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 06:06 Completed Parallel DNS resolution of 1 host. at 06:06, 13.00s elapsed DNS resolution of 1 IPs took 13.01s. Mode: Async [#: 1, OK: 0, NX: 0, DR: 1, SF: 0, TR: 3, CN: 0] Initiating SYN Stealth Scan at 06:06 Scanning10.10.11.63 [3 ports] Discovered open port 2222/tcp on10.10.11.63 Discovered open port 22/tcp on10.10.11.63 Discovered open port 80/tcp on10.10.11.63 Completed SYN Stealth Scan at 06:06, 3.01s elapsed (3 total ports) Initiating Service scan at 06:06 Scanning3 services on10.10.11.63 Completed Service scan at 06:06, 6.92s elapsed (3 services on1 host) NSE: Script scanning 10.10.11.63. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 06:06 Completed NSE at 06:06, 4.49s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 06:06 Completed NSE at 06:06, 1.85s elapsed Nmap scan report for 10.10.11.63 Host is up, received echo-reply ttl 63 (0.33s latency). Scanned at 2025-04-0606:06:19 UTC for 17s
PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 63 OpenSSH 9.6p1 Ubuntu 3ubuntu13.9 (Ubuntu Linux; protocol 2.0) 80/tcp open http syn-ack ttl 62 Caddy httpd 2222/tcp open ssh syn-ack ttl 62 OpenSSH 9.6p1 Ubuntu 3ubuntu13.5 (Ubuntu Linux; protocol 2.0) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 30.91 seconds Raw packets sent: 10 (416B) | Rcvd: 5 (212B)