Nmap scan report for tunad.io (108.179.253.184) Host is up (0.049s latency). rDNS record for 108.179.253.184: br592-ip05.hostgator.com.br Not shown: 984 closed tcp ports (reset) PORT STATE SERVICE VERSION 21/tcp open ftp Pure-FTPd | ssl-cert: Subject: commonName=*.hostgator.com.br | Subject Alternative Name: DNS:*.hostgator.com.br, DNS:hostgator.com.br | Not valid before: 2025-06-03T00:00:00 |_Not valid after: 2026-06-03T23:59:59 |_ssl-date: TLS randomness does not represent time 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | ssh-hostkey: | 1024 1f:a2:4a:66:c6:60:4c:80:48:4d:68:53:2a:8a:5c:16 (DSA) |_ 2048 90:62:68:46:54:1e:37:6b:4e:e8:10:9a:09:f6:a8:31 (RSA) 25/tcp open smtp Exim smtpd 4.98.1 | smtp-commands: br592.hostgator.com.br Hello tunad.io [208.76.253.234], SIZE 52428800, LIMITS MAILMAX=50 RCPTMAX=50000, 8BITMIME, PIPELINING, PIPECONNECT, AUTH PLAIN LOGIN, STARTTLS, HELP |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP 26/tcp open smtp Exim smtpd 4.98.1 |_smtp-commands: Couldn't establish connection on port 26 53/tcp open domain ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7) | dns-nsid: |_ bind.version: 9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.9 80/tcp open http Apache httpd |_http-server-header: Apache |_http-title: Did not follow redirect to https://tunad.io/ | http-cookie-flags: | /: | mc_session_ids[multi][0]: | httponly flag not set | mc_session_ids[multi][1]: | httponly flag not set | mc_session_ids[multi][2]: | httponly flag not set | mc_session_ids[multi][3]: | httponly flag not set | mc_session_ids[multi][4]: |_ httponly flag not set 110/tcp open pop3 Dovecot pop3d |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=tunad.io | Subject Alternative Name: DNS:tunad.io | Not valid before: 2025-09-10T16:29:58 |_Not valid after: 2025-12-09T16:29:57 |_pop3-capabilities: SASL(PLAIN LOGIN) CAPA TOP USER PIPELINING RESP-CODES STLS UIDL AUTH-RESP-CODE 143/tcp open imap Dovecot imapd | ssl-cert: Subject: commonName=tunad.io | Subject Alternative Name: DNS:tunad.io | Not valid before: 2025-09-10T16:29:58 |_Not valid after: 2025-12-09T16:29:57 |_ssl-date: TLS randomness does not represent time |_imap-capabilities: LITERAL+ NAMESPACE STARTTLS OK IDLE listed AUTH=LOGINA0001 LOGIN-REFERRALS SASL-IR ID have AUTH=PLAIN more capabilities post-login IMAP4rev1 ENABLE Pre-login 161/tcp filtered snmp 443/tcp open ssl/http Apache httpd | ssl-cert: Subject: commonName=tunad.io | Subject Alternative Name: DNS:tunad.io | Not valid before: 2025-09-10T16:29:58 |_Not valid after: 2025-12-09T16:29:57 | http-cookie-flags: | /: | mc_session_ids[multi][0]: | httponly flag not set | mc_session_ids[multi][1]: | httponly flag not set | mc_session_ids[multi][2]: | httponly flag not set | mc_session_ids[multi][3]: | httponly flag not set | mc_session_ids[multi][4]: |_ httponly flag not set |_http-server-header: Apache |_ssl-date: TLS randomness does not represent time |_http-generator: WordPress 6.8.2 |_http-title: Tunad - Media Intelligence Platform 465/tcp open tcpwrapped |_smtp-commands: Couldn't establish connection on port 465 587/tcp open tcpwrapped | smtp-commands: br592.hostgator.com.br Hello tunad.io [208.76.253.234], SIZE 52428800, LIMITS MAILMAX=50 RCPTMAX=50000, 8BITMIME, PIPELINING, PIPECONNECT, AUTH PLAIN LOGIN, STARTTLS, HELP |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP 993/tcp open ssl/imap Dovecot imapd |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=tunad.io | Subject Alternative Name: DNS:tunad.io | Not valid before: 2025-09-10T16:29:58 |_Not valid after: 2025-12-09T16:29:57 |_imap-capabilities: LITERAL+ NAMESPACE OK IDLE listed AUTH=LOGINA0001 LOGIN-REFERRALS SASL-IR ID have AUTH=PLAIN more capabilities post-login IMAP4rev1 ENABLE Pre-login 995/tcp open ssl/pop3 Dovecot pop3d | ssl-cert: Subject: commonName=tunad.io | Subject Alternative Name: DNS:tunad.io | Not valid before: 2025-09-10T16:29:58 |_Not valid after: 2025-12-09T16:29:57 |_ssl-date: TLS randomness does not represent time |_pop3-capabilities: TOP RESP-CODES PIPELINING SASL(PLAIN LOGIN) USER AUTH-RESP-CODE UIDL CAPA 2222/tcp open ssh OpenSSH 7.4 (protocol 2.0) | ssh-hostkey: | 1024 1f:a2:4a:66:c6:60:4c:80:48:4d:68:53:2a:8a:5c:16 (DSA) |_ 2048 90:62:68:46:54:1e:37:6b:4e:e8:10:9a:09:f6:a8:31 (RSA) 3306/tcp open mysql MySQL 5.7.23-23 | ssl-cert: Subject: commonName=*.hostgator.com.br | Subject Alternative Name: DNS:*.hostgator.com.br, DNS:hostgator.com.br | Not valid before: 2025-06-03T00:00:00 |_Not valid after: 2026-06-03T23:59:59 |_ssl-date: TLS randomness does not represent time | mysql-info: | Protocol: 10 | Version: 5.7.23-23 | Thread ID: 43335495 | Capabilities flags: 65535 | Some Capabilities: Support41Auth, Speaks41ProtocolOld, ODBCClient, ConnectWithDatabase, LongPassword, SupportsTransactions, Speaks41ProtocolNew, LongColumnFlag, SwitchToSSLAfterHandshake, FoundRows, IgnoreSigpipes, DontAllowDatabaseTableColumn, SupportsLoadDataLocal, SupportsCompression, IgnoreSpaceBeforeParenthesis, InteractiveClient, SupportsMultipleStatments, SupportsMultipleResults, SupportsAuthPlugins | Status: Autocommit | Salt: ^F*lb<70A\x1C o=eY:U\x14\x03W |_ Auth Plugin Name: mysql_native_password Device type: VoIP adapter Running: Cisco embedded OS CPE: cpe:/h:cisco:unified_call_manager OS details: Cisco Unified Communications Manager VoIP adapter Network Distance: 11 hops Service Info: Host: br592.hostgator.com.br; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7 TRACEROUTE (using port 554/tcp) HOP RTT ADDRESS 1 0.23 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 2.68 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.91 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 0.68 ms be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102) 6 1.56 ms lumen.lax04.atlas.cogentco.com (154.54.10.198) 7 ... 8 50.13 ms THE-ENDURAN.ear1.Atlanta1.Level3.net (65.59.223.50) 9 50.63 ms 50-6-131-4.unifiedlayer.com (50.6.131.4) 10 ... 11 48.24 ms br592-ip05.hostgator.com.br (108.179.253.184) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 37.18 seconds