Host information for '222.222.158.33'


# Nmap 7.80SVN scan initiated Sat Aug  1 12:29:53 2020 as: nmap -oA data/nweb.n92p3pwiox -sC -sV --open -Pn --system-dns -p "22, 23" 222.222.158.33
Nmap scan report for 222.222.158.33
Host is up (0.23s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh?
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, JavaRMI, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, NCP, NotesRPC, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, WMSRequest, X11Probe, afp, giop, ms-sql-s, oracle-tns: 
|_    %connection refused by remote host!
23/tcp open  telnet  HP H3C SR8808 SecBlade firewall module telnetd
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port22-TCP:V=7.80SVN%I=7%D=8/1%Time=5F25C2B8%P=x86_64-unknown-linux-gnu
SF:%r(GenericLines,25,"\r\n%connection\x20refused\x20by\x20remote\x20host!
SF:")%r(GetRequest,25,"\r\n%connection\x20refused\x20by\x20remote\x20host!
SF:")%r(HTTPOptions,25,"\r\n%connection\x20refused\x20by\x20remote\x20host
SF:!")%r(RTSPRequest,25,"\r\n%connection\x20refused\x20by\x20remote\x20hos
SF:t!")%r(RPCCheck,25,"\r\n%connection\x20refused\x20by\x20remote\x20host!
SF:")%r(DNSVersionBindReqTCP,25,"\r\n%connection\x20refused\x20by\x20remot
SF:e\x20host!")%r(DNSStatusRequestTCP,25,"\r\n%connection\x20refused\x20by
SF:\x20remote\x20host!")%r(Help,25,"\r\n%connection\x20refused\x20by\x20re
SF:mote\x20host!")%r(SSLSessionReq,25,"\r\n%connection\x20refused\x20by\x2
SF:0remote\x20host!")%r(TerminalServerCookie,25,"\r\n%connection\x20refuse
SF:d\x20by\x20remote\x20host!")%r(TLSSessionReq,25,"\r\n%connection\x20ref
SF:used\x20by\x20remote\x20host!")%r(Kerberos,25,"\r\n%connection\x20refus
SF:ed\x20by\x20remote\x20host!")%r(SMBProgNeg,25,"\r\n%connection\x20refus
SF:ed\x20by\x20remote\x20host!")%r(X11Probe,25,"\r\n%connection\x20refused
SF:\x20by\x20remote\x20host!")%r(FourOhFourRequest,25,"\r\n%connection\x20
SF:refused\x20by\x20remote\x20host!")%r(LPDString,25,"\r\n%connection\x20r
SF:efused\x20by\x20remote\x20host!")%r(LDAPSearchReq,25,"\r\n%connection\x
SF:20refused\x20by\x20remote\x20host!")%r(LDAPBindReq,25,"\r\n%connection\
SF:x20refused\x20by\x20remote\x20host!")%r(SIPOptions,25,"\r\n%connection\
SF:x20refused\x20by\x20remote\x20host!")%r(LANDesk-RC,25,"\r\n%connection\
SF:x20refused\x20by\x20remote\x20host!")%r(TerminalServer,25,"\r\n%connect
SF:ion\x20refused\x20by\x20remote\x20host!")%r(NCP,25,"\r\n%connection\x20
SF:refused\x20by\x20remote\x20host!")%r(NotesRPC,25,"\r\n%connection\x20re
SF:fused\x20by\x20remote\x20host!")%r(JavaRMI,25,"\r\n%connection\x20refus
SF:ed\x20by\x20remote\x20host!")%r(WMSRequest,25,"\r\n%connection\x20refus
SF:ed\x20by\x20remote\x20host!")%r(oracle-tns,25,"\r\n%connection\x20refus
SF:ed\x20by\x20remote\x20host!")%r(ms-sql-s,25,"\r\n%connection\x20refused
SF:\x20by\x20remote\x20host!")%r(afp,25,"\r\n%connection\x20refused\x20by\
SF:x20remote\x20host!")%r(giop,25,"\r\n%connection\x20refused\x20by\x20rem
SF:ote\x20host!");
Service Info: Device: firewall

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Aug  1 12:30:16 2020 -- 1 IP address (1 host up) scanned in 23.37 seconds