# Nmap 7.80 scan initiated Thu Jan 15 00:54:05 2026 as: nmap -sV -sC -p- -T4 -oN full_service_scan.txt 85.214.68.47 Nmap scan report for h2816693.stratoserver.net (85.214.68.47) Host is up (0.012s latency). Not shown: 65516 closed ports PORT STATE SERVICE VERSION 25/tcp filtered smtp 80/tcp open http Microsoft IIS httpd 8.5 | http-methods: |_ Potentially risky methods: TRACE |_http-server-header: Microsoft-IIS/8.5 |_http-title: Priston Tale For Us - 2026 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds 465/tcp filtered smtps 587/tcp filtered submission 3389/tcp open ssl/ms-wbt-server? | rdp-ntlm-info: | Target_Name: VPS | NetBIOS_Domain_Name: VPS | NetBIOS_Computer_Name: VPS | DNS_Domain_Name: VPS | DNS_Computer_Name: VPS | Product_Version: 6.3.9600 |_ System_Time: 2026-01-15T00:55:34+00:00 | ssl-cert: Subject: commonName=VPS | Not valid before: 2026-01-10T15:24:46 |_Not valid after: 2026-07-12T15:24:46 5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-server-header: Microsoft-HTTPAPI/2.0 |_http-title: Not Found 9876/tcp filtered sd 47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-server-header: Microsoft-HTTPAPI/2.0 |_http-title: Not Found 49152/tcp open msrpc Microsoft Windows RPC 49153/tcp open msrpc Microsoft Windows RPC 49154/tcp open msrpc Microsoft Windows RPC 49155/tcp open msrpc Microsoft Windows RPC 49157/tcp open msrpc Microsoft Windows RPC 49158/tcp open msrpc Microsoft Windows RPC 49159/tcp open msrpc Microsoft Windows RPC 54303/tcp open ms-sql-s Microsoft SQL Server 2017 | ms-sql-ntlm-info: | Target_Name: VPS | NetBIOS_Domain_Name: VPS | NetBIOS_Computer_Name: VPS | DNS_Domain_Name: VPS | DNS_Computer_Name: VPS |_ Product_Version: 6.3.9600 Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows Host script results: |_ms-sql-info: ERROR: Script execution failed (use -d to debug) |_smb-os-discovery: ERROR: Script execution failed (use -d to debug) | smb-security-mode: | account_used: guest | authentication_level: user | challenge_response: supported |_ message_signing: disabled (dangerous, but default) | smb2-security-mode: | 2.02: |_ Message signing enabled but not required | smb2-time: | date: 2026-01-15T00:55:39 |_ start_date: 2025-11-27T19:22:45 Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Thu Jan 15 00:55:44 2026 -- 1 IP address (1 host up) scanned in 98.23 seconds