Skip to content

Nmap Operating System Scanning

Detections of the operating system of the target

nmap -0 www.qualitylingualservices.com

Output for IP 198.185.159.144

Starting Nmap 7.95 ( https://nmap.org ) at 2025-10-27 22:31 MDT Nmap scan report for www.qualitylingualservices.com (198.185.159.144) HTst is up (0.067s latency). Other addresses for www.qualitylingualservices.com (not scanned): 198.49.23.144 198.185.159.145 198.49.23.145 Not shown: 996 filtered tcp ports (no-response)

PORT STATE SERVICE
43/tcp closed 'whois'
80/tcp open 'http'
443/tcp open 'https'
2030/tcp closed 'device2'

Device type: storage-misc|general purpose Running (JUST GUESSING): HP embedded (85%), FreeBSD 12.X|13.X (85%) OS CPE: cpe:/h:hp:p2000_g3 cpe:/o:freebsd:freebsd:12 cpe:/o:freebsd:freebsd:13.0 Aggressive OS guesses: HP P2000 G3 NAS device (85%), FreeBSD 12.0-RELEASE - 12.1-RELEASE (85%), FreeBSD 12.1-RELEASE (85%), FreeBSD 13.0-RELEASE (85%) No exact OS matches for host (test conditions non-ideal).

Nmap done: 1 IP address (1 host up) scanned in 10.14 seconds

More information on port 2030 Port 2030 - Oracle MS Transaction Server On whatport website, the most important information to look at is about the Security Overview of any port.


Output for IP 198.49.23.144

nmap -0 198.49.23.144

Starting Nmap 7.95 ( https://nmap.org ) at 2025-10-28 22:05 MDT Nmap scan report for 198.185.159.145 Host is up (0.068s latency). Not shown: 996 filtered tcp ports (no-response)

PORT STATE SERVICE
43/tcp closed 'whois'
80/tcp open 'http'
443/tcp open 'https'
2030/tcp closed 'device2'

Device type: storage-misc|general purpose Running (JUST GUESSING): HP embedded (85%), FreeBSD 11.X|12.X (85%) OS CPE: cpe:/h:hp:p2000_g3 cpe:/o:freebsd: freebsd:11.0 cpe:/o:freebsd:freebsd:12 Aggressive OS guesses: HP P2000 G3 NAS device (85%), FreeBSD 11.0-RELEASE (85%), FreeBSD 11.1-RELEASE (85%), FreeB SD 12.0-RELEASE - 12.1-RELEASE (85%) No exact OS matches for host (test conditions non-ideal).


Output for IP 198.185.159.145

nmap -0 198.185.159.145

Starting Nmap 7.95 ( https://nmap.org ) at 2025-10-28 22:11 MDT Nmap scan report for 198.185.159.145 Host is up (0.068s latency). Not shown: 996 filtered tcp ports (no-response)

PORT STATE SERVICE
43/tcp closed 'whois'
80/tcp open 'http'
443/tcp open 'https'
2030/tcp closed 'device2'

Device type: storage-misc|general purpose Running (JUST GUESSING): HP embedded (85%), FreeBSD 12.X|13.X (85%) OS CPE: cpe:/h:hp:p2000_g3 cpe:/o:freebsd:freebsd:12 cpe:/o:freebsd:freebsd:13.0 Aggressive OS guesses: HP P2000 G3 NAS device (85%), FreeBSD 12.0-RELEASE - 12.1-RELEASE (85%), FreeBSD 12.1-RELEA SE (85%), FreeBSD 13.0-RELEASE (85%) No exact OS matches for host (test conditions non-ideal).


Output for IP 198.49.23.145

nmap -0 198.49.23.145

Starting Nmap 7.95 ( https://nmap.org ) at 2025-10-28 22:15 MDT Nmap scan report for 198.49.23.145 Host is up (0.069s latency). Not shown: 996 filtered tcp ports (no-response)

PORT STATE SERVICE
43/tcp closed 'whois'
80/tcp open 'http'
443/tcp open 'https'
2030/tcp closed 'device2'

Device type: storage-misc|general purpose Running (JUST GUESSING): HP embedded (85%), FreeBSD 11.X|12.X (85%) OS CPE: cpe:/h:hp:p2000_g3 cpe:/o:freebsd:freebsd:11.0 cpe:/o:freebsd:freebsd:12 Aggressive OS guesses: HP P2000 G3 NAS device (85%), FreeBSD 11.0-RELEASE (85%), FreeBSD 11.1-RELEASE (85%), FreeB SD 12.0-RELEASE _- 12.1-RELEASE (85%) No exact OS matches for host (test conditions non-ideal).


Verdict

Based on the intial scan results (to be verified with other scanners): The website runs on four IP addresses (New York based). Detailed information on each IP can be taken on ARIN. OS: probably FreeBSD (to be verified).


Port 2030 (to be investigated)


Common Vulnerabilities:

Exposure of this service may increase the attack surface for brute-force attacks aiming to exploit weak authentication.
Legacy or improperly secured Oracle and Microsoft integration points could be vulnerable to unauthorized access or privilege escalation.
Lack of encryption can lead to data interception or man-in-the-middle (MitM) attacks.

Common Mitigations:

Restrict access using network segmentation and firewall rules, limiting communication only to trusted application servers.
Enforce strong authentication mechanisms and regularly audit user permissions.
Employ encryption for data in transit, such as tunneling over secure protocols or using VPNs.
Keep all Oracle and Microsoft components patched and up to date to mitigate known vulnerabilities.