nmap -AO 127.0.0.1
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-21 15:56 CST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000055s latency).
Not shown: 997 closed tcp ports (reset)
PORT STATE SERVICE VERSION
53/tcp open domain dnsmasq 1.32
| dns-nsid:
|_ bind.version: dnsmasq-1.32
3306/tcp open mysql MySQL 5.5.5-03.02.1-MariaDB-2
| mysql-info:
| Protocol: 10
| Version: 5.5.5-03.02.1-MariaDB-2
| Thread ID: 51
| Capabilities flags: 63486
| Some Capabilities: LongColumnFlag, SupportsCompression, Speaks41ProtocolNew, FoundRows, ConnectWithDatabase, Speaks41ProtocolOld, ODBCClient, IgnoreSigpipes, Support41Auth, InteractiveClient, DontAllowDatabaseTableColumn, IgnoreSpaceBeforeParenthesis, SupportsLoadDataLocal, SupportsTransactions, SupportsAuthPlugins, SupportsMultipleStatments, SupportsMultipleResults
| Status: Autocommit
| Salt: 6{,d7"BhfGmrtnNx6?yg
|_ Auth Plugin Name: mysql_native_password
**9050/tcp open tor-socks Tor SOCKS proxy**
**| socks-open-proxy: **
**| status: open**
**| versions: **
**| socks4**
**|_ socks5**
**| socks-auth-info: **
**| Username and password**
**|_ No authentication**
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
Nmap done: 1 IP address (1 host up) scanned in 27.88 seconds
How to prevent scans from exposing this information to the tor