Nmap Scanning all the ports

$ nmap -A -p- -vvv -oN nmapscan_allports -T4 10.10.111.58

Increasing send delay for 10.10.111.58 from 0 to 5 due to 138 out of 344 dropped probes since last increase.
Increasing send delay for 10.10.111.58 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
Warning: 10.10.111.58 giving up on port because retransmission cap hit (6).
Nmap scan report for 10.10.111.58
Host is up, received syn-ack (0.25s latency).
Scanned at 2023-06-02 11:25:37 EDT for 2511s
Not shown: 63472 closed tcp ports (conn-refused), 2060 filtered tcp ports (no-response)
PORT      STATE SERVICE REASON  VERSION
22/tcp    open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 c2842ac1225a10f16616dda0f6046295 (RSA)
| ssh-rsa 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
|   256 429e2ff63e5adb51996271c48c223ebb (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNIiJc4hdfcu/HtdZN1fyz/hU1SgSas1Lk/ncNc9UkfSDG2SQziJ/5SEj1AQhK0T4NdVeaMSDEunQnrmD1tJ9hg=
|   256 2ea0a56cd983e0016cb98a609b638672 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEZhkboYdSkdR3n1G4sQtN4uO3hy89JxYkizKi6Sd/Ky
80/tcp    open  http    syn-ack Apache httpd 2.4.41 ((Ubuntu))
| http-methods: 
|_  Supported Methods: OPTIONS HEAD GET POST
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: Apache/2.4.41 (Ubuntu)
37370/tcp open  ftp     syn-ack vsftpd 3.0.3
Service Info: OSs: Linux, Unix; CPE: cpe:/o:linux:linux_kernel

Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at <https://nmap.org/submit/> .
# Nmap done at Fri Jun  2 12:07:29 2023 -- 1 IP address (1 host up) scanned in 2512.27 seconds

website.png

/gallery              (Status: 301) [Size: 314] [--> <http://10.10.111.58/gallery/>]
/static               (Status: 301) [Size: 313] [--> <http://10.10.111.58/static/>]
/pricing              (Status: 301) [Size: 314] [--> <http://10.10.111.58/pricing/>]
/11                   (Status: 200) [Size: 627909]
/3                    (Status: 200) [Size: 421858]
/18                   (Status: 200) [Size: 2036137]
/16                   (Status: 200) [Size: 2468462]
/5                    (Status: 200) [Size: 1426557]
/9                    (Status: 200) [Size: 1190575]
/00                   (Status: 200) [Size: 127]

curlon00.png

loginportal.png

source_code_of_loginportal.png