For nmap to even make a guess, nmap needs to find at least 1 open and 1 closed port on a remote host. Using the previous scan results, let us find out more about the host 192.168.0.115:
# nmap -O -sV 192.168.0.115
Output:
Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-02 12:21 CEST Nmap scan report for 192.168.0.115 Host is up (0.00023s latency). Not shown: 991 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.1 (protocol 2.0) 80/tcp open http Apache httpd 2.2.19 ((Unix) mod_ssl/2.2.19 OpenSSL/0.9.8zf DAV/2) 111/tcp open rpcbind 2 (RPC #100000) 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 443/tcp open ssl/http Apache httpd 2.2.19 ((Unix) mod_ssl/2.2.19 OpenSSL/0.9.8zf DAV/2) 445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 873/tcp open rsync (protocol version 29) 2049/tcp open nfs 2-4 (RPC #100003) 49152/tcp open upnp Portable SDK for UPnP devices 1.6.9 (Linux 2.6.39.3; UPnP 1.0) MAC Address: 00:26:2D:06:39:DB (Wistron) Device type: general purpose Running: Linux 2.6.X|3.X OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 OS details: Linux 2.6.38 - 3.0 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel:2.6.39.3 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 14.58 seconds
nJoy 😉