A port is open. You see it. You know what it means. SSH is live, and the path runs straight through an access proxy.
Nmap makes this visible in seconds. A single scan can reveal SSH endpoints hiding behind a proxy layer. With proper command flags, you can map the proxy, confirm its banners, and detect fingerprint mismatches. Experienced operators use nmap -p 22 --script ssh-hostkey,ssh2 to collect keys, validate them, and check if the target is fronted by a proxy service. Adding --script ssh-auth-methods exposes authentication options before you connect.
An SSH Access Proxy changes the rules. It can mask the real host, control traffic flows, and enforce policy. Nmap’s scripting engine detects these layers and shows you exactly how the connection behaves. Look for indications in the scan output: uniform host keys across multiple IPs, non-standard version strings, or latency patterns that match proxy routing. Coupled with version detection (-sV), this gives you hard data to decide your next step.