Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 6.47 ( http://nmap.org ) at 2014-09-06 02:39 WIB
- NSE: Loaded 118 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating Ping Scan at 02:39
- Scanning www.thekickback.com (192.254.233.20) [4 ports]
- Completed Ping Scan at 02:39, 0.03s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 02:39
- Completed Parallel DNS resolution of 1 host. at 02:39, 16.50s elapsed
- Initiating SYN Stealth Scan at 02:39
- Scanning www.thekickback.com (192.254.233.20) [1000 ports]
- Discovered open port 143/tcp on 192.254.233.20
- Discovered open port 21/tcp on 192.254.233.20
- Discovered open port 8080/tcp on 192.254.233.20
- Discovered open port 993/tcp on 192.254.233.20
- Discovered open port 80/tcp on 192.254.233.20
- Discovered open port 53/tcp on 192.254.233.20
- Discovered open port 587/tcp on 192.254.233.20
- Discovered open port 995/tcp on 192.254.233.20
- Discovered open port 110/tcp on 192.254.233.20
- Discovered open port 443/tcp on 192.254.233.20
- Discovered open port 3306/tcp on 192.254.233.20
- Discovered open port 2222/tcp on 192.254.233.20
- Discovered open port 465/tcp on 192.254.233.20
- Discovered open port 26/tcp on 192.254.233.20
- Completed SYN Stealth Scan at 02:39, 17.66s elapsed (1000 total ports)
- Initiating Service scan at 02:39
- Scanning 14 services on www.thekickback.com (192.254.233.20)
- Completed Service scan at 02:40, 23.43s elapsed (14 services on 1 host)
- Initiating OS detection (try #1) against www.thekickback.com (192.254.233.20)
- Retrying OS detection (try #2) against www.thekickback.com (192.254.233.20)
- WARNING: OS didn't match until try #2
- Initiating Traceroute at 02:40
- Completed Traceroute at 02:40, 0.02s elapsed
- Initiating Parallel DNS resolution of 4 hosts. at 02:40
- Completed Parallel DNS resolution of 4 hosts. at 02:40, 16.50s elapsed
- NSE: Script scanning 192.254.233.20.
- Initiating NSE at 02:40
- Completed NSE at 02:40, 19.59s elapsed
- Nmap scan report for www.thekickback.com (192.254.233.20)
- Host is up (0.13s latency).
- Not shown: 952 closed ports, 34 filtered ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Pure-FTPd
- |_ftp-anon: ERROR: Script execution failed (use -d to debug)
- |_ftp-bounce: no banner
- 26/tcp open smtp Exim smtpd 4.82
- | smtp-commands: gator3225.hostgator.com Hello www.thekickback.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- |_ssl-date: 2014-09-05T19:39:37+00:00; -54s from local time.
- 53/tcp open domain
- 80/tcp open http-proxy Squid http proxy
- |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
- |_http-methods: GET HEAD POST OPTIONS
- | http-robots.txt: 2 disallowed entries
- |_/files/ /images/
- |_http-title: Site doesn't have a title (text/html).
- 110/tcp open pop3 Dovecot pop3d
- |_pop3-capabilities: PIPELINING AUTH-RESP-CODE SASL(PLAIN LOGIN) STLS UIDL CAPA USER RESP-CODES TOP
- 143/tcp open imap Dovecot imapd
- |_imap-capabilities: Pre-login IDLE IMAP4rev1 AUTH=LOGINA0001 capabilities have ENABLE LOGIN-REFERRALS STARTTLS post-login listed OK more NAMESPACE AUTH=PLAIN SASL-IR LITERAL+ ID
- 443/tcp open http Apache httpd
- |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- | http-robots.txt: 1 disallowed entry
- |_/
- |_http-title: thekickback.com
- 465/tcp open smtps?
- | smtp-commands: gator3225.hostgator.com Hello www.thekickback.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
- |_ Commands supported:
- |_ssl-date: 2014-09-05T19:39:35+00:00; -53s from local time.
- 587/tcp open smtp Exim smtpd 4.82
- | smtp-commands: gator3225.hostgator.com Hello www.thekickback.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=*.hostgator.com
- | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-09T02:56:45+00:00
- | Not valid after: 2018-04-10T22:46:45+00:00
- | MD5: 626c e2ae 0031 4763 877a 57bc b21f 5dc3
- |_SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
- |_ssl-date: 2014-09-05T19:39:35+00:00; -54s from local time.
- 993/tcp open ssl/imap Dovecot imapd
- |_imap-capabilities: Pre-login IDLE IMAP4rev1 AUTH=LOGINA0001 capabilities have ENABLE LOGIN-REFERRALS post-login listed OK more NAMESPACE AUTH=PLAIN SASL-IR LITERAL+ ID
- | ssl-cert: Subject: commonName=*.hostgator.com
- | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-09T02:56:45+00:00
- | Not valid after: 2018-04-10T22:46:45+00:00
- | MD5: 626c e2ae 0031 4763 877a 57bc b21f 5dc3
- |_SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
- |_ssl-date: 2014-09-05T19:39:38+00:00; -53s from local time.
- 995/tcp open ssl/pop3 Dovecot pop3d
- | ssl-cert: Subject: commonName=*.hostgator.com
- | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-09T02:56:45+00:00
- | Not valid after: 2018-04-10T22:46:45+00:00
- | MD5: 626c e2ae 0031 4763 877a 57bc b21f 5dc3
- |_SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
- |_ssl-date: 2014-09-05T19:39:37+00:00; -54s from local time.
- 2222/tcp open ssh OpenSSH 5.3 (protocol 2.0)
- |_ssh-hostkey:
- 3306/tcp open mysql MySQL 5.5.37-35.1
- | mysql-info:
- | Protocol: 53
- | Version: .5.37-35.1
- | Thread ID: 76603651
- | Capabilities flags: 65535
- | Some Capabilities: Support41Auth, IgnoreSigpipes, DontAllowDatabaseTableColumn, SupportsCompression, SupportsTransactions, Speaks41ProtocolNew, LongColumnFlag, IgnoreSpaceBeforeParenthesis, LongPassword, ConnectWithDatabase, FoundRows, SupportsLoadDataLocal, InteractiveClient, ODBCClient, Speaks41ProtocolOld, SwitchToSSLAfterHandshake
- | Status: Autocommit
- |_ Salt: n7cn~PU9[?hosupT2:n<
- 8080/tcp open http nginx 1.6.1
- |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
- |_http-methods: GET HEAD POST OPTIONS
- | http-robots.txt: 2 disallowed entries
- |_/files/ /images/
- |_http-title: Site doesn't have a title (text/html).
- Device type: WAP|storage-misc
- Running: Linux 2.4.X, Netgear RAIDiator 4.X
- OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:netgear:raidiator:4
- OS details: DD-WRT v23 (Linux 2.4.36), Netgear ReadyNAS Duo NAS device (RAIDiator 4.1.4)
- Uptime guess: 67.274 days (since Mon Jun 30 20:06:23 2014)
- Network Distance: 4 hops
- Service Info: Host: gator3225.hostgator.com
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 0.63 ms 192.168.200.1
- 2 1.97 ms 192.168.30.1
- 3 2.39 ms 172.16.1.1
- 4 7.17 ms 192.254.233.20
- NSE: Script Post-scanning.
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 101.74 seconds
- Raw packets sent: 1265 (57.732KB) | Rcvd: 1005 (41.723KB)
- root@javanese:~# nmap -v -A www.thekickback.com -d
- Starting Nmap 6.47 ( http://nmap.org ) at 2014-09-06 02:46 WIB
- PORTS: Using top 1000 ports found open (TCP:1000, UDP:0, SCTP:0)
- --------------- Timing report ---------------
- hostgroups: min 1, max 100000
- rtt-timeouts: init 1000, min 100, max 10000
- max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
- parallelism: min 0, max 0
- max-retries: 10, host-timeout: 0
- min-rate: 0, max-rate: 0
- ---------------------------------------------
- NSE: Using Lua 5.2.
- NSE: Script Arguments seen from CLI:
- NSE: Loaded 118 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating Ping Scan at 02:46
- Scanning www.thekickback.com (192.254.233.20) [4 ports]
- Packet capture filter (device eth0): dst host 192.168.200.23 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 192.254.233.20)))
- We got a TCP ping packet back from 192.254.233.20 port 80 (trynum = 0)
- Completed Ping Scan at 02:46, 0.09s elapsed (1 total hosts)
- Overall sending rates: 44.85 packets / s, 1704.25 bytes / s.
- mass_rdns: Using DNS server 192.168.200.1
- mass_rdns: Using DNS server 202.134.1.10
- mass_rdns: Using DNS server 8.8.8.8
- Initiating Parallel DNS resolution of 1 host. at 02:46
- mass_rdns: 16.50s 0/1 [#: 3, OK: 0, NX: 0, DR: 0, SF: 0, TR: 6]
- Completed Parallel DNS resolution of 1 host. at 02:47, 16.50s elapsed
- DNS resolution of 1 IPs took 16.50s. Mode: Async [#: 3, OK: 0, NX: 0, DR: 1, SF: 0, TR: 6, CN: 0]
- Initiating SYN Stealth Scan at 02:47
- Scanning www.thekickback.com (192.254.233.20) [1000 ports]
- Packet capture filter (device eth0): dst host 192.168.200.23 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 192.254.233.20)))
- Discovered open port 80/tcp on 192.254.233.20
- Discovered open port 8080/tcp on 192.254.233.20
- Discovered open port 993/tcp on 192.254.233.20
- Discovered open port 53/tcp on 192.254.233.20
- Discovered open port 21/tcp on 192.254.233.20
- Discovered open port 3306/tcp on 192.254.233.20
- Discovered open port 143/tcp on 192.254.233.20
- Discovered open port 443/tcp on 192.254.233.20
- Discovered open port 110/tcp on 192.254.233.20
- Discovered open port 587/tcp on 192.254.233.20
- Discovered open port 995/tcp on 192.254.233.20
- Increased max_successful_tryno for 192.254.233.20 to 1 (packet drop)
- Discovered open port 26/tcp on 192.254.233.20
- Increased max_successful_tryno for 192.254.233.20 to 2 (packet drop)
- Discovered open port 2222/tcp on 192.254.233.20
- Discovered open port 465/tcp on 192.254.233.20
- Completed SYN Stealth Scan at 02:47, 21.96s elapsed (1000 total ports)
- Overall sending rates: 52.41 packets / s, 2306.06 bytes / s.
- Initiating Service scan at 02:47
- Scanning 14 services on www.thekickback.com (192.254.233.20)
- Got nsock CONNECT response with status ERROR - aborting this service
- Completed Service scan at 02:48, 23.51s elapsed (14 services on 1 host)
- Packet capture filter (device eth0): dst host 192.168.200.23 and (icmp or (tcp and (src host 192.254.233.20)))
- Initiating OS detection (try #1) against www.thekickback.com (192.254.233.20)
- OS detection timingRatio() == (1409946481.002 - 1409946480.502) * 1000 / 500 == 1.002
- Retrying OS detection (try #2) against www.thekickback.com (192.254.233.20)
- Insufficient responses from 192.254.233.20 for TCP sequencing (2), OS detection may be less accurate
- OS detection timingRatio() == (1409946484.338 - 1409946483.838) * 1000 / 500 == 1.002
- WARNING: OS didn''t receive: EOF
- NSE: Finished ssl-date against www.thekickback.com (192.254.233.20:443).
- NSE: Finished http-auth against www.thekickback.com (192.254.233.20:8080).
- NSE: Finished http-ntlm-info against www.thekickback.com (192.254.233.20:8080).
- NSE: ftp-anon against www.thekickback.com (192.254.233.20:21) threw an error!
- ERROR
- stack traceback:
- [C]: in function 'try'
- /usr/bin/../share/nmap/scripts/ftp-anon.nse:122: in function </usr/bin/../share/nmap/scripts/ftp-anon.nse:99>
- (...tail calls...)
- NSE: Finished http-title against www.thekickback.com (192.254.233.20:8080).
- NSE: Finished http-generator against www.thekickback.com (192.254.233.20:8080).
- NSE: GET Request: GET http://www.wikipedia.org HTTP/1.0
- Host: www.wikipedia.org
- NSE: Finished ssl-date against www.thekickback.com (192.254.233.20:587).
- NSE: GET Request: GET http://www.google.com HTTP/1.0
- Host: www.google.com
- NSE: Finished ssl-cert against www.thekickback.com (192.254.233.20:995).
- NSE: Finished smtp-commands against www.thekickback.com (192.254.233.20:587).
- NSE: tls-nextprotoneg: Server does not support TLS NPN extension.
- NSE: Finished tls-nextprotoneg against www.thekickback.com (192.254.233.20:465).
- NSE: Finished ssl-date against www.thekickback.com (192.254.233.20:995).
- NSE: Finished ssl-cert against www.thekickback.com (192.254.233.20:21).
- NSE: HEAD Request: HEAD http://www.wikipedia.org HTTP/1.0
- Host: www.wikipedia.org
- NSE: sslcert.getCertificate error: Failed to connect to server
- NSE: Finished ssl-known-key against www.thekickback.com (192.254.233.20:465).
- NSE: Finished http-git against www.thekickback.com (192.254.233.20:443).
- NSE: Finished pop3-capabilities against www.thekickback.com (192.254.233.20:995).
- NSE: Finished smtp-commands against www.thekickback.com (192.254.233.20:465).
- NSE: Finished ssl-date against www.thekickback.com (192.254.233.20:993).
- NSE: CONNECT Request: CONNECT www.wikipedia.org:80 HTTP/1.0
- NSE: Finished ssl-date against www.thekickback.com (192.254.233.20:26).
- NSE: Finished http-favicon against www.thekickback.com (192.254.233.20:80).
- NSE: Test 2 - Wikipedia.org
- Received valid status codes, but pattern does not match
- NSE: GET Request: GET http://www.computerhistory.org HTTP/1.0
- Host: www.computerhistory.org
- NSE: Finished pop3-capabilities against www.thekickback.com (192.254.233.20:110).
- NSE: Finished http-title against www.thekickback.com (192.254.233.20:443).
- NSE: Can't send: ERROR
- NSE: Finished ssl-date against www.thekickback.com (192.254.233.20:465).
- NSE: Finished http-robots.txt against www.thekickback.com (192.254.233.20:80).
- NSE: dns.query() failed to resolve the requested query: id.server
- NSE: CONNECT Request: CONNECT www.computerhistory.org:80 HTTP/1.0
- NSE: Finished http-open-proxy against www.thekickback.com (192.254.233.20:80).
- NSE: Couldn't receive: EOF
- NSE: Finished tls-nextprotoneg against www.thekickback.com (192.254.233.20:443).
- NSE: Finished ssl-known-key against www.thekickback.com (192.254.233.20:993).
- NSE: HEAD Request: HEAD http://www.google.com HTTP/1.0
- Host: www.google.com
- NSE: Finished ssl-cert against www.thekickback.com (192.254.233.20:465).
- NSE: http-methods.nse: HTTP Status for OPTIONS is 200
- NSE: Finished http-methods against www.thekickback.com (192.254.233.20:443).
- NSE: Finished sslv2 against www.thekickback.com (192.254.233.20:995).
- NSE: Finished http-robots.txt against www.thekickback.com (192.254.233.20:8080).
- NSE: sslcert.getCertificate error: Failed to connect to server
- NSE: Finished ssl-known-key against www.thekickback.com (192.254.233.20:443).
- NSE: Finished ssl-known-key against www.thekickback.com (192.254.233.20:587).
- NSE: Finished http-auth against www.thekickback.com (192.254.233.20:443).
- NSE: Finished http-ntlm-info against www.thekickback.com (192.254.233.20:443).
- NSE: Finished http-generator against www.thekickback.com (192.254.233.20:443).
- NSE: CONNECT Request: CONNECT www.google.com:80 HTTP/1.0
- NSE: Finished http-favicon against www.thekickback.com (192.254.233.20:443).
- NSE: Finished ssl-cert against www.thekickback.com (192.254.233.20:443).
- NSE: Test 1 - Google Web Server
- Received valid status codes, but pattern does not match
- NSE: Finished ssl-known-key against www.thekickback.com (192.254.233.20:995).
- NSE: Finished ssl-cert against www.thekickback.com (192.254.233.20:993).
- NSE: GET Request: GET http://www.wikipedia.org HTTP/1.0
- Host: www.wikipedia.org
- NSE: Finished ssl-cert against www.thekickback.com (192.254.233.20:26).
- NSE: dns.query() failed to resolve the requested query: version.bind
- NSE: Finished dns-nsid against www.thekickback.com (192.254.233.20:53).
- NSE: Finished http-cors against www.thekickback.com (192.254.233.20:80).
- NSE: HEAD Request: HEAD http://www.wikipedia.org HTTP/1.0
- Host: www.wikipedia.org
- NSE: Finished sslv2 against www.thekickback.com (192.254.233.20:443).
- NSE: CONNECT Request: CONNECT www.wikipedia.org:80 HTTP/1.0
- NSE: Test 2 - Wikipedia.org
- Received valid status codes, but pattern does not match
- NSE: GET Request: GET http://www.computerhistory.org HTTP/1.0
- Host: www.computerhistory.org
- NSE: Couldn't receive: TIMEOUT
- NSE: Finished tls-nextprotoneg against www.thekickback.com (192.254.233.20:587).
- NSE: CONNECT Request: CONNECT www.computerhistory.org:80 HTTP/1.0
- NSE: Finished http-cors against www.thekickback.com (192.254.233.20:8080).
- NSE: Finished http-open-proxy against www.thekickback.com (192.254.233.20:8080).
- NSE: Finished http-cors against www.thekickback.com (192.254.233.20:443).
- NSE Timing: About 98.65% done; ETC: 02:48 (0:00:00 remaining)
- NSE: rpc-grind: isRPC didn't receive response.
- NSE: Target port 465 is not a RPC port.
- NSE: Finished rpc-grind against www.thekickback.com (192.254.233.20:465).
- Completed NSE at 02:48, 31.29s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Nmap scan report for www.thekickback.com (192.254.233.20)
- Host is up, received reset (0.17s latency).
- Scanned at 2014-09-06 02:46:58 WIB for 116s
- Not shown: 952 closed ports
- Reason: 952 resets
- PORT STATE SERVICE REASON VERSION
- 1/tcp filtered tcpmux no-response
- 3/tcp filtered compressnet no-response
- 4/tcp filtered unknown no-response
- 6/tcp filtered unknown no-response
- 7/tcp filtered echo no-response
- 9/tcp filtered discard no-response
- 13/tcp filtered daytime no-response
- 17/tcp filtered qotd no-response
- 19/tcp filtered chargen no-response
- 21/tcp open ftp syn-ack Pure-FTPd
- 22/tcp filtered ssh no-response
- 23/tcp filtered telnet no-response
- 25/tcp filtered smtp no-response
- 26/tcp open smtp syn-ack Exim smtpd 4.82
- | smtp-commands: gator3225.hostgator.com Hello www.thekickback.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- |_ssl-date: 2014-09-05T19:47:33+00:00; -54s from local time.
- 53/tcp open domain syn-ack
- 80/tcp open http-proxy syn-ack Squid http proxy
- |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
- |_http-methods: GET HEAD POST OPTIONS
- |_http-open-proxy: Proxy might be redirecting requests
- | http-robots.txt: 2 disallowed entries
- |_/files/ /images/
- |_http-title: Site doesn't have a title (text/html).
- 110/tcp open pop3 syn-ack Dovecot pop3d
- |_pop3-capabilities: PIPELINING AUTH-RESP-CODE UIDL TOP RESP-CODES STLS USER SASL(PLAIN LOGIN) CAPA
- 111/tcp filtered rpcbind no-response
- 135/tcp filtered msrpc no-response
- 139/tcp filtered netbios-ssn no-response
- 143/tcp open imap syn-ack Dovecot imapd
- |_imap-capabilities: IDLE SASL-IR Pre-login listed AUTH=LOGINA0001 IMAP4rev1 LITERAL+ more have post-login capabilities ENABLE NAMESPACE AUTH=PLAIN ID OK STARTTLS LOGIN-REFERRALS
- 179/tcp filtered bgp no-response
- 443/tcp open http syn-ack Apache httpd
- |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- | http-robots.txt: 1 disallowed entry
- |_/
- |_http-title: thekickback.com
- 445/tcp filtered microsoft-ds no-response
- 465/tcp open smtps? syn-ack
- | smtp-commands: gator3225.hostgator.com Hello www.thekickback.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
- |_ Commands supported:
- 514/tcp filtered shell no-response
- 587/tcp open smtp syn-ack Exim smtpd 4.82
- | smtp-commands: gator3225.hostgator.com Hello www.thekickback.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=*.hostgator.com/serialNumber=Ua2imiD94EQbAgrLVmkdAdyb1udBOJfs/organizationalUnitName=Domain Control Validated - RapidSSL(R)
- | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-09T02:56:45+00:00
- | Not valid after: 2018-04-10T22:46:45+00:00
- | MD5: 626c e2ae 0031 4763 877a 57bc b21f 5dc3
- | SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
- | -----BEGIN CERTIFICATE-----
- | MIIFMzCCBBugAwIBAgIDEeu0MA0GCSqGSIb3DQEBBQUAMDwxCzAJBgNVBAYTAlVT
- | MRcwFQYDVQQKEw5HZW9UcnVzdCwgSW5jLjEUMBIGA1UEAxMLUmFwaWRTU0wgQ0Ew
- | HhcNMTQwNDA5MDI1NjQ1WhcNMTgwNDEwMjI0NjQ1WjCBvjEpMCcGA1UEBRMgVWEy
- | aW1pRDk0RVFiQWdyTFZta2RBZHliMXVkQk9KZnMxEzARBgNVBAsTCkdUNzExNzA3
- | NDQxMTAvBgNVBAsTKFNlZSB3d3cucmFwaWRzc2wuY29tL3Jlc291cmNlcy9jcHMg
- | KGMpMTQxLzAtBgNVBAsTJkRvbWFpbiBDb250cm9sIFZhbGlkYXRlZCAtIFJhcGlk
- | U1NMKFIpMRgwFgYDVQQDDA8qLmhvc3RnYXRvci5jb20wggEiMA0GCSqGSIb3DQEB
- | AQUAA4IBDwAwggEKAoIBAQDPCBITp5OXDZne7xN+gULA8Py5/M0DP+Xah9cf8lRp
- | 0W6jDHBybwb8SRWi2OOJdBHvF/2DYlJGdT9YtIGc/L2VqUND7lQOXuFL5AXsxLfb
- | YTaSZ6tEuWftx/+96buRj7iC/iM7lOtOF1EmKV8y9ZKg4Worr+SW0AO20+pfFf6p
- | 6g/3Zdgo+uBwYeVHecCYwcHhS8kSz2uhgvVhdiKrY72Hjw6ms2Zbm8/bzicCitmP
- | HARCEcJictLq8N+wnXuLhbxWB9wsWX7bqrFoLiCBexVfvasm8nTzlf9f6QKdtwMe
- | EehSlDOXjSsxOG/eKJeqz1ZT6A2qZfPtniZiFXBQaGMLAgMBAAGjggG5MIIBtTAf
- | BgNVHSMEGDAWgBRraT1qGEJK3Y8CZTn9NSSGeJEWMDAOBgNVHQ8BAf8EBAMCBaAw
- | HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMCkGA1UdEQQiMCCCDyouaG9z
- | dGdhdG9yLmNvbYINaG9zdGdhdG9yLmNvbTBDBgNVHR8EPDA6MDigNqA0hjJodHRw
- | Oi8vcmFwaWRzc2wtY3JsLmdlb3RydXN0LmNvbS9jcmxzL3JhcGlkc3NsLmNybDAd
- | BgNVHQ4EFgQUSNecfnT/4/Fd/A0rZCZWatA0+K4wDAYDVR0TAQH/BAIwADB4Bggr
- | BgEFBQcBAQRsMGowLQYIKwYBBQUHMAGGIWh0dHA6Ly9yYXBpZHNzbC1vY3NwLmdl
- | b3RydXN0LmNvbTA5BggrBgEFBQcwAoYtaHR0cDovL3JhcGlkc3NsLWFpYS5nZW90
- | cnVzdC5jb20vcmFwaWRzc2wuY3J0MEwGA1UdIARFMEMwQQYKYIZIAYb4RQEHNjAz
- | MDEGCCsGAQUFBwIBFiVodHRwOi8vd3d3Lmdlb3RydXN0LmNvbS9yZXNvdXJjZXMv
- | Y3BzMA0GCSqGSIb3DQEBBQUAA4IBAQBoMTZsQUynM42kxtaHLjRR5IVbclOlfcMQ
- | gnFG5oximAbhP54P3Qb5V9aum11G4mwmU3gVFTPSPyO6Jvu37NCxqj16p7IpAHeN
- | FQx1kX0jLfW5lwPo9xEuPKb3dUOZeeDfXToN7OjaZSWIzg3BNur85mzvPgChlTt9
- | 7S6KM7DXgy3YOo8CTwAl7ck7MaCwIIxpJNUnNUpLeha4wiVYIR1N/1p9WztwlYsT
- | +J02fpQ1rxo+8TWbM33LD0gtX6501hoAdnYlM3b9k0gycae/JjjSCV2OpDJLFljT
- | /bstAqDjUAhxCoEvDeiC+cRxM68MYXfcMRDMdEXkzYIzO1AZK6mD
- |_-----END CERTIFICATE-----
- |_ssl-date: 2014-09-05T19:47:32+00:00; -54s from local time.
- 593/tcp filtered http-rpc-epmap no-response
- 993/tcp open ssl/imap syn-ack Dovecot imapd
- |_imap-capabilities: IDLE ENABLE Pre-login listed AUTH=LOGINA0001 IMAP4rev1 LITERAL+ more have capabilities post-login NAMESPACE AUTH=PLAIN ID SASL-IR OK LOGIN-REFERRALS
- | ssl-cert: Subject: commonName=*.hostgator.com/serialNumber=Ua2imiD94EQbAgrLVmkdAdyb1udBOJfs/organizationalUnitName=Domain Control Validated - RapidSSL(R)
- | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-09T02:56:45+00:00
- | Not valid after: 2018-04-10T22:46:45+00:00
- | MD5: 626c e2ae 0031 4763 877a 57bc b21f 5dc3
- | SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
- | -----BEGIN CERTIFICATE-----
- | MIIFMzCCBBugAwIBAgIDEeu0MA0GCSqGSIb3DQEBBQUAMDwxCzAJBgNVBAYTAlVT
- | MRcwFQYDVQQKEw5HZW9UcnVzdCwgSW5jLjEUMBIGA1UEAxMLUmFwaWRTU0wgQ0Ew
- | HhcNMTQwNDA5MDI1NjQ1WhcNMTgwNDEwMjI0NjQ1WjCBvjEpMCcGA1UEBRMgVWEy
- | aW1pRDk0RVFiQWdyTFZta2RBZHliMXVkQk9KZnMxEzARBgNVBAsTCkdUNzExNzA3
- | NDQxMTAvBgNVBAsTKFNlZSB3d3cucmFwaWRzc2wuY29tL3Jlc291cmNlcy9jcHMg
- | KGMpMTQxLzAtBgNVBAsTJkRvbWFpbiBDb250cm9sIFZhbGlkYXRlZCAtIFJhcGlk
- | U1NMKFIpMRgwFgYDVQQDDA8qLmhvc3RnYXRvci5jb20wggEiMA0GCSqGSIb3DQEB
- | AQUAA4IBDwAwggEKAoIBAQDPCBITp5OXDZne7xN+gULA8Py5/M0DP+Xah9cf8lRp
- | 0W6jDHBybwb8SRWi2OOJdBHvF/2DYlJGdT9YtIGc/L2VqUND7lQOXuFL5AXsxLfb
- | YTaSZ6tEuWftx/+96buRj7iC/iM7lOtOF1EmKV8y9ZKg4Worr+SW0AO20+pfFf6p
- | 6g/3Zdgo+uBwYeVHecCYwcHhS8kSz2uhgvVhdiKrY72Hjw6ms2Zbm8/bzicCitmP
- | HARCEcJictLq8N+wnXuLhbxWB9wsWX7bqrFoLiCBexVfvasm8nTzlf9f6QKdtwMe
- | EehSlDOXjSsxOG/eKJeqz1ZT6A2qZfPtniZiFXBQaGMLAgMBAAGjggG5MIIBtTAf
- | BgNVHSMEGDAWgBRraT1qGEJK3Y8CZTn9NSSGeJEWMDAOBgNVHQ8BAf8EBAMCBaAw
- | HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMCkGA1UdEQQiMCCCDyouaG9z
- | dGdhdG9yLmNvbYINaG9zdGdhdG9yLmNvbTBDBgNVHR8EPDA6MDigNqA0hjJodHRw
- | Oi8vcmFwaWRzc2wtY3JsLmdlb3RydXN0LmNvbS9jcmxzL3JhcGlkc3NsLmNybDAd
- | BgNVHQ4EFgQUSNecfnT/4/Fd/A0rZCZWatA0+K4wDAYDVR0TAQH/BAIwADB4Bggr
- | BgEFBQcBAQRsMGowLQYIKwYBBQUHMAGGIWh0dHA6Ly9yYXBpZHNzbC1vY3NwLmdl
- | b3RydXN0LmNvbTA5BggrBgEFBQcwAoYtaHR0cDovL3JhcGlkc3NsLWFpYS5nZW90
- | cnVzdC5jb20vcmFwaWRzc2wuY3J0MEwGA1UdIARFMEMwQQYKYIZIAYb4RQEHNjAz
- | MDEGCCsGAQUFBwIBFiVodHRwOi8vd3d3Lmdlb3RydXN0LmNvbS9yZXNvdXJjZXMv
- | Y3BzMA0GCSqGSIb3DQEBBQUAA4IBAQBoMTZsQUynM42kxtaHLjRR5IVbclOlfcMQ
- | gnFG5oximAbhP54P3Qb5V9aum11G4mwmU3gVFTPSPyO6Jvu37NCxqj16p7IpAHeN
- | FQx1kX0jLfW5lwPo9xEuPKb3dUOZeeDfXToN7OjaZSWIzg3BNur85mzvPgChlTt9
- | 7S6KM7DXgy3YOo8CTwAl7ck7MaCwIIxpJNUnNUpLeha4wiVYIR1N/1p9WztwlYsT
- | +J02fpQ1rxo+8TWbM33LD0gtX6501hoAdnYlM3b9k0gycae/JjjSCV2OpDJLFljT
- | /bstAqDjUAhxCoEvDeiC+cRxM68MYXfcMRDMdEXkzYIzO1AZK6mD
- |_-----END CERTIFICATE-----
- |_ssl-date: 2014-09-05T19:47:33+00:00; -54s from local time.
- 995/tcp open ssl/pop3 syn-ack Dovecot pop3d
- |_pop3-capabilities: PIPELINING SASL(PLAIN LOGIN) RESP-CODES AUTH-RESP-CODE USER UIDL CAPA TOP
- | ssl-cert: Subject: commonName=*.hostgator.com/serialNumber=Ua2imiD94EQbAgrLVmkdAdyb1udBOJfs/organizationalUnitName=Domain Control Validated - RapidSSL(R)
- | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-09T02:56:45+00:00
- | Not valid after: 2018-04-10T22:46:45+00:00
- | MD5: 626c e2ae 0031 4763 877a 57bc b21f 5dc3
- | SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
- | -----BEGIN CERTIFICATE-----
- | MIIFMzCCBBugAwIBAgIDEeu0MA0GCSqGSIb3DQEBBQUAMDwxCzAJBgNVBAYTAlVT
- | MRcwFQYDVQQKEw5HZW9UcnVzdCwgSW5jLjEUMBIGA1UEAxMLUmFwaWRTU0wgQ0Ew
- | HhcNMTQwNDA5MDI1NjQ1WhcNMTgwNDEwMjI0NjQ1WjCBvjEpMCcGA1UEBRMgVWEy
- | aW1pRDk0RVFiQWdyTFZta2RBZHliMXVkQk9KZnMxEzARBgNVBAsTCkdUNzExNzA3
- | NDQxMTAvBgNVBAsTKFNlZSB3d3cucmFwaWRzc2wuY29tL3Jlc291cmNlcy9jcHMg
- | KGMpMTQxLzAtBgNVBAsTJkRvbWFpbiBDb250cm9sIFZhbGlkYXRlZCAtIFJhcGlk
- | U1NMKFIpMRgwFgYDVQQDDA8qLmhvc3RnYXRvci5jb20wggEiMA0GCSqGSIb3DQEB
- | AQUAA4IBDwAwggEKAoIBAQDPCBITp5OXDZne7xN+gULA8Py5/M0DP+Xah9cf8lRp
- | 0W6jDHBybwb8SRWi2OOJdBHvF/2DYlJGdT9YtIGc/L2VqUND7lQOXuFL5AXsxLfb
- | YTaSZ6tEuWftx/+96buRj7iC/iM7lOtOF1EmKV8y9ZKg4Worr+SW0AO20+pfFf6p
- | 6g/3Zdgo+uBwYeVHecCYwcHhS8kSz2uhgvVhdiKrY72Hjw6ms2Zbm8/bzicCitmP
- | HARCEcJictLq8N+wnXuLhbxWB9wsWX7bqrFoLiCBexVfvasm8nTzlf9f6QKdtwMe
- | EehSlDOXjSsxOG/eKJeqz1ZT6A2qZfPtniZiFXBQaGMLAgMBAAGjggG5MIIBtTAf
- | BgNVHSMEGDAWgBRraT1qGEJK3Y8CZTn9NSSGeJEWMDAOBgNVHQ8BAf8EBAMCBaAw
- | HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMCkGA1UdEQQiMCCCDyouaG9z
- | dGdhdG9yLmNvbYINaG9zdGdhdG9yLmNvbTBDBgNVHR8EPDA6MDigNqA0hjJodHRw
- | Oi8vcmFwaWRzc2wtY3JsLmdlb3RydXN0LmNvbS9jcmxzL3JhcGlkc3NsLmNybDAd
- | BgNVHQ4EFgQUSNecfnT/4/Fd/A0rZCZWatA0+K4wDAYDVR0TAQH/BAIwADB4Bggr
- | BgEFBQcBAQRsMGowLQYIKwYBBQUHMAGGIWh0dHA6Ly9yYXBpZHNzbC1vY3NwLmdl
- | b3RydXN0LmNvbTA5BggrBgEFBQcwAoYtaHR0cDovL3JhcGlkc3NsLWFpYS5nZW90
- | cnVzdC5jb20vcmFwaWRzc2wuY3J0MEwGA1UdIARFMEMwQQYKYIZIAYb4RQEHNjAz
- | MDEGCCsGAQUFBwIBFiVodHRwOi8vd3d3Lmdlb3RydXN0LmNvbS9yZXNvdXJjZXMv
- | Y3BzMA0GCSqGSIb3DQEBBQUAA4IBAQBoMTZsQUynM42kxtaHLjRR5IVbclOlfcMQ
- | gnFG5oximAbhP54P3Qb5V9aum11G4mwmU3gVFTPSPyO6Jvu37NCxqj16p7IpAHeN
- | FQx1kX0jLfW5lwPo9xEuPKb3dUOZeeDfXToN7OjaZSWIzg3BNur85mzvPgChlTt9
- | 7S6KM7DXgy3YOo8CTwAl7ck7MaCwIIxpJNUnNUpLeha4wiVYIR1N/1p9WztwlYsT
- | +J02fpQ1rxo+8TWbM33LD0gtX6501hoAdnYlM3b9k0gycae/JjjSCV2OpDJLFljT
- | /bstAqDjUAhxCoEvDeiC+cRxM68MYXfcMRDMdEXkzYIzO1AZK6mD
- |_-----END CERTIFICATE-----
- |_ssl-date: 2014-09-05T19:47:32+00:00; -54s from local time.
- 1024/tcp filtered kdm no-response
- 1025/tcp filtered NFS-or-IIS no-response
- 1026/tcp filtered LSA-or-nterm no-response
- 1027/tcp filtered IIS no-response
- 1028/tcp filtered unknown no-response
- 1029/tcp filtered ms-lsa no-response
- 1030/tcp filtered iad1 no-response
- 1080/tcp filtered socks no-response
- 1433/tcp filtered ms-sql-s no-response
- 1434/tcp filtered ms-sql-m no-response
- 2049/tcp filtered nfs no-response
- 2222/tcp open ssh syn-ack OpenSSH 5.3 (protocol 2.0)
- |_ssh-hostkey:
- 3306/tcp open mysql syn-ack MySQL 5.5.37-35.1
- | mysql-info:
- | Protocol: 53
- | Version: .5.37-35.1
- | Thread ID: 76616283
- | Capabilities flags: 65535
- | Some Capabilities: Support41Auth, Speaks41ProtocolOld, ConnectWithDatabase, FoundRows, IgnoreSpaceBeforeParenthesis, SupportsTransactions, IgnoreSigpipes, LongPassword, SupportsLoadDataLocal, LongColumnFlag, InteractiveClient, Speaks41ProtocolNew, SwitchToSSLAfterHandshake, SupportsCompression, ODBCClient, DontAllowDatabaseTableColumn
- | Status: Autocommit
- |_ Salt: `Z%Fnz<X*d<=[56OkO'q
- 4444/tcp filtered krb524 no-response
- 5050/tcp filtered mmcc no-response
- 8080/tcp open http syn-ack nginx 1.6.1
- |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
- |_http-methods: GET HEAD POST OPTIONS
- | http-robots.txt: 2 disallowed entries
- |_/files/ /images/
- |_http-title: Site doesn't have a title (text/html).
- 9898/tcp filtered monkeycom no-response
- 12345/tcp filtered netbus no-response
- Device type: WAP|storage-misc
- Running: Linux 2.4.X, Netgear RAIDiator 4.X
- OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:netgear:raidiator:4
- OS details: DD-WRT v23 (Linux 2.4.36), Netgear ReadyNAS Duo NAS device (RAIDiator 4.1.4)
- TCP/IP fingerprint:
- OS:SCAN(V=6.47%E=4%D=9/6%OT=21%CT=20%CU=31104%PV=N%DS=4%DC=T%G=N%TM=540A13A
- OS:6%P=i686-pc-linux-gnu)SEQ(SP=104%GCD=1%ISR=10D%TI=Z%II=I%TS=7)SEQ(II=I%T
- OS:S=7)OPS(O1=M5A0ST11NW7%O2=M5A0ST11NW7%O3=M5A0NNT11NW7%O4=M5A0ST11NW7%O5=
- OS:M5A0ST11NW7%O6=M5A0ST11)WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7
- OS:120)ECN(R=Y%DF=Y%T=40%W=7210%O=M5A0NNSNW7%CC=Y%Q=)ECN(R=N)T1(R=Y%DF=Y%T=
- OS:40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=N)T5(R=Y%DF=Y%T=40%W=0%S=Z%A
- OS:=S+%F=AR%O=%RD=0%Q=)T6(R=N)T7(R=N)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%R
- OS:ID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)
- Uptime guess: 67.280 days (since Mon Jun 30 20:06:23 2014)
- Network Distance: 4 hops
- Service Info: Host: gator3225.hostgator.com
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 0.67 ms 192.168.200.1
- 2 44.01 ms 192.168.30.1
- 3 44.24 ms 172.16.1.1
- 4 44.60 ms 192.254.233.20
- Final times for host: srtt: 165300 rttvar: 109984 to: 605236
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- NSE: Starting runlevel 2 (of 2) scan.
- Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes nmap-services.
- OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 117.75 seconds
- Raw packets sent: 1251 (57.112KB
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement