Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Fetchfile found /opt/local/bin/../share/nmap/nmap-os-db
- Starting Nmap 6.25 ( http://nmap.org ) at 2013-04-08 15:02 CEST
- Fetchfile found /opt/local/bin/../share/nmap/nmap-services
- PORTS: Using top 1000 ports found open (TCP:1000, UDP:0, SCTP:0)
- Fetchfile found /opt/local/bin/../share/nmap/nmap.xsl
- The max # of sockets we are using is: 0
- --------------- Timing report ---------------
- hostgroups: min 1, max 100000
- rtt-timeouts: init 500, min 100, max 1250
- max-scan-delay: TCP 10, UDP 1000, SCTP 10
- parallelism: min 0, max 0
- max-retries: 6, host-timeout: 0
- min-rate: 0, max-rate: 0
- ---------------------------------------------
- NSE: Using Lua 5.2.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- NSE: Starting runlevel 2 (of 2) scan.
- Fetchfile found /opt/local/bin/../share/nmap/nmap-payloads
- Initiating Ping Scan at 15:02
- Scanning mining.bitcoin.cz (198.100.150.34) [4 ports]
- Packet capture filter (device en1): dst host 192.168.178.12 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 198.100.150.34)))
- We got a ping packet back from 198.100.150.34: id = 48250 seq = 0 checksum = 17285
- ultrascan_host_probe_update called for machine 198.100.150.34 state UNKNOWN -> HOST_UP (trynum 0 time: 102101)
- Changing ping technique for 198.100.150.34 to icmp type 8 code 0
- Changing global ping host to 198.100.150.34.
- Completed Ping Scan at 15:02, 0.10s elapsed (1 total hosts)
- Overall sending rates: 39.02 packets / s, 1482.58 bytes / s.
- mass_rdns: Using DNS server 212.54.35.25
- mass_rdns: Using DNS server 212.54.40.25
- Initiating Parallel DNS resolution of 1 host. at 15:02
- mass_rdns: 0.12s 0/1 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1]
- Completed Parallel DNS resolution of 1 host. at 15:02, 0.12s elapsed
- DNS resolution of 1 IPs took 0.12s. Mode: Async [#: 2, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
- Initiating SYN Stealth Scan at 15:02
- 198.100.150.34 pingprobe type ICMP is inappropriate for this scan type; resetting.
- Scanning mining.bitcoin.cz (198.100.150.34) [1000 ports] <== HWG..
- Packet capture filter (device en1): dst host 192.168.178.12 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 198.100.150.34)))
- Discovered filtered port 5900/tcp on 198.100.150.34
- Discovered filtered port 110/tcp on 198.100.150.34
- Discovered filtered port 23/tcp on 198.100.150.34
- Discovered filtered port 3306/tcp on 198.100.150.34
- Discovered filtered port 22/tcp on 198.100.150.34
- Discovered open port 80/tcp on 198.100.150.34
- Changing ping technique for 198.100.150.34 to tcp to port 80; flags: S
- Discovered open port 443/tcp on 198.100.150.34
- Discovered filtered port 143/tcp on 198.100.150.34
- Response for 198.100.150.34 means new state is filtered; not adjusting timing.
- Discovered filtered port 8088/tcp on 198.100.150.34
- Response for 198.100.150.34 means new state is filtered; not adjusting timing.
- Discovered closed port 8402/tcp on 198.100.150.34
- Changing ping technique for 198.100.150.34 to tcp to port 8402; flags: S
- Discovered filtered port 49400/tcp on 198.100.150.34
- Response for 198.100.150.34 means new state is filtered; not adjusting timing.
- Discovered closed port 3333/tcp on 198.100.150.34
- Discovered filtered port 524/tcp on 198.100.150.34
- Response for 198.100.150.34 means new state is filtered; not adjusting timing.
- Discovered filtered port 8008/tcp on 198.100.150.34
- Response for 198.100.150.34 means new state is filtered; not adjusting timing.
- Changing global ping host to 198.100.150.34.
- Completed SYN Stealth Scan at 15:02, 5.89s elapsed (1000 total ports)
- Overall sending rates: 337.76 packets / s, 14861.65 bytes / s.
- Fetchfile found /opt/local/bin/../share/nmap/nmap-service-probes
- Initiating Service scan at 15:02
- Scanning 2 services on mining.bitcoin.cz (198.100.150.34)
- Starting probes against new service: 198.100.150.34:80 (tcp)
- Starting probes against new service: 198.100.150.34:443 (tcp)
- Service scan sending probe NULL to 198.100.150.34:80 (tcp)
- Service scan sending probe NULL to 198.100.150.34:443 (tcp)
- Service scan sending probe GetRequest to 198.100.150.34:80 (tcp)
- Service scan sending probe HTTPOptions to 198.100.150.34:443 (tcp)
- Service scan match (Probe GetRequest matched with GetRequest line 5408): 198.100.150.34:80 is http. Version: |nginx|1.2.1||
- Service scan match (Probe HTTPOptions matched with GetRequest line 5408): 198.100.150.34:443 is http. Version: |nginx|1.2.1||
- Completed Service scan at 15:02, 6.23s elapsed (2 services on 1 host)
- Packet capture filter (device en1): dst host 192.168.178.12 and (icmp or (tcp and (src host 198.100.150.34)))
- Initiating OS detection (try #1) against mining.bitcoin.cz (198.100.150.34)
- Sleep 16110us for next sequence probe
- Send probe (type: OFP_TSEQ, subid: 0) to 198.100.150.34
- Send probe (type: OFP_TSEQ, subid: 1) to 198.100.150.34
- Send probe (type: OFP_TSEQ, subid: 2) to 198.100.150.34
- Send probe (type: OFP_TSEQ, subid: 3) to 198.100.150.34
- Send probe (type: OFP_TSEQ, subid: 4) to 198.100.150.34
- Send probe (type: OFP_TSEQ, subid: 5) to 198.100.150.34
- Send probe (type: OFP_TICMP, subid: 0) to 198.100.150.34
- Send probe (type: OFP_TICMP, subid: 1) to 198.100.150.34
- Send probe (type: OFP_TUDP, subid: 0) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
- Got a valid response for probe (type: OFP_TICMP subid: 0) from 198.100.150.34
- Time to sleep 14402. Sleeping.
- Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
- Got a valid response for probe (type: OFP_TICMP subid: 1) from 198.100.150.34
- Time to sleep 14777. Sleeping.
- Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
- Got a valid response for probe (type: OFP_TUDP subid: 0) from 198.100.150.34
- Time to sleep 4548. Sleeping.
- Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
- Send probe (type: OFP_TECN, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
- Got a valid response for probe (type: OFP_TECN subid: 0) from 198.100.150.34
- Time to sleep 14745. Sleeping.
- Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 4) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
- Got a valid response for probe (type: OFP_T1_7 subid: 4) from 198.100.150.34
- Time to sleep 4541. Sleeping.
- Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
- OS detection timingRatio() == (1365426143.577 - 1365426143.070) * 1000 / 500 == 1.014
- Retrying OS detection (try #2) against mining.bitcoin.cz (198.100.150.34)
- Send probe (type: OFP_TSEQ, subid: 0) to 198.100.150.34
- Send probe (type: OFP_TSEQ, subid: 1) to 198.100.150.34
- Send probe (type: OFP_TSEQ, subid: 2) to 198.100.150.34
- Send probe (type: OFP_TSEQ, subid: 3) to 198.100.150.34
- Send probe (type: OFP_TSEQ, subid: 4) to 198.100.150.34
- Send probe (type: OFP_TSEQ, subid: 5) to 198.100.150.34
- Send probe (type: OFP_TICMP, subid: 0) to 198.100.150.34
- Probe doesn't exist! Probe type: 3. Probe subid: 0
- Send probe (type: OFP_TICMP, subid: 1) to 198.100.150.34
- Send probe (type: OFP_TUDP, subid: 0) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
- Got a valid response for probe (type: OFP_TICMP subid: 0) from 198.100.150.34
- Time to sleep 14716. Sleeping.
- Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
- Got a valid response for probe (type: OFP_TICMP subid: 1) from 198.100.150.34
- Time to sleep 4457. Sleeping.
- Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
- Got a valid response for probe (type: OFP_TUDP subid: 0) from 198.100.150.34
- Time to sleep 4593. Sleeping.
- Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
- Send probe (type: OFP_TECN, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 4) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
- Got a valid response for probe (type: OFP_T1_7 subid: 4) from 198.100.150.34
- Time to sleep 14672. Sleeping.
- Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
- Send probe (type: OFP_TECN, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
- Send probe (type: OFP_TECN, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
- Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
- Send probe (type: OFP_TECN, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
- Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
- OS detection timingRatio() == (1365426146.926 - 1365426146.417) * 1000 / 500 == 1.016
- No OS matches for 198.100.150.34 by new os scan system.
- TCP/IP fingerprint:
- SCAN(V=6.25%E=4%D=4/8%OT=80%CT=3333%CU=34109%PV=N%DS=10%DC=I%G=Y%TM=5162BFE4%P=x86_64-apple-darwin10.8.0)
- SEQ(II=I)
- ECN(R=Y%DF=Y%T=40%W=3908%O=M5B4NNSNW9%CC=Y%Q=)
- T1(R=N)
- T2(R=N)
- T3(R=N)
- T4(R=N)
- T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
- T6(R=N)
- T7(R=N)
- U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=955E%RUD=G)
- IE(R=Y%DFI=N%T=40%CD=S)
- Packet capture filter (device en1): (ip or ip6) and dst host 192.168.178.12
- Initiating Traceroute at 15:02
- Set hop 198.100.150.34 TTL 4 to 213.51.158.16 RTT 31.41 ms
- Set hop 198.100.150.34 TTL 3 to 213.51.157.10 RTT 31.82 ms
- Set hop 198.100.150.34 TTL 2 to 213.51.138.129 RTT 33.44 ms
- Set hop 198.100.150.34 TTL 5 to 195.69.145.231 RTT 34.33 ms
- Set hop 198.100.150.34 TTL 1 to 10.212.208.1 RTT 36.33 ms
- Set hop 198.100.150.34 TTL 6 to 213.251.128.5 RTT 91.21 ms
- Set hop 198.100.150.34 TTL 10 to 198.100.150.34 RTT 104.38 ms
- Set hop 198.100.150.34 TTL 8 to 198.27.73.205 RTT 128.47 ms
- Traceroute probe to 198.100.150.34 TTL 9 timed out
- Traceroute probe to 198.100.150.34 TTL 7 timed out
- Traceroute probe to 198.100.150.34 TTL 7 timed out
- Traceroute probe to 198.100.150.34 TTL 9 timed out
- Traceroute probe to 198.100.150.34 TTL 9 timed out
- Traceroute probe to 198.100.150.34 TTL 7 timed out
- Completed Traceroute at 15:02, 3.02s elapsed
- Initiating Parallel DNS resolution of 8 hosts. at 15:02
- mass_rdns: 0.02s 0/8 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 8]
- Completed Parallel DNS resolution of 8 hosts. at 15:02, 0.14s elapsed
- DNS resolution of 8 IPs took 0.14s. Mode: Async [#: 2, OK: 5, NX: 3, DR: 0, SF: 0, TR: 8, CN: 0]
- NSE: Script scanning 198.100.150.34.
- NSE: Starting runlevel 1 (of 2) scan.
- NSE: Starting 'address-info' (thread: 0x1030f5b60) against 198.100.150.34.
- NSE: Starting 'http-auth' (thread: 0x1031aeab0) against 198.100.150.34:80.
- NSE: Starting 'http-cors' (thread: 0x1031b2360) against 198.100.150.34:80.
- NSE: Starting 'http-favicon' (thread: 0x1031b5cd0) against 198.100.150.34:80.
- NSE: Starting 'http-generator' (thread: 0x1031b94a0) against 198.100.150.34:80.
- NSE: Starting 'http-git' (thread: 0x1031bcd10) against 198.100.150.34:80.
- NSE: Starting 'http-methods' (thread: 0x1031c03b0) against 198.100.150.34:80.
- NSE: Starting 'http-robots.txt' (thread: 0x1031c5c20) against 198.100.150.34:80.
- NSE: Starting 'http-title' (thread: 0x1031c9380) against 198.100.150.34:80.
- NSE: Starting 'http-auth' (thread: 0x10328c6f0) against 198.100.150.34:443.
- NSE: Starting 'http-cors' (thread: 0x10328ff10) against 198.100.150.34:443.
- NSE: Starting 'http-favicon' (thread: 0x103293770) against 198.100.150.34:443.
- NSE: Starting 'http-generator' (thread: 0x103296f40) against 198.100.150.34:443.
- NSE: Starting 'http-git' (thread: 0x10329a5c0) against 198.100.150.34:443.
- NSE: Starting 'http-methods' (thread: 0x10329dc60) against 198.100.150.34:443.
- NSE: Starting 'http-robots.txt' (thread: 0x1032a34d0) against 198.100.150.34:443.
- NSE: Starting 'http-title' (thread: 0x1032a6c20) against 198.100.150.34:443.
- NSE: Starting 'ssl-cert' (thread: 0x10330b970) against 198.100.150.34:443.
- NSE: Starting 'ssl-date' (thread: 0x10330f430) against 198.100.150.34:443.
- NSE: Starting 'ssl-known-key' (thread: 0x103312d90) against 198.100.150.34:443.
- NSE: Starting 'sslv2' (thread: 0x103316600) against 198.100.150.34:443.
- NSE: Starting 'tls-nextprotoneg' (thread: 0x10331bc80) against 198.100.150.34:443.
- Initiating NSE at 15:02
- Fetchfile found /opt/local/bin/../share/nmap/nselib/data/favicon-db
- NSE: Finished 'address-info' (thread: 0x1030f5b60) against 198.100.150.34.
- Fetchfile found /opt/local/bin/../share/nmap/nselib/data/favicon-db
- Fetchfile found /opt/local/bin/../share/nmap/nselib/data/ssl-fingerprints
- NSE: Loading SSL fingerprints from /opt/local/bin/../share/nmap/nselib/data/ssl-fingerprints.
- NSE: Final http cache size (270 bytes) of max size of 1000000
- NSE: Finished 'sslv2' (thread: 0x103316600) against 198.100.150.34:443.
- NSE: http-methods.nse: HTTP Status for OPTIONS is 400
- NSE: Finished 'http-methods' (thread: 0x10329dc60) against 198.100.150.34:443.
- NSE: tls-nextprotoneg: Server doesn't support TLS NPN extension.
- NSE: Finished 'tls-nextprotoneg' (thread: 0x10331bc80) against 198.100.150.34:443.
- NSE: Final http cache size (540 bytes) of max size of 1000000
- NSE: Finished 'http-robots.txt' (thread: 0x1032a34d0) against 198.100.150.34:443.
- NSE: HERE: 1365426152
- NSE: Finished 'ssl-date' (thread: 0x10330f430) against 198.100.150.34:443.
- NSE: Final http cache size (810 bytes) of max size of 1000000
- NSE: Finished 'http-git' (thread: 0x10329a5c0) against 198.100.150.34:443.
- NSE: Finished 'http-title' (thread: 0x1032a6c20) against 198.100.150.34:443.
- NSE: 0770 e334 fedd e2ea 677a 180b e85c f397 b8d2 c572 was not in the database.
- NSE: Finished 'ssl-known-key' (thread: 0x103312d90) against 198.100.150.34:443.
- NSE: Finished 'http-generator' (thread: 0x103296f40) against 198.100.150.34:443.
- NSE: sslcert: Returning cached SSL certificate
- NSE: Finished 'ssl-cert' (thread: 0x10330b970) against 198.100.150.34:443.
- NSE: Final http cache size (1080 bytes) of max size of 1000000
- NSE: No favicon found.
- NSE: Finished 'http-favicon' (thread: 0x103293770) against 198.100.150.34:443.
- NSE: Final http cache size (1093 bytes) of max size of 1000000
- NSE: Finished 'http-robots.txt' (thread: 0x1031c5c20) against 198.100.150.34:80.
- NSE: Final http cache size (1106 bytes) of max size of 1000000
- NSE: Finished 'http-git' (thread: 0x1031bcd10) against 198.100.150.34:80.
- NSE: Final http cache size (20205 bytes) of max size of 1000000
- NSE: Finished 'http-auth' (thread: 0x1031aeab0) against 198.100.150.34:80.
- NSE: http-methods.nse: HTTP Status for OPTIONS is 200
- NSE: Finished 'http-methods' (thread: 0x1031c03b0) against 198.100.150.34:80.
- NSE: Final http cache size (20475 bytes) of max size of 1000000
- NSE: Finished 'http-auth' (thread: 0x10328c6f0) against 198.100.150.34:443.
- NSE: Finished 'http-generator' (thread: 0x1031b94a0) against 198.100.150.34:80.
- NSE: Got icon URL /media/img/favicon5.ico.
- NSE: Finished 'http-title' (thread: 0x1031c9380) against 198.100.150.34:80.
- NSE: Final http cache size (21625 bytes) of max size of 1000000
- NSE: Finished 'http-favicon' (thread: 0x1031b5cd0) against 198.100.150.34:80.
- NSE: Finished 'http-cors' (thread: 0x10328ff10) against 198.100.150.34:443.
- NSE: Finished 'http-cors'%), Check Point embedded (89%), D-Link embedded (89%), IGEL Linux 2.6.X (89%), IPCop Linux 2.6.X (89%), IPFire Linux 2.6.X (89%), Iomega Linux 2.6.X (89%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6 cpe:/h:dlink:dcs-2103 cpe:/o:igel:linux:2.6 cpe:/o:ipcop:linux:2.6 cpe:/o:ipfire:linux:2.6 cpe:/o:linux:linux_kernel:2.4 cpe:/o:iomega:linux:2.6
- OS fingerprint not ideal because: Host distance (10 network hops) is greater than five
- Aggressive OS guesses: Linux 3.2 (90%), Linux 2.6.32 - 2.6.33 (89%), Linux 2.6.39 (89%), Linux 2.6.32 - 2.6.38 (89%), Linux 2.6.32 (89%), Check Point UTM-1 Edge X firewall (89%), D-Link DCS-2103 webcam (89%), IGEL UD3 thin client (Linux 2.6) (89%), IPCop 1.9.19 or IPFire firewall 2.9 (Linux 2.6.32) (89%), DD-WRT v23 (Linux 2.4.34) (89%)
- No exact OS matches for host (test conditions non-ideal).
- TCP/IP fingerprint:
- SCAN(V=6.25%E=4%D=4/8%OT=80%CT=3333%CU=34109%PV=N%DS=10%DC=T%G=N%TM=5162BFEC%P=x86_64-apple-darwin10.8.0)
- SEQ(II=I)
- ECN(R=Y%DF=Y%T=40%W=3908%O=M5B4NNSNW9%CC=Y%Q=)
- T1(R=N)
- T2(R=N)
- T3(R=N)
- T4(R=N)
- T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
- T6(R=N)
- T7(R=N)
- U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=955E%RUD=G)
- IE(R=Y%DFI=N%T=40%CD=S)
- Network Distance: 10 hops
- TRACEROUTE (using port 8402/tcp)
- HOP RTT ADDRESS
- 1 36.33 ms 10.212.208.1
- 2 33.44 ms sk-rc0001-ds102-vl202.core.as9143.net (213.51.138.129)
- 3 31.82 ms gn-rc0002-cr102-ae12-0.core.as9143.net (213.51.157.10)
- 4 31.41 ms asd-tr0409-cr101-ae2-0.core.as9143.net (213.51.158.16)
- 5 34.33 ms amsix.routers.ovh.net (195.69.145.231)
- 6 91.21 ms ldn-1-6.uk.eu (213.251.128.5)
- 7 ...
- 8 128.47 ms 198.27.73.205
- 9 ...
- 10 104.38 ms 198.100.150.34
- Final times for host: srtt: 99583 rttvar: 2970 to: 111463
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- NSE: Starting runlevel 2 (of 2) scan.
- Read from /opt/local/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes nmap-services.
- OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 26.56 seconds
- Raw packets sent: 2136 (96.724KB) | Rcvd: 63 (15.223KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement