Advertisement
kn0tsel

NMap-01

Apr 8th, 2013
920
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Logtalk 76.07 KB | None | 0 0
  1. Fetchfile found /opt/local/bin/../share/nmap/nmap-os-db
  2.  
  3. Starting Nmap 6.25 ( http://nmap.org ) at 2013-04-08 15:02 CEST
  4. Fetchfile found /opt/local/bin/../share/nmap/nmap-services
  5. PORTS: Using top 1000 ports found open (TCP:1000, UDP:0, SCTP:0)
  6. Fetchfile found /opt/local/bin/../share/nmap/nmap.xsl
  7. The max # of sockets we are using is: 0
  8. --------------- Timing report ---------------
  9.   hostgroups: min 1, max 100000
  10.   rtt-timeouts: init 500, min 100, max 1250
  11.   max-scan-delay: TCP 10, UDP 1000, SCTP 10
  12.   parallelism: min 0, max 0
  13.   max-retries: 6, host-timeout: 0
  14.   min-rate: 0, max-rate: 0
  15. ---------------------------------------------
  16. NSE: Using Lua 5.2.
  17. NSE: Script Pre-scanning.
  18. NSE: Starting runlevel 1 (of 2) scan.
  19. NSE: Starting runlevel 2 (of 2) scan.
  20. Fetchfile found /opt/local/bin/../share/nmap/nmap-payloads
  21. Initiating Ping Scan at 15:02
  22. Scanning mining.bitcoin.cz (198.100.150.34) [4 ports]
  23. Packet capture filter (device en1): dst host 192.168.178.12 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 198.100.150.34)))
  24. We got a ping packet back from 198.100.150.34: id = 48250 seq = 0 checksum = 17285
  25. ultrascan_host_probe_update called for machine 198.100.150.34 state UNKNOWN -> HOST_UP (trynum 0 time: 102101)
  26. Changing ping technique for 198.100.150.34 to icmp type 8 code 0
  27. Changing global ping host to 198.100.150.34.
  28. Completed Ping Scan at 15:02, 0.10s elapsed (1 total hosts)
  29. Overall sending rates: 39.02 packets / s, 1482.58 bytes / s.
  30. mass_rdns: Using DNS server 212.54.35.25
  31. mass_rdns: Using DNS server 212.54.40.25
  32. Initiating Parallel DNS resolution of 1 host. at 15:02
  33. mass_rdns: 0.12s 0/1 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 1]
  34. Completed Parallel DNS resolution of 1 host. at 15:02, 0.12s elapsed
  35. DNS resolution of 1 IPs took 0.12s. Mode: Async [#: 2, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
  36. Initiating SYN Stealth Scan at 15:02
  37. 198.100.150.34 pingprobe type ICMP is inappropriate for this scan type; resetting.
  38. Scanning mining.bitcoin.cz (198.100.150.34) [1000 ports] <== HWG..
  39. Packet capture filter (device en1): dst host 192.168.178.12 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 198.100.150.34)))
  40. Discovered filtered port 5900/tcp on 198.100.150.34
  41. Discovered filtered port 110/tcp on 198.100.150.34
  42. Discovered filtered port 23/tcp on 198.100.150.34
  43. Discovered filtered port 3306/tcp on 198.100.150.34
  44. Discovered filtered port 22/tcp on 198.100.150.34
  45. Discovered open port 80/tcp on 198.100.150.34
  46. Changing ping technique for 198.100.150.34 to tcp to port 80; flags: S
  47. Discovered open port 443/tcp on 198.100.150.34
  48. Discovered filtered port 143/tcp on 198.100.150.34
  49. Response for 198.100.150.34 means new state is filtered; not adjusting timing.
  50. Discovered filtered port 8088/tcp on 198.100.150.34
  51. Response for 198.100.150.34 means new state is filtered; not adjusting timing.
  52. Discovered closed port 8402/tcp on 198.100.150.34
  53. Changing ping technique for 198.100.150.34 to tcp to port 8402; flags: S
  54. Discovered filtered port 49400/tcp on 198.100.150.34
  55. Response for 198.100.150.34 means new state is filtered; not adjusting timing.
  56. Discovered closed port 3333/tcp on 198.100.150.34
  57. Discovered filtered port 524/tcp on 198.100.150.34
  58. Response for 198.100.150.34 means new state is filtered; not adjusting timing.
  59. Discovered filtered port 8008/tcp on 198.100.150.34
  60. Response for 198.100.150.34 means new state is filtered; not adjusting timing.
  61. Changing global ping host to 198.100.150.34.
  62. Completed SYN Stealth Scan at 15:02, 5.89s elapsed (1000 total ports)
  63. Overall sending rates: 337.76 packets / s, 14861.65 bytes / s.
  64. Fetchfile found /opt/local/bin/../share/nmap/nmap-service-probes
  65. Initiating Service scan at 15:02
  66. Scanning 2 services on mining.bitcoin.cz (198.100.150.34)
  67. Starting probes against new service: 198.100.150.34:80 (tcp)
  68. Starting probes against new service: 198.100.150.34:443 (tcp)
  69. Service scan sending probe NULL to 198.100.150.34:80 (tcp)
  70. Service scan sending probe NULL to 198.100.150.34:443 (tcp)
  71. Service scan sending probe GetRequest to 198.100.150.34:80 (tcp)
  72. Service scan sending probe HTTPOptions to 198.100.150.34:443 (tcp)
  73. Service scan match (Probe GetRequest matched with GetRequest line 5408): 198.100.150.34:80 is http.  Version: |nginx|1.2.1||
  74. Service scan match (Probe HTTPOptions matched with GetRequest line 5408): 198.100.150.34:443 is http.  Version: |nginx|1.2.1||
  75. Completed Service scan at 15:02, 6.23s elapsed (2 services on 1 host)
  76. Packet capture filter (device en1): dst host 192.168.178.12 and (icmp or (tcp and (src host 198.100.150.34)))
  77. Initiating OS detection (try #1) against mining.bitcoin.cz (198.100.150.34)
  78. Sleep 16110us for next sequence probe
  79. Send probe (type: OFP_TSEQ, subid: 0) to 198.100.150.34
  80. Send probe (type: OFP_TSEQ, subid: 1) to 198.100.150.34
  81. Send probe (type: OFP_TSEQ, subid: 2) to 198.100.150.34
  82. Send probe (type: OFP_TSEQ, subid: 3) to 198.100.150.34
  83. Send probe (type: OFP_TSEQ, subid: 4) to 198.100.150.34
  84. Send probe (type: OFP_TSEQ, subid: 5) to 198.100.150.34
  85. Send probe (type: OFP_TICMP, subid: 0) to 198.100.150.34
  86. Send probe (type: OFP_TICMP, subid: 1) to 198.100.150.34
  87. Send probe (type: OFP_TUDP, subid: 0) to 198.100.150.34
  88. Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
  89. Got a valid response for probe (type: OFP_TICMP subid: 0) from 198.100.150.34
  90. Time to sleep 14402. Sleeping.
  91. Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
  92. Got a valid response for probe (type: OFP_TICMP subid: 1) from 198.100.150.34
  93. Time to sleep 14777. Sleeping.
  94. Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
  95. Got a valid response for probe (type: OFP_TUDP subid: 0) from 198.100.150.34
  96. Time to sleep 4548. Sleeping.
  97. Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
  98. Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
  99. Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
  100. Send probe (type: OFP_TECN, subid: 0) to 198.100.150.34
  101. Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
  102. Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
  103. Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
  104. Got a valid response for probe (type: OFP_TECN subid: 0) from 198.100.150.34
  105. Time to sleep 14745. Sleeping.
  106. Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
  107. Send probe (type: OFP_T1_7, subid: 4) to 198.100.150.34
  108. Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
  109. Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
  110. Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
  111. Got a valid response for probe (type: OFP_T1_7 subid: 4) from 198.100.150.34
  112. Time to sleep 4541. Sleeping.
  113. Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
  114. Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
  115. Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
  116. Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
  117. Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
  118. Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
  119. Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
  120. Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
  121. Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
  122. Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
  123. Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
  124. Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
  125. Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
  126. Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
  127. Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
  128. Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
  129. Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
  130. Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
  131. Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
  132. Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
  133. Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
  134. Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
  135. Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
  136. Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
  137. Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
  138. Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
  139. Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
  140. Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
  141. Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
  142. Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
  143. Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
  144. Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
  145. Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
  146. Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
  147. Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
  148. OS detection timingRatio() == (1365426143.577 - 1365426143.070) * 1000 / 500 == 1.014
  149. Retrying OS detection (try #2) against mining.bitcoin.cz (198.100.150.34)
  150. Send probe (type: OFP_TSEQ, subid: 0) to 198.100.150.34
  151. Send probe (type: OFP_TSEQ, subid: 1) to 198.100.150.34
  152. Send probe (type: OFP_TSEQ, subid: 2) to 198.100.150.34
  153. Send probe (type: OFP_TSEQ, subid: 3) to 198.100.150.34
  154. Send probe (type: OFP_TSEQ, subid: 4) to 198.100.150.34
  155. Send probe (type: OFP_TSEQ, subid: 5) to 198.100.150.34
  156. Send probe (type: OFP_TICMP, subid: 0) to 198.100.150.34
  157. Probe doesn't exist! Probe type: 3. Probe subid: 0
  158. Send probe (type: OFP_TICMP, subid: 1) to 198.100.150.34
  159. Send probe (type: OFP_TUDP, subid: 0) to 198.100.150.34
  160. Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
  161. Got a valid response for probe (type: OFP_TICMP subid: 0) from 198.100.150.34
  162. Time to sleep 14716. Sleeping.
  163. Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
  164. Got a valid response for probe (type: OFP_TICMP subid: 1) from 198.100.150.34
  165. Time to sleep 4457. Sleeping.
  166. Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
  167. Got a valid response for probe (type: OFP_TUDP subid: 0) from 198.100.150.34
  168. Time to sleep 4593. Sleeping.
  169. Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
  170. Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
  171. Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
  172. Send probe (type: OFP_TECN, subid: 0) to 198.100.150.34
  173. Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
  174. Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
  175. Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
  176. Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
  177. Send probe (type: OFP_T1_7, subid: 4) to 198.100.150.34
  178. Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
  179. Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
  180. Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
  181. Got a valid response for probe (type: OFP_T1_7 subid: 4) from 198.100.150.34
  182. Time to sleep 14672. Sleeping.
  183. Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
  184. Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
  185. Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
  186. Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
  187. Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
  188. Send probe (type: OFP_TECN, subid: 0) to 198.100.150.34
  189. Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
  190. Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
  191. Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
  192. Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
  193. Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
  194. Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
  195. Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
  196. Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
  197. Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
  198. Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
  199. Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
  200. Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
  201. Send probe (type: OFP_TECN, subid: 0) to 198.100.150.34
  202. Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
  203. Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
  204. Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
  205. Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
  206. Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
  207. Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
  208. Send probe (type: OFP_TOPS, subid: 0) to 198.100.150.34
  209. Send probe (type: OFP_TOPS, subid: 1) to 198.100.150.34
  210. Send probe (type: OFP_TOPS, subid: 2) to 198.100.150.34
  211. Send probe (type: OFP_TOPS, subid: 3) to 198.100.150.34
  212. Send probe (type: OFP_TOPS, subid: 4) to 198.100.150.34
  213. Send probe (type: OFP_TOPS, subid: 5) to 198.100.150.34
  214. Send probe (type: OFP_TECN, subid: 0) to 198.100.150.34
  215. Send probe (type: OFP_T1_7, subid: 0) to 198.100.150.34
  216. Send probe (type: OFP_T1_7, subid: 1) to 198.100.150.34
  217. Send probe (type: OFP_T1_7, subid: 2) to 198.100.150.34
  218. Send probe (type: OFP_T1_7, subid: 3) to 198.100.150.34
  219. Send probe (type: OFP_T1_7, subid: 5) to 198.100.150.34
  220. Send probe (type: OFP_T1_7, subid: 6) to 198.100.150.34
  221. OS detection timingRatio() == (1365426146.926 - 1365426146.417) * 1000 / 500 == 1.016
  222. No OS matches for 198.100.150.34 by new os scan system.
  223.  
  224. TCP/IP fingerprint:
  225. SCAN(V=6.25%E=4%D=4/8%OT=80%CT=3333%CU=34109%PV=N%DS=10%DC=I%G=Y%TM=5162BFE4%P=x86_64-apple-darwin10.8.0)
  226. SEQ(II=I)
  227. ECN(R=Y%DF=Y%T=40%W=3908%O=M5B4NNSNW9%CC=Y%Q=)
  228. T1(R=N)
  229. T2(R=N)
  230. T3(R=N)
  231. T4(R=N)
  232. T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
  233. T6(R=N)
  234. T7(R=N)
  235. U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=955E%RUD=G)
  236. IE(R=Y%DFI=N%T=40%CD=S)
  237. Packet capture filter (device en1): (ip or ip6) and dst host 192.168.178.12
  238. Initiating Traceroute at 15:02
  239. Set hop 198.100.150.34 TTL 4 to 213.51.158.16 RTT 31.41 ms
  240. Set hop 198.100.150.34 TTL 3 to 213.51.157.10 RTT 31.82 ms
  241. Set hop 198.100.150.34 TTL 2 to 213.51.138.129 RTT 33.44 ms
  242. Set hop 198.100.150.34 TTL 5 to 195.69.145.231 RTT 34.33 ms
  243. Set hop 198.100.150.34 TTL 1 to 10.212.208.1 RTT 36.33 ms
  244. Set hop 198.100.150.34 TTL 6 to 213.251.128.5 RTT 91.21 ms
  245. Set hop 198.100.150.34 TTL 10 to 198.100.150.34 RTT 104.38 ms
  246. Set hop 198.100.150.34 TTL 8 to 198.27.73.205 RTT 128.47 ms
  247. Traceroute probe to 198.100.150.34 TTL 9 timed out
  248. Traceroute probe to 198.100.150.34 TTL 7 timed out
  249. Traceroute probe to 198.100.150.34 TTL 7 timed out
  250. Traceroute probe to 198.100.150.34 TTL 9 timed out
  251. Traceroute probe to 198.100.150.34 TTL 9 timed out
  252. Traceroute probe to 198.100.150.34 TTL 7 timed out
  253. Completed Traceroute at 15:02, 3.02s elapsed
  254. Initiating Parallel DNS resolution of 8 hosts. at 15:02
  255. mass_rdns: 0.02s 0/8 [#: 2, OK: 0, NX: 0, DR: 0, SF: 0, TR: 8]
  256. Completed Parallel DNS resolution of 8 hosts. at 15:02, 0.14s elapsed
  257. DNS resolution of 8 IPs took 0.14s. Mode: Async [#: 2, OK: 5, NX: 3, DR: 0, SF: 0, TR: 8, CN: 0]
  258. NSE: Script scanning 198.100.150.34.
  259. NSE: Starting runlevel 1 (of 2) scan.
  260. NSE: Starting 'address-info' (thread: 0x1030f5b60) against 198.100.150.34.
  261. NSE: Starting 'http-auth' (thread: 0x1031aeab0) against 198.100.150.34:80.
  262. NSE: Starting 'http-cors' (thread: 0x1031b2360) against 198.100.150.34:80.
  263. NSE: Starting 'http-favicon' (thread: 0x1031b5cd0) against 198.100.150.34:80.
  264. NSE: Starting 'http-generator' (thread: 0x1031b94a0) against 198.100.150.34:80.
  265. NSE: Starting 'http-git' (thread: 0x1031bcd10) against 198.100.150.34:80.
  266. NSE: Starting 'http-methods' (thread: 0x1031c03b0) against 198.100.150.34:80.
  267. NSE: Starting 'http-robots.txt' (thread: 0x1031c5c20) against 198.100.150.34:80.
  268. NSE: Starting 'http-title' (thread: 0x1031c9380) against 198.100.150.34:80.
  269. NSE: Starting 'http-auth' (thread: 0x10328c6f0) against 198.100.150.34:443.
  270. NSE: Starting 'http-cors' (thread: 0x10328ff10) against 198.100.150.34:443.
  271. NSE: Starting 'http-favicon' (thread: 0x103293770) against 198.100.150.34:443.
  272. NSE: Starting 'http-generator' (thread: 0x103296f40) against 198.100.150.34:443.
  273. NSE: Starting 'http-git' (thread: 0x10329a5c0) against 198.100.150.34:443.
  274. NSE: Starting 'http-methods' (thread: 0x10329dc60) against 198.100.150.34:443.
  275. NSE: Starting 'http-robots.txt' (thread: 0x1032a34d0) against 198.100.150.34:443.
  276. NSE: Starting 'http-title' (thread: 0x1032a6c20) against 198.100.150.34:443.
  277. NSE: Starting 'ssl-cert' (thread: 0x10330b970) against 198.100.150.34:443.
  278. NSE: Starting 'ssl-date' (thread: 0x10330f430) against 198.100.150.34:443.
  279. NSE: Starting 'ssl-known-key' (thread: 0x103312d90) against 198.100.150.34:443.
  280. NSE: Starting 'sslv2' (thread: 0x103316600) against 198.100.150.34:443.
  281. NSE: Starting 'tls-nextprotoneg' (thread: 0x10331bc80) against 198.100.150.34:443.
  282. Initiating NSE at 15:02
  283. Fetchfile found /opt/local/bin/../share/nmap/nselib/data/favicon-db
  284. NSE: Finished 'address-info' (thread: 0x1030f5b60) against 198.100.150.34.
  285. Fetchfile found /opt/local/bin/../share/nmap/nselib/data/favicon-db
  286. Fetchfile found /opt/local/bin/../share/nmap/nselib/data/ssl-fingerprints
  287. NSE: Loading SSL fingerprints from /opt/local/bin/../share/nmap/nselib/data/ssl-fingerprints.
  288. NSE: Final http cache size (270 bytes) of max size of 1000000
  289. NSE: Finished 'sslv2' (thread: 0x103316600) against 198.100.150.34:443.
  290. NSE: http-methods.nse: HTTP Status for OPTIONS is 400
  291. NSE: Finished 'http-methods' (thread: 0x10329dc60) against 198.100.150.34:443.
  292. NSE: tls-nextprotoneg: Server doesn't support TLS NPN extension.
  293. NSE: Finished 'tls-nextprotoneg' (thread: 0x10331bc80) against 198.100.150.34:443.
  294. NSE: Final http cache size (540 bytes) of max size of 1000000
  295. NSE: Finished 'http-robots.txt' (thread: 0x1032a34d0) against 198.100.150.34:443.
  296. NSE: HERE: 1365426152
  297. NSE: Finished 'ssl-date' (thread: 0x10330f430) against 198.100.150.34:443.
  298. NSE: Final http cache size (810 bytes) of max size of 1000000
  299. NSE: Finished 'http-git' (thread: 0x10329a5c0) against 198.100.150.34:443.
  300. NSE: Finished 'http-title' (thread: 0x1032a6c20) against 198.100.150.34:443.
  301. NSE: 0770 e334 fedd e2ea 677a 180b e85c f397 b8d2 c572 was not in the database.
  302. NSE: Finished 'ssl-known-key' (thread: 0x103312d90) against 198.100.150.34:443.
  303. NSE: Finished 'http-generator' (thread: 0x103296f40) against 198.100.150.34:443.
  304. NSE: sslcert: Returning cached SSL certificate
  305. NSE: Finished 'ssl-cert' (thread: 0x10330b970) against 198.100.150.34:443.
  306. NSE: Final http cache size (1080 bytes) of max size of 1000000
  307. NSE: No favicon found.
  308. NSE: Finished 'http-favicon' (thread: 0x103293770) against 198.100.150.34:443.
  309. NSE: Final http cache size (1093 bytes) of max size of 1000000
  310. NSE: Finished 'http-robots.txt' (thread: 0x1031c5c20) against 198.100.150.34:80.
  311. NSE: Final http cache size (1106 bytes) of max size of 1000000
  312. NSE: Finished 'http-git' (thread: 0x1031bcd10) against 198.100.150.34:80.
  313. NSE: Final http cache size (20205 bytes) of max size of 1000000
  314. NSE: Finished 'http-auth' (thread: 0x1031aeab0) against 198.100.150.34:80.
  315. NSE: http-methods.nse: HTTP Status for OPTIONS is 200
  316. NSE: Finished 'http-methods' (thread: 0x1031c03b0) against 198.100.150.34:80.
  317. NSE: Final http cache size (20475 bytes) of max size of 1000000
  318. NSE: Finished 'http-auth' (thread: 0x10328c6f0) against 198.100.150.34:443.
  319. NSE: Finished 'http-generator' (thread: 0x1031b94a0) against 198.100.150.34:80.
  320. NSE: Got icon URL /media/img/favicon5.ico.
  321. NSE: Finished 'http-title' (thread: 0x1031c9380) against 198.100.150.34:80.
  322. NSE: Final http cache size (21625 bytes) of max size of 1000000
  323. NSE: Finished 'http-favicon' (thread: 0x1031b5cd0) against 198.100.150.34:80.
  324. NSE: Finished 'http-cors' (thread: 0x10328ff10) against 198.100.150.34:443.
  325. NSE: Finished 'http-cors'%), Check Point embedded (89%), D-Link embedded (89%), IGEL Linux 2.6.X (89%), IPCop Linux 2.6.X (89%), IPFire Linux 2.6.X (89%), Iomega Linux 2.6.X (89%)
  326. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6 cpe:/h:dlink:dcs-2103 cpe:/o:igel:linux:2.6 cpe:/o:ipcop:linux:2.6 cpe:/o:ipfire:linux:2.6 cpe:/o:linux:linux_kernel:2.4 cpe:/o:iomega:linux:2.6
  327. OS fingerprint not ideal because: Host distance (10 network hops) is greater than five
  328. Aggressive OS guesses: Linux 3.2 (90%), Linux 2.6.32 - 2.6.33 (89%), Linux 2.6.39 (89%), Linux 2.6.32 - 2.6.38 (89%), Linux 2.6.32 (89%), Check Point UTM-1 Edge X firewall (89%), D-Link DCS-2103 webcam (89%), IGEL UD3 thin client (Linux 2.6) (89%), IPCop 1.9.19 or IPFire firewall 2.9 (Linux 2.6.32) (89%), DD-WRT v23 (Linux 2.4.34) (89%)
  329. No exact OS matches for host (test conditions non-ideal).
  330. TCP/IP fingerprint:
  331. SCAN(V=6.25%E=4%D=4/8%OT=80%CT=3333%CU=34109%PV=N%DS=10%DC=T%G=N%TM=5162BFEC%P=x86_64-apple-darwin10.8.0)
  332. SEQ(II=I)
  333. ECN(R=Y%DF=Y%T=40%W=3908%O=M5B4NNSNW9%CC=Y%Q=)
  334. T1(R=N)
  335. T2(R=N)
  336. T3(R=N)
  337. T4(R=N)
  338. T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
  339. T6(R=N)
  340. T7(R=N)
  341. U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=955E%RUD=G)
  342. IE(R=Y%DFI=N%T=40%CD=S)
  343.  
  344. Network Distance: 10 hops
  345.  
  346. TRACEROUTE (using port 8402/tcp)
  347. HOP RTT       ADDRESS
  348. 1   36.33 ms  10.212.208.1
  349. 2   33.44 ms  sk-rc0001-ds102-vl202.core.as9143.net (213.51.138.129)
  350. 3   31.82 ms  gn-rc0002-cr102-ae12-0.core.as9143.net (213.51.157.10)
  351. 4   31.41 ms  asd-tr0409-cr101-ae2-0.core.as9143.net (213.51.158.16)
  352. 5   34.33 ms  amsix.routers.ovh.net (195.69.145.231)
  353. 6   91.21 ms  ldn-1-6.uk.eu (213.251.128.5)
  354. 7   ...
  355. 8   128.47 ms 198.27.73.205
  356. 9   ...
  357. 10  104.38 ms 198.100.150.34
  358. Final times for host: srtt: 99583 rttvar: 2970  to: 111463
  359.  
  360. NSE: Script Post-scanning.
  361. NSE: Starting runlevel 1 (of 2) scan.
  362. NSE: Starting runlevel 2 (of 2) scan.
  363. Read from /opt/local/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes nmap-services.
  364. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  365. Nmap done: 1 IP address (1 host up) scanned in 26.56 seconds
  366.            Raw packets sent: 2136 (96.724KB) | Rcvd: 63 (15.223KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement