Advertisement
drego85

176.119.1.146 - megaopac.host

Sep 4th, 2018
1,862
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.89 KB | None | 0 0
  1.  
  2. Starting Nmap 7.60 ( https://nmap.org ) at 2018-09-04 19:44 CEST
  3. NSE: Loaded 146 scripts for scanning.
  4. NSE: Script Pre-scanning.
  5. Initiating NSE at 19:44
  6. Completed NSE at 19:44, 0.00s elapsed
  7. Initiating NSE at 19:44
  8. Completed NSE at 19:44, 0.00s elapsed
  9. Initiating Ping Scan at 19:44
  10. Scanning 176.119.1.146 [4 ports]
  11. Completed Ping Scan at 19:44, 0.26s elapsed (1 total hosts)
  12. Initiating Parallel DNS resolution of 1 host. at 19:44
  13. Completed Parallel DNS resolution of 1 host. at 19:44, 0.10s elapsed
  14. Initiating SYN Stealth Scan at 19:44
  15. Scanning 176.119.1.146 [1000 ports]
  16. Discovered open port 21/tcp on 176.119.1.146
  17. Discovered open port 143/tcp on 176.119.1.146
  18. Discovered open port 110/tcp on 176.119.1.146
  19. Discovered open port 22/tcp on 176.119.1.146
  20. Discovered open port 993/tcp on 176.119.1.146
  21. Discovered open port 25/tcp on 176.119.1.146
  22. Discovered open port 53/tcp on 176.119.1.146
  23. Discovered open port 995/tcp on 176.119.1.146
  24. Discovered open port 80/tcp on 176.119.1.146
  25. Discovered open port 587/tcp on 176.119.1.146
  26. Increasing send delay for 176.119.1.146 from 0 to 5 due to 57 out of 142 dropped probes since last increase.
  27. Increasing send delay for 176.119.1.146 from 5 to 10 due to 18 out of 44 dropped probes since last increase.
  28. Discovered open port 443/tcp on 176.119.1.146
  29. Warning: 176.119.1.146 giving up on port because retransmission cap hit (6).
  30. Discovered open port 465/tcp on 176.119.1.146
  31. Discovered open port 1500/tcp on 176.119.1.146
  32. Completed SYN Stealth Scan at 19:45, 40.95s elapsed (1000 total ports)
  33. Initiating Service scan at 19:45
  34. Scanning 13 services on 176.119.1.146
  35. Completed Service scan at 19:47, 120.97s elapsed (13 services on 1 host)
  36. Initiating OS detection (try #1) against 176.119.1.146
  37. adjust_timeouts2: packet supposedly had rtt of -134230 microseconds. Ignoring time.
  38. adjust_timeouts2: packet supposedly had rtt of -134230 microseconds. Ignoring time.
  39. adjust_timeouts2: packet supposedly had rtt of -144426 microseconds. Ignoring time.
  40. adjust_timeouts2: packet supposedly had rtt of -144426 microseconds. Ignoring time.
  41. Retrying OS detection (try #2) against 176.119.1.146
  42. Initiating Traceroute at 19:47
  43. Completed Traceroute at 19:47, 3.08s elapsed
  44. Initiating Parallel DNS resolution of 11 hosts. at 19:47
  45. Completed Parallel DNS resolution of 11 hosts. at 19:47, 0.25s elapsed
  46. NSE: Script scanning 176.119.1.146.
  47. Initiating NSE at 19:47
  48. Completed NSE at 19:47, 35.76s elapsed
  49. Initiating NSE at 19:47
  50. Completed NSE at 19:47, 1.12s elapsed
  51. Nmap scan report for 176.119.1.146
  52. Host is up (0.10s latency).
  53. Not shown: 987 closed ports
  54. PORT STATE SERVICE VERSION
  55. 21/tcp open ftp ProFTPD 1.3.5a
  56. | ssl-cert: Subject: commonName=example.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  57. | Issuer: commonName=example.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  58. | Public Key type: rsa
  59. | Public Key bits: 1024
  60. | Signature Algorithm: sha256WithRSAEncryption
  61. | Not valid before: 2018-08-31T21:12:23
  62. | Not valid after: 2028-08-28T21:12:23
  63. | MD5: 6ea3 d5b4 4535 e66f ad2c aadf b8ac 62ef
  64. |_SHA-1: 800a 69fd de7a a95b 4509 f882 619b 962e a5d6 a4fe
  65. |_ssl-date: TLS randomness does not represent time
  66. 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0)
  67. | ssh-hostkey:
  68. | 2048 4a:e0:24:e1:53:d9:6d:2f:c4:39:a9:30:62:64:90:94 (RSA)
  69. | 256 54:a0:96:b0:2c:45:94:97:03:05:a7:aa:02:9e:0e:35 (ECDSA)
  70. |_ 256 54:69:c4:0f:e3:3c:f6:93:c4:66:1c:62:74:8c:09:2b (EdDSA)
  71. 25/tcp open smtp Exim smtpd 4.86_2
  72. | smtp-commands: megaopac.host Hello nmap.scanme.org [128.90.170.169], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, STARTTLS, HELP,
  73. |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  74. | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  75. | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  76. | Public Key type: rsa
  77. | Public Key bits: 1024
  78. | Signature Algorithm: sha256WithRSAEncryption
  79. | Not valid before: 2018-08-31T21:11:11
  80. | Not valid after: 2028-08-28T21:11:11
  81. | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
  82. |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
  83. |_ssl-date: 2018-09-04T17:48:11+00:00; +55s from scanner time.
  84. 53/tcp open domain ISC BIND 9.10.3-P4-Ubuntu
  85. | dns-nsid:
  86. |_ bind.version: 9.10.3-P4-Ubuntu
  87. 80/tcp open http Apache httpd 2.4.18
  88. | http-methods:
  89. |_ Supported Methods: GET HEAD POST OPTIONS
  90. |_http-server-header: Apache/2.4.18 (Ubuntu)
  91. |_http-title: Did not follow redirect to https://176.119.1.146/
  92. 110/tcp open pop3 Dovecot pop3d
  93. |_pop3-capabilities: STLS RESP-CODES TOP CAPA SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) PIPELINING USER AUTH-RESP-CODE UIDL
  94. | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  95. | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  96. | Public Key type: rsa
  97. | Public Key bits: 1024
  98. | Signature Algorithm: sha256WithRSAEncryption
  99. | Not valid before: 2018-08-31T21:11:11
  100. | Not valid after: 2028-08-28T21:11:11
  101. | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
  102. |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
  103. |_ssl-date: TLS randomness does not represent time
  104. 143/tcp open imap Dovecot imapd
  105. |_imap-capabilities: AUTH=CRAM-MD5A0001 IDLE post-login STARTTLS AUTH=LOGIN more SASL-IR ID have LITERAL+ listed Pre-login capabilities LOGIN-REFERRALS ENABLE OK AUTH=PLAIN AUTH=DIGEST-MD5 IMAP4rev1
  106. | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  107. | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  108. | Public Key type: rsa
  109. | Public Key bits: 1024
  110. | Signature Algorithm: sha256WithRSAEncryption
  111. | Not valid before: 2018-08-31T21:11:11
  112. | Not valid after: 2028-08-28T21:11:11
  113. | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
  114. |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
  115. |_ssl-date: TLS randomness does not represent time
  116. 443/tcp open https?
  117. | ssl-cert: Subject: commonName=megaopac.host
  118. | Subject Alternative Name: DNS:megaopac.host, DNS:www.megaopac.host
  119. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  120. | Public Key type: rsa
  121. | Public Key bits: 2048
  122. | Signature Algorithm: sha256WithRSAEncryption
  123. | Not valid before: 2018-08-31T20:36:15
  124. | Not valid after: 2018-11-29T20:36:15
  125. | MD5: 8fa7 de1a e79e 0011 1b22 18ce 7b2e 3bf1
  126. |_SHA-1: e7f8 86ef cf97 3a08 f567 5934 75ba c65a 1ffb cecb
  127. 465/tcp open ssl/smtp Exim smtpd 4.86_2
  128. | smtp-commands: megaopac.host Hello nmap.scanme.org [128.90.170.169], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, HELP,
  129. |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  130. | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  131. | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  132. | Public Key type: rsa
  133. | Public Key bits: 1024
  134. | Signature Algorithm: sha256WithRSAEncryption
  135. | Not valid before: 2018-08-31T21:11:11
  136. | Not valid after: 2028-08-28T21:11:11
  137. | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
  138. |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
  139. |_ssl-date: 2018-09-04T17:50:18+00:00; +2m59s from scanner time.
  140. 587/tcp open smtp Exim smtpd 4.86_2
  141. | smtp-commands: megaopac.host Hello nmap.scanme.org [128.90.170.169], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, STARTTLS, HELP,
  142. |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  143. | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  144. | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  145. | Public Key type: rsa
  146. | Public Key bits: 1024
  147. | Signature Algorithm: sha256WithRSAEncryption
  148. | Not valid before: 2018-08-31T21:11:11
  149. | Not valid after: 2028-08-28T21:11:11
  150. | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
  151. |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
  152. |_ssl-date: 2018-09-04T17:48:01+00:00; +41s from scanner time.
  153. 993/tcp open ssl/imap Dovecot imapd
  154. |_imap-capabilities: listed IDLE post-login AUTH=LOGIN more SASL-IR ID have LITERAL+ AUTH=CRAM-MD5A0001 Pre-login capabilities LOGIN-REFERRALS ENABLE OK AUTH=PLAIN AUTH=DIGEST-MD5 IMAP4rev1
  155. | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  156. | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  157. | Public Key type: rsa
  158. | Public Key bits: 1024
  159. | Signature Algorithm: sha256WithRSAEncryption
  160. | Not valid before: 2018-08-31T21:11:11
  161. | Not valid after: 2028-08-28T21:11:11
  162. | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
  163. |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
  164. |_ssl-date: TLS randomness does not represent time
  165. 995/tcp open ssl/pop3 Dovecot pop3d
  166. |_pop3-capabilities: SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) PIPELINING AUTH-RESP-CODE RESP-CODES USER UIDL TOP CAPA
  167. | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  168. | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
  169. | Public Key type: rsa
  170. | Public Key bits: 1024
  171. | Signature Algorithm: sha256WithRSAEncryption
  172. | Not valid before: 2018-08-31T21:11:11
  173. | Not valid after: 2028-08-28T21:11:11
  174. | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
  175. |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
  176. |_ssl-date: TLS randomness does not represent time
  177. 1500/tcp open ssl/vlsi-lm?
  178. | fingerprint-strings:
  179. | FourOhFourRequest:
  180. | HTTP/1.0 404 Not Found
  181. | Content-Length: 2715
  182. | Date: Tue, 04 Sep 2018 17:46:08 GMT
  183. | <!DOCTYPE html>
  184. | <html>
  185. | <head>
  186. | <title>404 Not Found</title>
  187. | <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  188. | <style>
  189. | body {
  190. | font-weight: normal;
  191. | font-size: 11px;
  192. | font-family: Arial;
  193. | .fatal-error {
  194. | width: 270px;
  195. | height: 270px;
  196. | margin: 0 auto;
  197. | position: absolute;
  198. | top: 50%;
  199. | left: 50%;
  200. | margin-left: -135px;
  201. | margin-top: -135px;
  202. | .fatal-error-round {
  203. | width: 270px;
  204. | height: 270px;
  205. | background: #FF8356;
  206. | border-radius: 270px;
  207. | .fatal-error-inner {
  208. | padding-top: 23px;
  209. | text-align: center;
  210. | .fatal-error-sign {
  211. | margin-bottom: 10px;
  212. | .fatal-error-sign-top {
  213. | background: #FFF;
  214. | width: 14px;
  215. | height: 7px;
  216. | border-radius: 28px
  217. | GetRequest:
  218. | HTTP/1.0 200 OK
  219. | Connection: close
  220. | Content-Type: text/html; charset=UTF-8
  221. | Pragma: no-cache
  222. | Cache-Control: no-cache
  223. | Expires: 0
  224. | Set-Cookie: ispmgrses5=; path=/; HttpOnly; expires=Wed, 04 Sep 2019 18:45:31 BST
  225. | Set-Cookie: ispmgrlang5=orion:en; path=/; expires=Wed, 04 Sep 2019 18:45:31 BST
  226. | X-Frame-Options: SAMEORIGIN
  227. | Date: Tue, 04 Sep 2018 17:45:31 GMT
  228. | <!DOCTYPE html><html>
  229. | <head>
  230. | <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  231. | <title>Authorization</title>
  232. | <link rel="stylesheet" href="/manimg/orion/default/main.css" type="text/css">
  233. | <link rel="shortcut icon" href="/manimg/orion/default/favicon-ispmgr.ico" type="image/x-icon">
  234. | <link rel="mask-icon" href="https:///manimg/common/maskicon/ispmgr.svg" color="#000000">
  235. | <meta name="viewport" content="width=device-width, initial-scale=1.0, minimum-scale=1.0, maximum-scale=1.0, user-scalable=yes">
  236. | </head>
  237. | <body class="b
  238. | HTTPOptions:
  239. | HTTP/1.0 200 OK
  240. | Content-Length: 0
  241. | Date: Tue, 04 Sep 2018 17:45:31 GMT
  242. | RTSPRequest:
  243. | HTTP/1.1 200 OK
  244. | Content-Length: 0
  245. |_ Date: Tue, 04 Sep 2018 17:45:32 GMT
  246. | ssl-cert: Subject: commonName=la02abd2.justinstalledpanel.com
  247. | Subject Alternative Name: DNS:la02abd2.justinstalledpanel.com
  248. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  249. | Public Key type: rsa
  250. | Public Key bits: 2048
  251. | Signature Algorithm: sha256WithRSAEncryption
  252. | Not valid before: 2018-08-31T20:07:08
  253. | Not valid after: 2018-11-29T20:07:08
  254. | MD5: 60f8 9d6b e5de eb56 370a e2be 0b83 9b2f
  255. |_SHA-1: c98e 8c1f c29f f245 b0c3 7853 abd5 c1e2 2e70 5552
  256. |_ssl-date: 2018-09-04T17:49:22+00:00; +2m03s from scanner time.
  257. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  258. SF-Port1500-TCP:V=7.60%T=SSL%I=7%D=9/4%Time=5B8EC4BB%P=x86_64-pc-linux-gnu
  259. SF:%r(GetRequest,1706,"HTTP/1\.0\x20200\x20OK\r\nConnection:\x20close\r\nC
  260. SF:ontent-Type:\x20text/html;\x20charset=UTF-8\r\nPragma:\x20no-cache\r\nC
  261. SF:ache-Control:\x20no-cache\r\nExpires:\x200\r\nSet-Cookie:\x20ispmgrses5
  262. SF:=;\x20path=/;\x20HttpOnly;\x20expires=Wed,\x2004\x20Sep\x202019\x2018:4
  263. SF:5:31\x20BST\r\nSet-Cookie:\x20ispmgrlang5=orion:en;\x20path=/;\x20expir
  264. SF:es=Wed,\x2004\x20Sep\x202019\x2018:45:31\x20BST\r\nX-Frame-Options:\x20
  265. SF:SAMEORIGIN\r\nDate:\x20Tue,\x2004\x20Sep\x202018\x2017:45:31\x20GMT\r\n
  266. SF:\r\n<!DOCTYPE\x20html><html>\n<head>\n<meta\x20http-equiv=\"Content-Typ
  267. SF:e\"\x20content=\"text/html;\x20charset=UTF-8\">\n<title>Authorization</
  268. SF:title>\n<link\x20rel=\"stylesheet\"\x20href=\"/manimg/orion/default/mai
  269. SF:n\.css\"\x20type=\"text/css\">\n<link\x20rel=\"shortcut\x20icon\"\x20hr
  270. SF:ef=\"/manimg/orion/default/favicon-ispmgr\.ico\"\x20type=\"image/x-icon
  271. SF:\">\n<link\x20rel=\"mask-icon\"\x20href=\"https:///manimg/common/maskic
  272. SF:on/ispmgr\.svg\"\x20color=\"#000000\">\n<meta\x20name=\"viewport\"\x20c
  273. SF:ontent=\"width=device-width,\x20initial-scale=1\.0,\x20minimum-scale=1\
  274. SF:.0,\x20maximum-scale=1\.0,\x20user-scalable=yes\">\n</head>\n<body\x20c
  275. SF:lass=\"b")%r(HTTPOptions,4B,"HTTP/1\.0\x20200\x20OK\r\nContent-Length:\
  276. SF:x200\r\nDate:\x20Tue,\x2004\x20Sep\x202018\x2017:45:31\x20GMT\r\n\r\n")
  277. SF:%r(RTSPRequest,4B,"HTTP/1\.1\x20200\x20OK\r\nContent-Length:\x200\r\nDa
  278. SF:te:\x20Tue,\x2004\x20Sep\x202018\x2017:45:32\x20GMT\r\n\r\n")%r(FourOhF
  279. SF:ourRequest,AF0,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Length:\x20
  280. SF:2715\r\nDate:\x20Tue,\x2004\x20Sep\x202018\x2017:46:08\x20GMT\r\n\r\n<!
  281. SF:DOCTYPE\x20html>\n<html>\n<head>\n\x20\x20<title>404\x20Not\x20Found</t
  282. SF:itle>\n\x20\x20<meta\x20http-equiv=\"Content-Type\"\x20content=\"text/h
  283. SF:tml;\x20charset=UTF-8\">\n\x20\x20<style>\n\x20\x20\x20\x20body\x20{\n\
  284. SF:x20\x20\x20\x20\x20\x20font-weight:\x20normal;\n\x20\x20\x20\x20\x20\x2
  285. SF:0font-size:\x2011px;\n\x20\x20\x20\x20\x20\x20font-family:\x20Arial;\n\
  286. SF:x20\x20\x20\x20}\n\x20\x20\x20\x20\.fatal-error\x20{\n\x20\x20\x20\x20\
  287. SF:x20\x20width:\x20270px;\n\x20\x20\x20\x20\x20\x20height:\x20270px;\n\x2
  288. SF:0\x20\x20\x20\x20\x20margin:\x200\x20auto;\n\x20\x20\x20\x20\x20\x20pos
  289. SF:ition:\x20absolute;\n\x20\x20\x20\x20\x20\x20top:\x2050%;\n\x20\x20\x20
  290. SF:\x20\x20\x20left:\x2050%;\n\x20\x20\x20\x20\x20\x20margin-left:\x20-135
  291. SF:px;\n\x20\x20\x20\x20\x20\x20margin-top:\x20-135px;\n\x20\x20\x20\x20}\
  292. SF:n\x20\x20\x20\x20\.fatal-error-round\x20{\n\x20\x20\x20\x20\x20\x20widt
  293. SF:h:\x20270px;\n\x20\x20\x20\x20\x20\x20height:\x20270px;\n\x20\x20\x20\x
  294. SF:20\x20\x20background:\x20#FF8356;\n\x20\x20\x20\x20\x20\x20border-radiu
  295. SF:s:\x20270px;\n\x20\x20\x20\x20}\n\x20\x20\x20\x20\.fatal-error-inner\x2
  296. SF:0{\n\x20\x20\x20\x20\x20\x20padding-top:\x2023px;\n\x20\x20\x20\x20\x20
  297. SF:\x20text-align:\x20center;\n\x20\x20\x20\x20}\n\x20\x20\x20\x20\.fatal-
  298. SF:error-sign\x20{\n\x20\x20\x20\x20\x20\x20margin-bottom:\x2010px;\n\x20\
  299. SF:x20\x20\x20}\n\x20\x20\x20\x20\.fatal-error-sign-top\x20{\n\x20\x20\x20
  300. SF:\x20\x20\x20background:\x20#FFF;\n\x20\x20\x20\x20\x20\x20width:\x2014p
  301. SF:x;\n\x20\x20\x20\x20\x20\x20height:\x207px;\n\x20\x20\x20\x20\x20\x20bo
  302. SF:rder-radius:\x2028px");
  303. Aggressive OS guesses: Linux 3.10 - 4.8 (95%), Linux 3.13 (95%), Linux 3.13 or 4.2 (95%), Linux 4.4 (95%), Linux 3.16 (94%), Linux 3.16 - 4.6 (94%), Linux 3.12 (93%), Linux 3.2 - 4.8 (93%), Linux 3.8 - 3.11 (93%), Linux 4.1 (92%)
  304. No exact OS matches for host (test conditions non-ideal).
  305. Uptime guess: 3.841 days (since Fri Aug 31 23:36:24 2018)
  306. Network Distance: 14 hops
  307. TCP Sequence Prediction: Difficulty=263 (Good luck!)
  308. IP ID Sequence Generation: All zeros
  309. Service Info: Host: megaopac.host; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
  310.  
  311. Host script results:
  312. |_clock-skew: mean: 1m39s, deviation: 1m03s, median: 54s
  313.  
  314. NSE: Script Post-scanning.
  315. Initiating NSE at 19:47
  316. Completed NSE at 19:47, 0.00s elapsed
  317. Initiating NSE at 19:47
  318. Completed NSE at 19:47, 0.00s elapsed
  319. Read data files from: /usr/bin/../share/nmap
  320. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  321. Nmap done: 1 IP address (1 host up) scanned in 209.17 seconds
  322. Raw packets sent: 2932 (133.040KB) | Rcvd: 4430 (542.999KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement