Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- MI6, MI5, GCHQ, TMAY, McDonalds uk, Home office, Number 10, Supreme court, EDL, BNP, Be my parent and Justice. Port and OS scans.
- ::::::::::::::::
- ::::: GCHQ :::::
- ::::::::::::::::
- Initiating Ping Scan at 13:26
- Scanning 195.171.165.115 [4 ports]
- Completed Ping Scan at 13:26, 0.02s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:26
- Completed Parallel DNS resolution of 1 host. at 13:26, 0.01s elapsed
- Initiating SYN Stealth Scan at 13:26
- Scanning test1.cesg.gov.uk (195.171.165.115) [1000 ports]
- Discovered open port 80/tcp on 195.171.165.115
- Completed SYN Stealth Scan at 13:26, 5.04s elapsed (1000 total ports)
- Initiating OS detection (try #1) against test1.cesg.gov.uk (195.171.165.115)
- Nmap scan report for test1.cesg.gov.uk (195.171.165.115)
- Host is up (0.013s latency).
- Not shown: 999 filtered ports
- PORT STATE SERVICE
- 80/tcp open http
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 2.6.X
- OS details: Linux 2.6.18
- TCP Sequence Prediction: Difficulty=206 (Good luck!)
- IP ID Sequence Generation: All zeros
- ::::::::::::::::
- ::::: TMAY :::::
- ::::::::::::::::
- Initiating Ping Scan at 13:29
- Scanning 109.104.71.30 [4 ports]
- Completed Ping Scan at 13:29, 0.01s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:29
- Completed Parallel DNS resolution of 1 host. at 13:29, 0.05s elapsed
- Initiating SYN Stealth Scan at 13:29
- Scanning 109.104.71.30 [1000 ports]
- Discovered open port 80/tcp on 109.104.71.30
- Completed SYN Stealth Scan at 13:29, 11.89s elapsed (1000 total ports)
- Initiating OS detection (try #1) against 109.104.71.30
- Retrying OS detection (try #2) against 109.104.71.30
- Nmap scan report for 109.104.71.30
- Host is up (0.011s latency).
- Not shown: 997 filtered ports
- PORT STATE SERVICE
- 53/tcp closed domain
- 80/tcp open http
- 443/tcp closed https
- Device type: general purpose|WAP|firewall
- Running (JUST GUESSING) : Linux 2.6.X|2.4.X (91%), Linksys Linux 2.4.X (89%), USRobotics embedded (85%), IPCop Linux 2.4.X (85%)
- Aggressive OS guesses: Linux 2.6.18 (91%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (91%), OpenWrt White Russian 0.9 (Linux 2.4.30) (89%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (89%), Linux 2.6.19 - 2.6.24 (88%), OpenWrt (Linux 2.4.32) (86%), Linux 2.6.20.6 (86%), Linux 2.6.22 (86%), Linux 2.6.14 - 2.6.18 (86%), USRobotics USR5450 WAP (85%)
- No exact OS matches for host (test conditions non-ideal).
- TCP Sequence Prediction: Difficulty=194 (Good luck!)
- IP ID Sequence Generation: All zeros
- ::::::::::::::
- ::::: HO :::::
- ::::::::::::::
- Starting Nmap 5.21 ( http://nmap.org ) at 2012-04-17 13:41 BST
- Initiating Ping Scan at 13:41
- Scanning 205.139.89.196 [4 ports]
- Completed Ping Scan at 13:41, 0.03s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:41
- Completed Parallel DNS resolution of 1 host. at 13:41, 0.02s elapsed
- Initiating SYN Stealth Scan at 13:41
- Scanning 205.139.89.196 [1000 ports]
- Discovered open port 80/tcp on 205.139.89.196
- Discovered open port 53/tcp on 205.139.89.196
- Completed SYN Stealth Scan at 13:41, 5.58s elapsed (1000 total ports)
- Initiating OS detection (try #1) against 205.139.89.196
- Retrying OS detection (try #2) against 205.139.89.196
- Nmap scan report for 205.139.89.196
- Host is up (0.027s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE
- 53/tcp open domain
- 80/tcp open http
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
- No OS matches for host
- ::::::::::::::::::::::
- ::::: Sup. Court :::::
- ::::::::::::::::::::::
- Starting Nmap 5.21 ( http://nmap.org ) at 2012-04-17 13:41 BST
- Initiating Ping Scan at 13:41
- Scanning 205.139.89.196 [4 ports]
- Completed Ping Scan at 13:41, 0.03s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:41
- Completed Parallel DNS resolution of 1 host. at 13:41, 0.02s elapsed
- Initiating SYN Stealth Scan at 13:41
- Scanning 205.139.89.196 [1000 ports]
- Discovered open port 80/tcp on 205.139.89.196
- Discovered open port 53/tcp on 205.139.89.196
- Completed SYN Stealth Scan at 13:41, 5.58s elapsed (1000 total ports)
- Initiating OS detection (try #1) against 205.139.89.196
- Retrying OS detection (try #2) against 205.139.89.196
- Nmap scan report for 205.139.89.196
- Host is up (0.027s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE
- 53/tcp open domain
- 80/tcp open http
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
- No OS matches for host
- :::::::::::::::::::
- ::::: Justice :::::
- :::::::::::::::::::
- Starting Nmap 5.21 ( http://nmap.org ) at 2012-04-17 13:35 BST
- Initiating Ping Scan at 13:35
- Scanning 149.101.46.50 [4 ports]
- Completed Ping Scan at 13:35, 0.02s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:35
- Completed Parallel DNS resolution of 1 host. at 13:35, 0.02s elapsed
- Initiating SYN Stealth Scan at 13:35
- Scanning www.justice.gov (149.101.46.50) [1000 ports]
- Discovered open port 80/tcp on 149.101.46.50
- Completed SYN Stealth Scan at 13:35, 4.24s elapsed (1000 total ports)
- Initiating OS detection (try #1) against www.justice.gov (149.101.46.50)
- Nmap scan report for www.justice.gov (149.101.46.50)
- Host is up (0.011s latency).
- Not shown: 999 filtered ports
- PORT STATE SERVICE
- 80/tcp open http
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 2.6.X
- OS details: Linux 2.6.18
- TCP Sequence Prediction: Difficulty=207 (Good luck!)
- IP ID Sequence Generation: All zeros
- ::::::::::::::::::::::::
- ::::: Be My Parent :::::
- ::::::::::::::::::::::::
- Starting Nmap 5.21 ( http://nmap.org ) at 2012-04-17 13:36 BST
- Initiating Ping Scan at 13:36
- Scanning 91.205.248.202 [4 ports]
- Completed Ping Scan at 13:36, 0.02s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:36
- Completed Parallel DNS resolution of 1 host. at 13:36, 0.13s elapsed
- Initiating SYN Stealth Scan at 13:36
- Scanning 91.205.248.202 [1000 ports]
- Discovered open port 80/tcp on 91.205.248.202
- Discovered open port 443/tcp on 91.205.248.202
- Completed SYN Stealth Scan at 13:36, 4.87s elapsed (1000 total ports)
- Initiating OS detection (try #1) against 91.205.248.202
- Nmap scan report for 91.205.248.202
- Host is up (0.012s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 2.6.X
- OS details: Linux 2.6.18
- TCP Sequence Prediction: Difficulty=203 (Good luck!)
- IP ID Sequence Generation: All zeros
- :::::::::::::::
- ::::: MI5 :::::
- :::::::::::::::
- Starting Nmap 5.21 ( http://nmap.org ) at 2012-04-17 13:47 BST
- Initiating Ping Scan at 13:47
- Scanning 194.61.183.111 [4 ports]
- Completed Ping Scan at 13:47, 0.01s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:47
- Completed Parallel DNS resolution of 1 host. at 13:47, 0.04s elapsed
- Initiating SYN Stealth Scan at 13:47
- Scanning www.mi5.gov.uk (194.61.183.111) [1000 ports]
- Discovered open port 80/tcp on 194.61.183.111
- Discovered open port 443/tcp on 194.61.183.111
- Completed SYN Stealth Scan at 13:47, 5.61s elapsed (1000 total ports)
- Initiating OS detection (try #1) against www.mi5.gov.uk (194.61.183.111)
- Nmap scan report for www.mi5.gov.uk (194.61.183.111)
- Host is up (0.014s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 2.6.X
- OS details: Linux 2.6.18
- TCP Sequence Prediction: Difficulty=203 (Good luck!)
- IP ID Sequence Generation: All zeros
- :::::::::::::::
- ::::: MI6 :::::
- :::::::::::::::
- Starting Nmap 5.21 ( http://nmap.org ) at 2012-04-17 13:33 BST
- Initiating Ping Scan at 13:33
- Scanning 194.61.183.122 [4 ports]
- Completed Ping Scan at 13:33, 0.02s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:33
- Completed Parallel DNS resolution of 1 host. at 13:33, 0.02s elapsed
- Initiating SYN Stealth Scan at 13:33
- Scanning www.sis.gov.uk (194.61.183.122) [1000 ports]
- Discovered open port 80/tcp on 194.61.183.122
- Discovered open port 443/tcp on 194.61.183.122
- Completed SYN Stealth Scan at 13:33, 4.01s elapsed (1000 total ports)
- Initiating OS detection (try #1) against www.sis.gov.uk (194.61.183.122)
- Nmap scan report for www.sis.gov.uk (194.61.183.122)
- Host is up (0.013s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 2.6.X
- OS details: Linux 2.6.18
- TCP Sequence Prediction: Difficulty=207 (Good luck!)
- IP ID Sequence Generation: All zeros
- ::::::::::::::::
- ::::: No10 :::::
- ::::::::::::::::
- Starting Nmap 5.21 ( http://nmap.org ) at 2012-04-17 13:42 BST
- Initiating Ping Scan at 13:42
- Scanning 2.22.228.19 [4 ports]
- Completed Ping Scan at 13:42, 0.01s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:42
- Completed Parallel DNS resolution of 1 host. at 13:42, 0.01s elapsed
- Initiating SYN Stealth Scan at 13:42
- Scanning 2.22.228.19 [1000 ports]
- Discovered open port 443/tcp on 2.22.228.19
- Discovered open port 80/tcp on 2.22.228.19
- Completed SYN Stealth Scan at 13:43, 22.30s elapsed (1000 total ports)
- Initiating OS detection (try #1) against 2.22.228.19
- Nmap scan report for 2.22.228.19
- Host is up (0.015s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 2.6.X
- OS details: Linux 2.6.18
- TCP Sequence Prediction: Difficulty=201 (Good luck!)
- IP ID Sequence Generation: All zeros
- ::::::::::::::::::
- ::::: McD UK :::::
- ::::::::::::::::::
- Starting Nmap 5.21 ( http://nmap.org ) at 2012-04-17 13:48 BST
- Initiating Ping Scan at 13:48
- Scanning 8.26.223.24 [4 ports]
- Completed Ping Scan at 13:48, 0.02s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:48
- Completed Parallel DNS resolution of 1 host. at 13:48, 0.10s elapsed
- Initiating SYN Stealth Scan at 13:48
- Scanning 8.26.223.24 [1000 ports]
- Discovered open port 80/tcp on 8.26.223.24
- Completed SYN Stealth Scan at 13:48, 4.74s elapsed (1000 total ports)
- Initiating OS detection (try #1) against 8.26.223.24
- Nmap scan report for 8.26.223.24
- Host is up (0.012s latency).
- Not shown: 999 filtered ports
- PORT STATE SERVICE
- 80/tcp open http
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 2.6.X
- OS details: Linux 2.6.18
- TCP Sequence Prediction: Difficulty=203 (Good luck!)
- IP ID Sequence Generation: All zeros
- :::::::::::::::
- ::::: BNP :::::
- :::::::::::::::
- Starting Nmap 5.21 ( http://nmap.org ) at 2012-04-17 13:39 BST
- Initiating Ping Scan at 13:39
- Scanning 109.70.137.82 [4 ports]
- Completed Ping Scan at 13:39, 0.01s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:39
- Completed Parallel DNS resolution of 1 host. at 13:39, 0.02s elapsed
- Initiating SYN Stealth Scan at 13:39
- Scanning 109.70.137.82.reverse.coreix.net (109.70.137.82) [1000 ports]
- Discovered open port 443/tcp on 109.70.137.82
- Discovered open port 80/tcp on 109.70.137.82
- Completed SYN Stealth Scan at 13:39, 4.87s elapsed (1000 total ports)
- Initiating OS detection (try #1) against 109.70.137.82.reverse.coreix.net (109.70.137.82)
- Nmap scan report for 109.70.137.82.reverse.coreix.net (109.70.137.82)
- Host is up (0.0099s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 2.6.X
- OS details: Linux 2.6.18
- TCP Sequence Prediction: Difficulty=199 (Good luck!)
- IP ID Sequence Generation: All zeros
- :::::::::::::::
- ::::: EDL :::::
- :::::::::::::::
- Starting Nmap 5.21 ( http://nmap.org ) at 2012-04-17 13:44 BST
- Initiating Ping Scan at 13:44
- Scanning 146.185.23.189 [4 ports]
- Completed Ping Scan at 13:44, 0.01s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 13:44
- Completed Parallel DNS resolution of 1 host. at 13:44, 0.01s elapsed
- Initiating SYN Stealth Scan at 13:44
- Scanning 92b917bd.rdns.100tb.com (146.185.23.189) [1000 ports]
- Discovered open port 80/tcp on 146.185.23.189
- Discovered open port 443/tcp on 146.185.23.189
- Discovered open port 53/tcp on 146.185.23.189
- Completed SYN Stealth Scan at 13:45, 28.05s elapsed (1000 total ports)
- Initiating OS detection (try #1) against 92b917bd.rdns.100tb.com (146.185.23.189)
- Retrying OS detection (try #2) against 92b917bd.rdns.100tb.com (146.185.23.189)
- Nmap scan report for 92b917bd.rdns.100tb.com (146.185.23.189)
- Host is up (0.019s latency).
- Not shown: 997 filtered ports
- PORT STATE SERVICE
- 53/tcp open domain
- 80/tcp open http
- 443/tcp open https
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
- No OS matches for host
- Uptime guess: 39.012 days (since Fri Mar 9 12:27:49 2012)
- TCP Sequence Prediction: Difficulty=257 (Good luck!)
- IP ID Sequence Generation: All zeros
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement