This week only. Pastebin PRO Accounts Christmas Special! Don't miss out!Want more features on Pastebin? Sign Up, it's FREE!
Guest

Untitled

By: a guest on Sep 24th, 2010  |  syntax: None  |  size: 2.71 KB  |  views: 65  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. nmap -sN -T4 -A -v -PN 216.80.135.70
  2.  
  3. Starting Nmap 5.30BETA1 ( http://nmap.org ) at 2010-09-24 18:13 Eastern Daylight Time
  4. NSE: Loaded 49 scripts for scanning.
  5. Initiating Parallel DNS resolution of 1 host. at 18:13
  6. Completed Parallel DNS resolution of 1 host. at 18:13, 0.59s elapsed
  7. Initiating NULL Scan at 18:13
  8. Scanning 216.80.135.70 [1000 ports]
  9. NULL Scan Timing: About 29.55% done; ETC: 18:14 (0:01:14 remaining)
  10. NULL Scan Timing: About 59.55% done; ETC: 18:14 (0:00:41 remaining)
  11. Completed NULL Scan at 18:14, 101.71s elapsed (1000 total ports)
  12. Initiating Service scan at 18:14
  13. Scanning 996 services on 216.80.135.70
  14. Service scan Timing: About 18.50% done; ETC: 18:17 (0:02:34 remaining)
  15. Service scan Timing: About 36.50% done; ETC: 18:17 (0:01:53 remaining)
  16. Service scan Timing: About 54.50% done; ETC: 18:17 (0:01:19 remaining)
  17. Service scan Timing: About 72.50% done; ETC: 18:17 (0:00:47 remaining)
  18. Completed Service scan at 18:17, 170.01s elapsed (1000 services on 1 host)
  19. Initiating OS detection (try #1) against 216.80.135.70
  20. Retrying OS detection (try #2) against 216.80.135.70
  21. Initiating Traceroute at 18:17
  22. Completed Traceroute at 18:17, 6.07s elapsed
  23. Initiating Parallel DNS resolution of 13 hosts. at 18:17
  24. Completed Parallel DNS resolution of 13 hosts. at 18:17, 0.24s elapsed
  25. NSE: Script scanning 216.80.135.70.
  26. NSE: Starting runlevel 1 (of 1) scan.
  27. Initiating NSE at 18:17
  28. NSE Timing: About 50.00% done; ETC: 18:18 (0:00:31 remaining)
  29. Completed NSE at 18:19, 101.26s elapsed
  30. NSE: Script Scanning completed.
  31. Nmap scan report for 216.80.135.70
  32. Host is up.
  33. All 1000 scanned ports on 216.80.135.70 are open|filtered
  34. Too many fingerprints match this host to give specific OS details
  35.  
  36. TRACEROUTE (using proto 1/icmp)
  37. HOP RTT      ADDRESS
  38. 1   10.00 ms 192.168.0.1
  39. 2   16.00 ms 10.4.128.1
  40. 3   17.00 ms ip72-219-223-173.dc.dc.cox.net (72.219.223.173)
  41. 4   18.00 ms 172.22.66.33
  42. 5   25.00 ms 172.22.66.10
  43. 6   14.00 ms mrfddsrj02-ge110.0.rd.dc.cox.net (68.100.0.149)
  44. 7   15.00 ms ashbbprj02-ae4.0.rd.as.cox.net (68.1.1.232)
  45. 8   17.00 ms pos-3-13-0-0-cr01.ashburn.va.ibone.comcast.net (68.86.86.69)
  46. 9   34.00 ms pos-1-3-0-0-cr01.atlanta.ga.ibone.comcast.net (68.86.87.70)
  47. 10  31.00 ms pos-0-2-0-0-pe01.56marietta.ga.ibone.comcast.net (68.86.86.166)
  48. 11  56.00 ms te-7-3-ar02.bearcreek.tx.houston.comcast.net (68.86.91.74)
  49. 12  59.00 ms te-9-1-ur01.leaguecity.tx.houston.comcast.net (68.85.244.58)
  50. 13  63.00 ms 68.85.251.18
  51. 14  ... 30
  52.  
  53. Read data files from: C:\Program Files (x86)\Nmap
  54. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  55. Nmap done: 1 IP address (1 host up) scanned in 389.72 seconds
  56.            Raw packets sent: 2112 (88.464KB) | Rcvd: 189 (12.867KB)
clone this paste RAW Paste Data