Advertisement
Guest User

Untitled

a guest
Nov 18th, 2014
147
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 1.78 KB | None | 0 0
  1. $ sudo nmap -sS -A 192.168.9.25
  2.  
  3. Starting Nmap 5.21 ( http://nmap.org ) at 2014-11-18 21:08 PKT
  4. Nmap scan report for 192.168.9.25
  5. Host is up (0.070s latency).
  6. Not shown: 993 closed ports
  7. PORT     STATE SERVICE     VERSION
  8. 80/tcp   open  tcpwrapped
  9. 515/tcp  open  printer?
  10. 631/tcp  open  tcpwrapped
  11. 1124/tcp open  tcpwrapped
  12. 2000/tcp open  cisco-sccp?
  13. 5200/tcp open  tcpwrapped
  14. 9100/tcp open  jetdirect?
  15. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
  16. SF-Port2000-TCP:V=5.21%I=7%D=11/18%Time=546B6F21%P=x86_64-unknown-linux-gnu%r(NULL,1,"\x20")%r(SSLSessionReq,1,"\x20")%r(SSLv23SessionReq,1,"\x20")%r
  17. SF:(NCP,1,"\x20")%r(GenericLines,1,"\x20")%r(GetRequest,1,"\x20")%r(HTTPOp
  18. SF:tions,1,"\x20")%r(RTSPRequest,1,"\x20")%r(RPCCheck,1,"\x20")%r(DNSVersi
  19. SF:onBindReq,1,"\x20")%r(DNSStatusRequest,1,"\x20")%r(Help,1,"\x20")%r(SMB
  20. SF:ProgNeg,1,"\x20")%r(X11Probe,1,"\x20")%r(FourOhFourRequest,1,"\x20")%r(
  21. SF:LPDString,1,"\x20")%r(LDAPBindReq,1,"\x20")%r(SIPOptions,1,"\x20")%r(LA
  22. SF:NDesk-RC,1,"\x20")%r(TerminalServer,1,"\x20")%r(NotesRPC,1,"\x20")%r(WM
  23. SF:SRequest,1,"\x20")%r(oracle-tns,1,"\x20");
  24. MAC Address: 00:15:99:3D:6F:51 (Samsung Electronics Co.)
  25. Device type: switch|remote management|printer
  26. Running: 3Com embedded, Dell embedded, Samsung embedded, Xerox embedded
  27. OS details: 3Com SuperStack 3 Switch 4300, Dell PowerEdge 2650 remote access controller, Samsung ML-2571N or 6555N printer, or Xerox Phaser 3125N printer
  28. Network Distance: 1 hop
  29.  
  30. HOP RTT      ADDRESS
  31. 1   70.23 ms 192.168.9.25
  32.  
  33. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  34. Nmap done: 1 IP address (1 host up) scanned in 145.01 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement