Advertisement
Guest User

#OpSeaWorld target list

a guest
Jan 23rd, 2015
3,157
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.72 KB | None | 0 0
  1. http://www.dolfinarium.nl/nl --------- Guilty of giving Morgan to Seaworld and helping them import Icelandic Orcas
  2. Server: Apache/2
  3. IP: 94.103.151.120
  4.  
  5. E-mails:
  6. | [+] E-mail Found: webcare@dolfinarium.nl
  7. | [+] E-mail Found: educatie@dolfinarium.nl
  8. | [+] E-mail Found: webmaster@dolfinarium.nl
  9. | [+] E-mail Found: kevinh@kevcom.com
  10. | [+] E-mail Found: onsumentenservice@dolfinarium.nl
  11. | [+] E-mail Found: info@dolfinarium.nl
  12. | [+] E-mail Found: rondjeomdewereld@dolfinarium.nl
  13. | [+] E-mail Found: retail@dolfinarium.nl
  14. | [+] E-mail Found: ess@dolfinarium.nl
  15. | [+] E-mail Found: communicatie@dolfinarium.nl
  16. | [+] E-mail Found: pz@dolfinarium.nl
  17. | [+] E-mail Found: sales@dolfinarium.nl
  18. | [+] E-mail Found: user@example.com
  19. | [+] E-mail Found: interactie@dolfinarium.nl
  20. | [+] E-mail Found: mike@hyperreal.org
  21. | [+] E-mail Found: masterclass@dolfinarium.nl
  22. | [+] E-mail Found: info@stichtingsam.nl
  23. | [+] E-mail Found: info@emora.nl
  24. | [+] E-mail Found: pz@dolinarium.nl
  25. | [+] E-mail Found: consumentenservice@dolfinarium.nl
  26. | [+] E-mail Found: reserveringen@dolfinarium.nl
  27. | [+] E-mail Found: info@cre8ion.com
  28. | [+] E-mail Found: fotoshoot@dolfinarium.nl
  29. | [+] E-mail Found: stage@dolfinarium.nl
  30. | [+] E-mail Found: 467info@dolfinarium.nl
  31.  
  32.  
  33. http://www.oceanpark.com.hk/html/en/home/ ---------guilty of dolphin dealing and sperm share with seaworld
  34. Server Banner: Apache/2.2.3 (Red Hat)
  35. Target IP: 54.192.14.173
  36.  
  37. Discovered open port 25/tcp on 54.192.14.145
  38. Discovered open port 110/tcp on 54.192.14.145
  39. Discovered open port 587/tcp on 54.192.14.145
  40. Discovered open port 993/tcp on 54.192.14.145
  41. Discovered open port 995/tcp on 54.192.14.145
  42. Discovered open port 443/tcp on 54.192.14.145
  43. Discovered open port 143/tcp on 54.192.14.145
  44. Discovered open port 80/tcp on 54.192.14.145
  45. Discovered open port 465/tcp on 54.192.14.145
  46. Discovered open port 563/tcp on 54.192.14.145
  47. Discovered open port 119/tcp on 54.192.14.145
  48.  
  49. http://www.marineland.fr/ --------guilty of sperm share with seaworld
  50. Domain http://www.marineland.fr/
  51. Server Banner: Apache/2.2.22 (Ubuntu)
  52. Target IP: 194.140.143.81
  53.  
  54. Discovered open port 995/tcp on 194.140.143.81
  55. Discovered open port 110/tcp on 194.140.143.81
  56. Discovered open port 22/tcp on 194.140.143.81
  57. Discovered open port 587/tcp on 194.140.143.81
  58. Discovered open port 143/tcp on 194.140.143.81
  59. Discovered open port 993/tcp on 194.140.143.81
  60. Discovered open port 443/tcp on 194.140.143.81
  61. Discovered open port 80/tcp on 194.140.143.81
  62. Discovered open port 21/tcp on 194.140.143.81
  63. Discovered open port 25/tcp on 194.140.143.81
  64. Increasing send delay for 194.140.143.81 from 0 to 5 due to 11 out of 21 dropped probes since last increase.
  65. SYN Stealth Scan Timing: About 16.40% done; ETC: 17:00 (0:02:38 remaining)
  66. Discovered open port 119/tcp on 194.140.143.81
  67. Discovered open port 465/tcp on 194.140.143.81
  68. Discovered open port 563/tcp on 194.140.143.81
  69. Completed SYN Stealth Scan at 16:58, 55.67s elapsed (1000 total ports)
  70.  
  71.  
  72. http://mundomarino.com.ar/site/web/index.php/ ---------guilty of sperm share with seaworld
  73. Server Banner: Apache
  74. Target IP: 190.228.29.83
  75.  
  76. Discovered open port 143/tcp on 190.228.29.83
  77. Discovered open port 993/tcp on 190.228.29.83
  78. Discovered open port 587/tcp on 190.228.29.83
  79. Discovered open port 25/tcp on 190.228.29.83
  80. Discovered open port 110/tcp on 190.228.29.83
  81. Discovered open port 995/tcp on 190.228.29.83
  82. Discovered open port 111/tcp on 190.228.29.83
  83. Discovered open port 443/tcp on 190.228.29.83
  84. Discovered open port 80/tcp on 190.228.29.83
  85. Discovered open port 465/tcp on 190.228.29.83
  86.  
  87.  
  88. http://www.kamogawa-seaworld.jp/index.html/ ---------quilty of dolphin deals and sperm share with seaworld
  89. Server Banner: Apache/2.2.6 (Turbolinux)
  90. Target IP: 202.177.34.228
  91.  
  92. Discovered open port 110/tcp on 202.177.34.228
  93. Discovered open port 995/tcp on 202.177.34.228
  94. Discovered open port 143/tcp on 202.177.34.228
  95. Discovered open port 993/tcp on 202.177.34.228
  96. Discovered open port 53/tcp on 202.177.34.228
  97. Discovered open port 80/tcp on 202.177.34.228
  98. Discovered open port 25/tcp on 202.177.34.228
  99. Discovered open port 587/tcp on 202.177.34.228
  100. SYN Stealth Scan Timing: About 17.95% done; ETC: 17:27 (0:02:22 remaining)
  101. Discovered open port 4321/tcp on 202.177.34.228
  102. Increasing send delay for 202.177.34.228 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
  103. Discovered open port 32781/tcp on 202.177.34.228
  104. Discovered open port 8194/tcp on 202.177.34.228
  105. Discovered open port 5910/tcp on 202.177.34.228
  106. Discovered open port 9000/tcp on 202.177.34.228
  107. Discovered open port 49400/tcp on 202.177.34.228
  108. Discovered open port 6059/tcp on 202.177.34.228
  109. Discovered open port 7676/tcp on 202.177.34.228
  110. Discovered open port 555/tcp on 202.177.34.228
  111. Discovered open port 1049/tcp on 202.177.34.228
  112. Discovered open port 5357/tcp on 202.177.34.228
  113. Discovered open port 5054/tcp on 202.177.34.228
  114. Discovered open port 18101/tcp on 202.177.34.228
  115. Discovered open port 3493/tcp on 202.177.34.228
  116. Discovered open port 8085/tcp on 202.177.34.228
  117. Discovered open port 50500/tcp on 202.177.34.228
  118. Discovered open port 8600/tcp on 202.177.34.228
  119. Discovered open port 88/tcp on 202.177.34.228
  120. Discovered open port 726/tcp on 202.177.34.228
  121. Discovered open port 9877/tcp on 202.177.34.228
  122. Discovered open port 27355/tcp on 202.177.34.228
  123. Discovered open port 2103/tcp on 202.177.34.228
  124. Discovered open port 5822/tcp on 202.177.34.228
  125. Discovered open port 50002/tcp on 202.177.34.228
  126. Discovered open port 5825/tcp on 202.177.34.228
  127. Discovered open port 2030/tcp on 202.177.34.228
  128. Discovered open port 8652/tcp on 202.177.34.228
  129. Discovered open port 416/tcp on 202.177.34.228
  130. Discovered open port 2022/tcp on 202.177.34.228
  131. Discovered open port 1052/tcp on 202.177.34.228
  132. Discovered open port 20005/tcp on 202.177.34.228
  133. Discovered open port 3168/tcp on 202.177.34.228
  134. Discovered open port 3372/tcp on 202.177.34.228
  135. Discovered open port 700/tcp on 202.177.34.228
  136. Discovered open port 6580/tcp on 202.177.34.228
  137. Discovered open port 9040/tcp on 202.177.34.228
  138. Discovered open port 1039/tcp on 202.177.34.228
  139.  
  140.  
  141. http://www.imata.org/ -----ex sw trainer, now dolphin broker is on the board, sw heavily involved
  142. Server Banner: Apache/2.2.22 (Unix) mod_ssl/2.2.22 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 PHP/5.3.10
  143. Target IP: 50.63.84.146
  144.  
  145. Server: 192.168.136.2
  146. Address: 192.168.136.2#53
  147.  
  148. Discovered open port 25/tcp on 50.63.84.146
  149. Discovered open port 143/tcp on 50.63.84.146
  150. Discovered open port 587/tcp on 50.63.84.146
  151. Discovered open port 110/tcp on 50.63.84.146
  152. Discovered open port 993/tcp on 50.63.84.146
  153. Discovered open port 3306/tcp on 50.63.84.146
  154. Discovered open port 22/tcp on 50.63.84.146
  155. Discovered open port 443/tcp on 50.63.84.146
  156. Discovered open port 995/tcp on 50.63.84.146
  157. Discovered open port 21/tcp on 50.63.84.146
  158. Discovered open port 80/tcp on 50.63.84.146
  159. Discovered open port 119/tcp on 50.63.84.146
  160. Discovered open port 465/tcp on 50.63.84.146
  161. Discovered open port 563/tcp on 50.63.84.146
  162.  
  163. TRACEROUTE (using port 80/tcp)
  164. HOP RTT ADDRESS
  165. 1 0.10 ms 192.168.136.2
  166. 2 0.09 ms ip-50-63-84-146.ip.secureserver.net (50.63.84.146)
  167.  
  168.  
  169.  
  170. http://www.waza.org/en/site/home/ -----guilty of ignoring seaworld cruelty
  171. Server Banner: Apache/2.2.29 (FreeBSD) DAV/2 mod_ssl/2.2.29 OpenSSL/1.0.1j mod_hcgi/0.9.4
  172. Target IP: 217.26.55.3
  173.  
  174. Server: 192.168.136.2
  175. Address: 192.168.136.2#53
  176.  
  177. Discovered open port 995/tcp on 217.26.55.3
  178. Discovered open port 110/tcp on 217.26.55.3
  179. Discovered open port 25/tcp on 217.26.55.3
  180. Discovered open port 993/tcp on 217.26.55.3
  181. Discovered open port 21/tcp on 217.26.55.3
  182. Discovered open port 587/tcp on 217.26.55.3
  183. Discovered open port 443/tcp on 217.26.55.3
  184. Discovered open port 143/tcp on 217.26.55.3
  185. Discovered open port 22/tcp on 217.26.55.3
  186. Discovered open port 80/tcp on 217.26.55.3
  187. Discovered open port 119/tcp on 217.26.55.3
  188.  
  189.  
  190. Domain http://www.oceanembassy.com/ -------ex seaworld trainer, now dolphin broker dealing in wild caught dolphins
  191. Server Banner: Apache
  192. Target IP: 74.220.207.68
  193.  
  194. Interesting Strings in HTML:
  195. a href="http://www.facebook.com/oceanembassy" target="_blank">
  196.  
  197. Whois:
  198.  
  199. Whois Server Version 2.0
  200.  
  201.  
  202. Starting Nmap 6.47 ( http://nmap.org ) at 2015-01-23 15:26 EST
  203. NSE: Loaded 118 scripts for scanning.
  204. NSE: Script Pre-scanning.
  205. Initiating Ping Scan at 15:26
  206. Scanning www.oceanembassy.com (74.220.207.68) [4 ports]
  207. Completed Ping Scan at 15:26, 0.01s elapsed (1 total hosts)
  208. Initiating Parallel DNS resolution of 1 host. at 15:26
  209. Completed Parallel DNS resolution of 1 host. at 15:26, 0.04s elapsed
  210. Initiating SYN Stealth Scan at 15:26
  211. Scanning www.oceanembassy.com (74.220.207.68) [1000 ports]
  212. Discovered open port 995/tcp on 74.220.207.68
  213. Discovered open port 587/tcp on 74.220.207.68
  214. Discovered open port 993/tcp on 74.220.207.68
  215. Discovered open port 80/tcp on 74.220.207.68
  216. Discovered open port 443/tcp on 74.220.207.68
  217. Discovered open port 21/tcp on 74.220.207.68
  218. Discovered open port 25/tcp on 74.220.207.68
  219. Discovered open port 143/tcp on 74.220.207.68
  220. Discovered open port 110/tcp on 74.220.207.68
  221. Discovered open port 22/tcp on 74.220.207.68
  222. SYN Stealth Scan Timing: About 24.03% done; ETC: 15:29 (0:01:38 remaining)
  223. SYN Stealth Scan Timing: About 25.23% done; ETC: 15:30 (0:03:01 remaining)
  224. SYN Stealth Scan Timing: About 26.50% done; ETC: 15:32 (0:04:12 remaining)
  225. Discovered open port 119/tcp on 74.220.207.68
  226. Discovered open port 563/tcp on 74.220.207.68
  227. Discovered open port 26/tcp on 74.220.207.68
  228. Discovered open port 465/tcp on 74.220.207.68
  229. Completed SYN Stealth Scan at 15:28, 111.17s elapsed (1000 total ports)
  230. Initiating Service scan at 15:28
  231. Scanning 14 services on www.oceanembassy.com (74.220.207.68)
  232. Service scan Timing: About 71.43% done; ETC: 15:31 (0:00:52 remaining)
  233. Completed Service scan at 15:31, 138.64s elapsed (14 services on 1 host)
  234. Initiating OS detection (try #1) against www.oceanembassy.com (74.220.207.68)
  235. Retrying OS detection (try #2) against www.oceanembassy.com (74.220.207.68)
  236. Initiating Traceroute at 15:31
  237. Completed Traceroute at 15:31, 0.03s elapsed
  238. Initiating Parallel DNS resolution of 2 hosts. at 15:31
  239. Completed Parallel DNS resolution of 2 hosts. at 15:31, 0.05s elapsed
  240. NSE: Script scanning 74.220.207.68.
  241. Initiating NSE at 15:31
  242. Completed NSE at 15:33, 157.83s elapsed
  243. Nmap scan report for www.oceanembassy.com (74.220.207.68)
  244. Host is up (0.037s latency).
  245. rDNS record for 74.220.207.68: host68.hostmonster.com
  246. Not shown: 985 filtered ports
  247. PORT STATE SERVICE VERSION
  248. 21/tcp open ftp Pure-FTPd
  249. | ssl-cert: Subject: commonName=*.hostmonster.com
  250. | Issuer: commonName=PositiveSSL CA 2/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
  251. | Public Key type: rsa
  252. | Public Key bits: 2048
  253. | Not valid before: 2014-04-08T23:00:00+00:00
  254. | Not valid after: 2017-04-08T22:59:59+00:00
  255. | MD5: 08da 2e86 2453 8e44 11ec b36f 99a1 2895
  256. |_SHA-1: 4fc9 3b7e 99e5 a53d c09e 77cc 7399 20ec 9327 0509
  257. 22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
  258. | ssh-hostkey:
  259. | 1024 fd:c2:8e:69:b7:af:8a:0b:2f:a6:c4:45:9b:cf:d1:5c (DSA)
  260. |_ 2048 04:2c:ef:a3:cc:bf:ee:d6:5b:f3:84:0e:7b:26:de:ac (RSA)
  261. 25/tcp open smtp?
  262. |_smtp-commands: Couldn't establish connection on port 25
  263. 26/tcp open smtp Exim smtpd 4.82
  264. | smtp-commands: host313.hostmonster.com Hello www.oceanembassy.com [188.227.162.214], SIZE 52428800, 8BITMIME, AUTH PLAIN LOGIN, STARTTLS, HELP,
  265. |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  266. |_ssl-date: 2015-01-23T20:31:24+00:00; +6s from local time.
  267. 80/tcp open http Apache httpd
  268. |_http-favicon: Unknown favicon MD5: 0B848B3EF6CB41820CFA72CEEE7BE797
  269. |_http-methods: POST OPTIONS GET HEAD
  270. |_http-title: Ocean Embassy - Conservation and Protection of Marine Life
  271. 110/tcp open pop3 Dovecot pop3d
  272. |_pop3-capabilities: SASL(PLAIN LOGIN) PIPELINING RESP-CODES AUTH-RESP-CODE UIDL STLS USER CAPA TOP
  273. 113/tcp closed ident
  274. 119/tcp open nntp?
  275. 143/tcp open imap Dovecot imapd
  276. |_imap-capabilities: SASL-IR Pre-login IMAP4rev1 STARTTLS capabilities listed post-login AUTH=LOGINA0001 more have ENABLE AUTH=PLAIN ID IDLE LOGIN-REFERRALS LITERAL+ OK
  277. 443/tcp open ssl/http Apache httpd
  278. |_http-favicon: HostMonster web hosting
  279. |_http-methods: POST OPTIONS GET HEAD
  280. | http-robots.txt: 1 disallowed entry
  281. |_/
  282. |_http-title: HostMonster - Web hosting
  283. | ssl-cert: Subject: commonName=*.hostmonster.com
  284. | Issuer: commonName=PositiveSSL CA 2/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
  285. | Public Key type: rsa
  286. | Public Key bits: 2048
  287. | Not valid before: 2014-04-08T23:00:00+00:00
  288. | Not valid after: 2017-04-08T22:59:59+00:00
  289. | MD5: 08da 2e86 2453 8e44 11ec b36f 99a1 2895
  290. |_SHA-1: 4fc9 3b7e 99e5 a53d c09e 77cc 7399 20ec 9327 0509
  291. |_ssl-date: 2015-01-23T20:31:23+00:00; +7s from local time.
  292. | sslv2:
  293. | SSLv2 supported
  294. |_ ciphers: none
  295. 465/tcp open smtps?
  296. |_smtp-commands: Couldn't establish connection on port 465
  297. 563/tcp open snews?
  298. 587/tcp open submission?
  299. |_smtp-commands: Couldn't establish connection on port 587
  300. 993/tcp open imaps?
  301. | ssl-cert: Subject: commonName=*.hostmonster.com
  302. | Issuer: commonName=avast! Web/Mail Shield Root/organizationName=avast! Web/Mail Shield
  303. | Public Key type: rsa
  304. | Public Key bits: 2048
  305. | Not valid before: 2014-04-08T23:00:00+00:00
  306. | Not valid after: 2017-04-08T22:59:59+00:00
  307. | MD5: 5521 e5b1 0c07 aba2 1bda 5ebc fa52 9033
  308. |_SHA-1: bbc3 2f78 15a4 999a 0996 3156 1599 a658 faac 941c
  309. | sslv2:
  310. | SSLv2 supported
  311. |_ ciphers: none
  312. 995/tcp open ssl/pop3 Dovecot pop3d
  313. |_pop3-capabilities: UIDL SASL(PLAIN LOGIN) USER TOP AUTH-RESP-CODE RESP-CODES CAPA PIPELINING
  314. | ssl-cert: Subject: commonName=*.hostmonster.com
  315. | Issuer: commonName=avast! Web/Mail Shield Root/organizationName=avast! Web/Mail Shield
  316. | Public Key type: rsa
  317. | Public Key bits: 2048
  318. | Not valid before: 2014-04-08T23:00:00+00:00
  319. | Not valid after: 2017-04-08T22:59:59+00:00
  320. | MD5: 5521 e5b1 0c07 aba2 1bda 5ebc fa52 9033
  321. |_SHA-1: bbc3 2f78 15a4 999a 0996 3156 1599 a658 faac 941c
  322. | sslv2:
  323. | SSLv2 supported
  324. |_ ciphers: none
  325. Device type: general purpose|storage-misc|VoIP phone
  326. Running (JUST GUESSING): Linux 2.4.X|3.X (97%), Microsoft Windows 7|XP (96%), BlueArc embedded (91%), Pirelli embedded (87%)
  327. OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:3 cpe:/o:microsoft:windows_7:::enterprise cpe:/o:microsoft:windows_xp::sp3 cpe:/h:bluearc:titan_2100 cpe:/h:pirelli:dp-10
  328. Aggressive OS guesses: DD-WRT v24-sp2 (Linux 2.4.37) (97%), Linux 3.2 (97%), Microsoft Windows 7 Enterprise (96%), Microsoft Windows XP SP3 (96%), BlueArc Titan 2100 NAS device (91%), Pirelli DP-10 VoIP phone (87%)
  329. No exact OS matches for host (test conditions non-ideal).
  330. Network Distance: 2 hops
  331. TCP Sequence Prediction: Difficulty=260 (Good luck!)
  332. IP ID Sequence Generation: Incremental
  333. Service Info: Host: host313.hostmonster.com
  334.  
  335. TRACEROUTE (using port 80/tcp)
  336. HOP RTT ADDRESS
  337. 1 0.08 ms 192.168.136.2
  338. 2 0.08 ms host68.hostmonster.com (74.220.207.68)
  339.  
  340. NSE: Script Post-scanning.
  341. Initiating NSE at 15:33
  342. Completed NSE at 15:33, 0.00s elapsed
  343. Read data files from: /usr/bin/../share/nmap
  344. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  345. Nmap done: 1 IP address (1 host up) scanned in 416.55 seconds
  346. Raw packets sent: 3071 (138.360KB) | Rcvd: 582 (23.916KB)
  347.  
  348.  
  349. CRAWLING
  350. Directory check:
  351. CODE: 200 URL: http://www.oceanembassy.com/corp/
  352. CODE: 200 URL: http://www.oceanembassy.com/css/
  353. CODE: 200 URL: http://www.oceanembassy.com/database/
  354. CODE: 200 URL: http://www.oceanembassy.com/images/
  355. CODE: 200 URL: http://www.oceanembassy.com/js/
  356. CODE: 200 URL: http://www.oceanembassy.com/swf/
  357. CODE: 200 URL: http://www.oceanembassy.com/support/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement