Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- http://www.dolfinarium.nl/nl --------- Guilty of giving Morgan to Seaworld and helping them import Icelandic Orcas
- Server: Apache/2
- IP: 94.103.151.120
- E-mails:
- | [+] E-mail Found: webcare@dolfinarium.nl
- | [+] E-mail Found: educatie@dolfinarium.nl
- | [+] E-mail Found: webmaster@dolfinarium.nl
- | [+] E-mail Found: kevinh@kevcom.com
- | [+] E-mail Found: onsumentenservice@dolfinarium.nl
- | [+] E-mail Found: info@dolfinarium.nl
- | [+] E-mail Found: rondjeomdewereld@dolfinarium.nl
- | [+] E-mail Found: retail@dolfinarium.nl
- | [+] E-mail Found: ess@dolfinarium.nl
- | [+] E-mail Found: communicatie@dolfinarium.nl
- | [+] E-mail Found: pz@dolfinarium.nl
- | [+] E-mail Found: sales@dolfinarium.nl
- | [+] E-mail Found: user@example.com
- | [+] E-mail Found: interactie@dolfinarium.nl
- | [+] E-mail Found: mike@hyperreal.org
- | [+] E-mail Found: masterclass@dolfinarium.nl
- | [+] E-mail Found: info@stichtingsam.nl
- | [+] E-mail Found: info@emora.nl
- | [+] E-mail Found: pz@dolinarium.nl
- | [+] E-mail Found: consumentenservice@dolfinarium.nl
- | [+] E-mail Found: reserveringen@dolfinarium.nl
- | [+] E-mail Found: info@cre8ion.com
- | [+] E-mail Found: fotoshoot@dolfinarium.nl
- | [+] E-mail Found: stage@dolfinarium.nl
- | [+] E-mail Found: 467info@dolfinarium.nl
- http://www.oceanpark.com.hk/html/en/home/ ---------guilty of dolphin dealing and sperm share with seaworld
- Server Banner: Apache/2.2.3 (Red Hat)
- Target IP: 54.192.14.173
- Discovered open port 25/tcp on 54.192.14.145
- Discovered open port 110/tcp on 54.192.14.145
- Discovered open port 587/tcp on 54.192.14.145
- Discovered open port 993/tcp on 54.192.14.145
- Discovered open port 995/tcp on 54.192.14.145
- Discovered open port 443/tcp on 54.192.14.145
- Discovered open port 143/tcp on 54.192.14.145
- Discovered open port 80/tcp on 54.192.14.145
- Discovered open port 465/tcp on 54.192.14.145
- Discovered open port 563/tcp on 54.192.14.145
- Discovered open port 119/tcp on 54.192.14.145
- http://www.marineland.fr/ --------guilty of sperm share with seaworld
- Domain http://www.marineland.fr/
- Server Banner: Apache/2.2.22 (Ubuntu)
- Target IP: 194.140.143.81
- Discovered open port 995/tcp on 194.140.143.81
- Discovered open port 110/tcp on 194.140.143.81
- Discovered open port 22/tcp on 194.140.143.81
- Discovered open port 587/tcp on 194.140.143.81
- Discovered open port 143/tcp on 194.140.143.81
- Discovered open port 993/tcp on 194.140.143.81
- Discovered open port 443/tcp on 194.140.143.81
- Discovered open port 80/tcp on 194.140.143.81
- Discovered open port 21/tcp on 194.140.143.81
- Discovered open port 25/tcp on 194.140.143.81
- Increasing send delay for 194.140.143.81 from 0 to 5 due to 11 out of 21 dropped probes since last increase.
- SYN Stealth Scan Timing: About 16.40% done; ETC: 17:00 (0:02:38 remaining)
- Discovered open port 119/tcp on 194.140.143.81
- Discovered open port 465/tcp on 194.140.143.81
- Discovered open port 563/tcp on 194.140.143.81
- Completed SYN Stealth Scan at 16:58, 55.67s elapsed (1000 total ports)
- http://mundomarino.com.ar/site/web/index.php/ ---------guilty of sperm share with seaworld
- Server Banner: Apache
- Target IP: 190.228.29.83
- Discovered open port 143/tcp on 190.228.29.83
- Discovered open port 993/tcp on 190.228.29.83
- Discovered open port 587/tcp on 190.228.29.83
- Discovered open port 25/tcp on 190.228.29.83
- Discovered open port 110/tcp on 190.228.29.83
- Discovered open port 995/tcp on 190.228.29.83
- Discovered open port 111/tcp on 190.228.29.83
- Discovered open port 443/tcp on 190.228.29.83
- Discovered open port 80/tcp on 190.228.29.83
- Discovered open port 465/tcp on 190.228.29.83
- http://www.kamogawa-seaworld.jp/index.html/ ---------quilty of dolphin deals and sperm share with seaworld
- Server Banner: Apache/2.2.6 (Turbolinux)
- Target IP: 202.177.34.228
- Discovered open port 110/tcp on 202.177.34.228
- Discovered open port 995/tcp on 202.177.34.228
- Discovered open port 143/tcp on 202.177.34.228
- Discovered open port 993/tcp on 202.177.34.228
- Discovered open port 53/tcp on 202.177.34.228
- Discovered open port 80/tcp on 202.177.34.228
- Discovered open port 25/tcp on 202.177.34.228
- Discovered open port 587/tcp on 202.177.34.228
- SYN Stealth Scan Timing: About 17.95% done; ETC: 17:27 (0:02:22 remaining)
- Discovered open port 4321/tcp on 202.177.34.228
- Increasing send delay for 202.177.34.228 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
- Discovered open port 32781/tcp on 202.177.34.228
- Discovered open port 8194/tcp on 202.177.34.228
- Discovered open port 5910/tcp on 202.177.34.228
- Discovered open port 9000/tcp on 202.177.34.228
- Discovered open port 49400/tcp on 202.177.34.228
- Discovered open port 6059/tcp on 202.177.34.228
- Discovered open port 7676/tcp on 202.177.34.228
- Discovered open port 555/tcp on 202.177.34.228
- Discovered open port 1049/tcp on 202.177.34.228
- Discovered open port 5357/tcp on 202.177.34.228
- Discovered open port 5054/tcp on 202.177.34.228
- Discovered open port 18101/tcp on 202.177.34.228
- Discovered open port 3493/tcp on 202.177.34.228
- Discovered open port 8085/tcp on 202.177.34.228
- Discovered open port 50500/tcp on 202.177.34.228
- Discovered open port 8600/tcp on 202.177.34.228
- Discovered open port 88/tcp on 202.177.34.228
- Discovered open port 726/tcp on 202.177.34.228
- Discovered open port 9877/tcp on 202.177.34.228
- Discovered open port 27355/tcp on 202.177.34.228
- Discovered open port 2103/tcp on 202.177.34.228
- Discovered open port 5822/tcp on 202.177.34.228
- Discovered open port 50002/tcp on 202.177.34.228
- Discovered open port 5825/tcp on 202.177.34.228
- Discovered open port 2030/tcp on 202.177.34.228
- Discovered open port 8652/tcp on 202.177.34.228
- Discovered open port 416/tcp on 202.177.34.228
- Discovered open port 2022/tcp on 202.177.34.228
- Discovered open port 1052/tcp on 202.177.34.228
- Discovered open port 20005/tcp on 202.177.34.228
- Discovered open port 3168/tcp on 202.177.34.228
- Discovered open port 3372/tcp on 202.177.34.228
- Discovered open port 700/tcp on 202.177.34.228
- Discovered open port 6580/tcp on 202.177.34.228
- Discovered open port 9040/tcp on 202.177.34.228
- Discovered open port 1039/tcp on 202.177.34.228
- http://www.imata.org/ -----ex sw trainer, now dolphin broker is on the board, sw heavily involved
- Server Banner: Apache/2.2.22 (Unix) mod_ssl/2.2.22 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 PHP/5.3.10
- Target IP: 50.63.84.146
- Server: 192.168.136.2
- Address: 192.168.136.2#53
- Discovered open port 25/tcp on 50.63.84.146
- Discovered open port 143/tcp on 50.63.84.146
- Discovered open port 587/tcp on 50.63.84.146
- Discovered open port 110/tcp on 50.63.84.146
- Discovered open port 993/tcp on 50.63.84.146
- Discovered open port 3306/tcp on 50.63.84.146
- Discovered open port 22/tcp on 50.63.84.146
- Discovered open port 443/tcp on 50.63.84.146
- Discovered open port 995/tcp on 50.63.84.146
- Discovered open port 21/tcp on 50.63.84.146
- Discovered open port 80/tcp on 50.63.84.146
- Discovered open port 119/tcp on 50.63.84.146
- Discovered open port 465/tcp on 50.63.84.146
- Discovered open port 563/tcp on 50.63.84.146
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 0.10 ms 192.168.136.2
- 2 0.09 ms ip-50-63-84-146.ip.secureserver.net (50.63.84.146)
- http://www.waza.org/en/site/home/ -----guilty of ignoring seaworld cruelty
- Server Banner: Apache/2.2.29 (FreeBSD) DAV/2 mod_ssl/2.2.29 OpenSSL/1.0.1j mod_hcgi/0.9.4
- Target IP: 217.26.55.3
- Server: 192.168.136.2
- Address: 192.168.136.2#53
- Discovered open port 995/tcp on 217.26.55.3
- Discovered open port 110/tcp on 217.26.55.3
- Discovered open port 25/tcp on 217.26.55.3
- Discovered open port 993/tcp on 217.26.55.3
- Discovered open port 21/tcp on 217.26.55.3
- Discovered open port 587/tcp on 217.26.55.3
- Discovered open port 443/tcp on 217.26.55.3
- Discovered open port 143/tcp on 217.26.55.3
- Discovered open port 22/tcp on 217.26.55.3
- Discovered open port 80/tcp on 217.26.55.3
- Discovered open port 119/tcp on 217.26.55.3
- Domain http://www.oceanembassy.com/ -------ex seaworld trainer, now dolphin broker dealing in wild caught dolphins
- Server Banner: Apache
- Target IP: 74.220.207.68
- Interesting Strings in HTML:
- a href="http://www.facebook.com/oceanembassy" target="_blank">
- Whois:
- Whois Server Version 2.0
- Starting Nmap 6.47 ( http://nmap.org ) at 2015-01-23 15:26 EST
- NSE: Loaded 118 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating Ping Scan at 15:26
- Scanning www.oceanembassy.com (74.220.207.68) [4 ports]
- Completed Ping Scan at 15:26, 0.01s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 15:26
- Completed Parallel DNS resolution of 1 host. at 15:26, 0.04s elapsed
- Initiating SYN Stealth Scan at 15:26
- Scanning www.oceanembassy.com (74.220.207.68) [1000 ports]
- Discovered open port 995/tcp on 74.220.207.68
- Discovered open port 587/tcp on 74.220.207.68
- Discovered open port 993/tcp on 74.220.207.68
- Discovered open port 80/tcp on 74.220.207.68
- Discovered open port 443/tcp on 74.220.207.68
- Discovered open port 21/tcp on 74.220.207.68
- Discovered open port 25/tcp on 74.220.207.68
- Discovered open port 143/tcp on 74.220.207.68
- Discovered open port 110/tcp on 74.220.207.68
- Discovered open port 22/tcp on 74.220.207.68
- SYN Stealth Scan Timing: About 24.03% done; ETC: 15:29 (0:01:38 remaining)
- SYN Stealth Scan Timing: About 25.23% done; ETC: 15:30 (0:03:01 remaining)
- SYN Stealth Scan Timing: About 26.50% done; ETC: 15:32 (0:04:12 remaining)
- Discovered open port 119/tcp on 74.220.207.68
- Discovered open port 563/tcp on 74.220.207.68
- Discovered open port 26/tcp on 74.220.207.68
- Discovered open port 465/tcp on 74.220.207.68
- Completed SYN Stealth Scan at 15:28, 111.17s elapsed (1000 total ports)
- Initiating Service scan at 15:28
- Scanning 14 services on www.oceanembassy.com (74.220.207.68)
- Service scan Timing: About 71.43% done; ETC: 15:31 (0:00:52 remaining)
- Completed Service scan at 15:31, 138.64s elapsed (14 services on 1 host)
- Initiating OS detection (try #1) against www.oceanembassy.com (74.220.207.68)
- Retrying OS detection (try #2) against www.oceanembassy.com (74.220.207.68)
- Initiating Traceroute at 15:31
- Completed Traceroute at 15:31, 0.03s elapsed
- Initiating Parallel DNS resolution of 2 hosts. at 15:31
- Completed Parallel DNS resolution of 2 hosts. at 15:31, 0.05s elapsed
- NSE: Script scanning 74.220.207.68.
- Initiating NSE at 15:31
- Completed NSE at 15:33, 157.83s elapsed
- Nmap scan report for www.oceanembassy.com (74.220.207.68)
- Host is up (0.037s latency).
- rDNS record for 74.220.207.68: host68.hostmonster.com
- Not shown: 985 filtered ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Pure-FTPd
- | ssl-cert: Subject: commonName=*.hostmonster.com
- | Issuer: commonName=PositiveSSL CA 2/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-08T23:00:00+00:00
- | Not valid after: 2017-04-08T22:59:59+00:00
- | MD5: 08da 2e86 2453 8e44 11ec b36f 99a1 2895
- |_SHA-1: 4fc9 3b7e 99e5 a53d c09e 77cc 7399 20ec 9327 0509
- 22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
- | ssh-hostkey:
- | 1024 fd:c2:8e:69:b7:af:8a:0b:2f:a6:c4:45:9b:cf:d1:5c (DSA)
- |_ 2048 04:2c:ef:a3:cc:bf:ee:d6:5b:f3:84:0e:7b:26:de:ac (RSA)
- 25/tcp open smtp?
- |_smtp-commands: Couldn't establish connection on port 25
- 26/tcp open smtp Exim smtpd 4.82
- | smtp-commands: host313.hostmonster.com Hello www.oceanembassy.com [188.227.162.214], SIZE 52428800, 8BITMIME, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- |_ssl-date: 2015-01-23T20:31:24+00:00; +6s from local time.
- 80/tcp open http Apache httpd
- |_http-favicon: Unknown favicon MD5: 0B848B3EF6CB41820CFA72CEEE7BE797
- |_http-methods: POST OPTIONS GET HEAD
- |_http-title: Ocean Embassy - Conservation and Protection of Marine Life
- 110/tcp open pop3 Dovecot pop3d
- |_pop3-capabilities: SASL(PLAIN LOGIN) PIPELINING RESP-CODES AUTH-RESP-CODE UIDL STLS USER CAPA TOP
- 113/tcp closed ident
- 119/tcp open nntp?
- 143/tcp open imap Dovecot imapd
- |_imap-capabilities: SASL-IR Pre-login IMAP4rev1 STARTTLS capabilities listed post-login AUTH=LOGINA0001 more have ENABLE AUTH=PLAIN ID IDLE LOGIN-REFERRALS LITERAL+ OK
- 443/tcp open ssl/http Apache httpd
- |_http-favicon: HostMonster web hosting
- |_http-methods: POST OPTIONS GET HEAD
- | http-robots.txt: 1 disallowed entry
- |_/
- |_http-title: HostMonster - Web hosting
- | ssl-cert: Subject: commonName=*.hostmonster.com
- | Issuer: commonName=PositiveSSL CA 2/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-08T23:00:00+00:00
- | Not valid after: 2017-04-08T22:59:59+00:00
- | MD5: 08da 2e86 2453 8e44 11ec b36f 99a1 2895
- |_SHA-1: 4fc9 3b7e 99e5 a53d c09e 77cc 7399 20ec 9327 0509
- |_ssl-date: 2015-01-23T20:31:23+00:00; +7s from local time.
- | sslv2:
- | SSLv2 supported
- |_ ciphers: none
- 465/tcp open smtps?
- |_smtp-commands: Couldn't establish connection on port 465
- 563/tcp open snews?
- 587/tcp open submission?
- |_smtp-commands: Couldn't establish connection on port 587
- 993/tcp open imaps?
- | ssl-cert: Subject: commonName=*.hostmonster.com
- | Issuer: commonName=avast! Web/Mail Shield Root/organizationName=avast! Web/Mail Shield
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-08T23:00:00+00:00
- | Not valid after: 2017-04-08T22:59:59+00:00
- | MD5: 5521 e5b1 0c07 aba2 1bda 5ebc fa52 9033
- |_SHA-1: bbc3 2f78 15a4 999a 0996 3156 1599 a658 faac 941c
- | sslv2:
- | SSLv2 supported
- |_ ciphers: none
- 995/tcp open ssl/pop3 Dovecot pop3d
- |_pop3-capabilities: UIDL SASL(PLAIN LOGIN) USER TOP AUTH-RESP-CODE RESP-CODES CAPA PIPELINING
- | ssl-cert: Subject: commonName=*.hostmonster.com
- | Issuer: commonName=avast! Web/Mail Shield Root/organizationName=avast! Web/Mail Shield
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-08T23:00:00+00:00
- | Not valid after: 2017-04-08T22:59:59+00:00
- | MD5: 5521 e5b1 0c07 aba2 1bda 5ebc fa52 9033
- |_SHA-1: bbc3 2f78 15a4 999a 0996 3156 1599 a658 faac 941c
- | sslv2:
- | SSLv2 supported
- |_ ciphers: none
- Device type: general purpose|storage-misc|VoIP phone
- Running (JUST GUESSING): Linux 2.4.X|3.X (97%), Microsoft Windows 7|XP (96%), BlueArc embedded (91%), Pirelli embedded (87%)
- OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:3 cpe:/o:microsoft:windows_7:::enterprise cpe:/o:microsoft:windows_xp::sp3 cpe:/h:bluearc:titan_2100 cpe:/h:pirelli:dp-10
- Aggressive OS guesses: DD-WRT v24-sp2 (Linux 2.4.37) (97%), Linux 3.2 (97%), Microsoft Windows 7 Enterprise (96%), Microsoft Windows XP SP3 (96%), BlueArc Titan 2100 NAS device (91%), Pirelli DP-10 VoIP phone (87%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 2 hops
- TCP Sequence Prediction: Difficulty=260 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: Host: host313.hostmonster.com
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 0.08 ms 192.168.136.2
- 2 0.08 ms host68.hostmonster.com (74.220.207.68)
- NSE: Script Post-scanning.
- Initiating NSE at 15:33
- Completed NSE at 15:33, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 416.55 seconds
- Raw packets sent: 3071 (138.360KB) | Rcvd: 582 (23.916KB)
- CRAWLING
- Directory check:
- CODE: 200 URL: http://www.oceanembassy.com/corp/
- CODE: 200 URL: http://www.oceanembassy.com/css/
- CODE: 200 URL: http://www.oceanembassy.com/database/
- CODE: 200 URL: http://www.oceanembassy.com/images/
- CODE: 200 URL: http://www.oceanembassy.com/js/
- CODE: 200 URL: http://www.oceanembassy.com/swf/
- CODE: 200 URL: http://www.oceanembassy.com/support/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement