Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- nmap -p 40000-54000 -T4 -A -v 192.168.1.1
- Starting Nmap 6.47 ( http://nmap.org ) at 2015-11-16 22:57 EET
- NSE: Loaded 118 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating ARP Ping Scan at 22:57
- Scanning 192.168.1.1 [1 port]
- Completed ARP Ping Scan at 22:57, 0.03s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 22:57
- Completed Parallel DNS resolution of 1 host. at 22:57, 0.08s elapsed
- Initiating SYN Stealth Scan at 22:57
- Scanning 192.168.1.1 [14001 ports]
- Completed SYN Stealth Scan at 22:58, 24.90s elapsed (14001 total ports)
- Initiating Service scan at 22:58
- Initiating OS detection (try #1) against 192.168.1.1
- Retrying OS detection (try #2) against 192.168.1.1
- NSE: Script scanning 192.168.1.1.
- Initiating NSE at 22:58
- Completed NSE at 22:58, 0.00s elapsed
- Nmap scan report for 192.168.1.1
- Host is up (0.026s latency).
- All 14001 scanned ports on 192.168.1.1 are closed
- MAC Address: 00:22:6B:FC:6E:EB (Cisco-Linksys)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 1 hop
- TRACEROUTE
- HOP RTT ADDRESS
- 1 25.74 ms 192.168.1.1
- NSE: Script Post-scanning.
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 29.03 seconds
- Raw packets sent: 15024 (662.372KB) | Rcvd: 14544 (582.872KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement